Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 02:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html - Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3638 - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/92306 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1036536 - Third Party Advisory, VDB Entry | |
References | () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.563059 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3048-1 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:3558 - Third Party Advisory | |
References | () https://curl.haxx.se/docs/adv_20160803C.html - Mitigation, Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLPXQQKURBQFM4XM6645VRPTOE2AWG33/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3GQH4V3XAQ5Z53AMQRDEC3C3UHTW7QR/ - | |
References | () https://security.gentoo.org/glsa/201701-47 - Third Party Advisory | |
References | () https://source.android.com/security/bulletin/2016-12-01.html - Third Party Advisory | |
References | () https://www.tenable.com/security/tns-2016-18 - Third Party Advisory |
07 Nov 2023, 02:33
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2016-08-10 14:59
Updated : 2024-11-21 02:54
NVD link : CVE-2016-5421
Mitre link : CVE-2016-5421
CVE.ORG link : CVE-2016-5421
JSON object : View
Products Affected
debian
- debian_linux
opensuse
- leap
- opensuse
canonical
- ubuntu_linux
fedoraproject
- fedora
haxx
- libcurl
CWE
CWE-416
Use After Free