CURL-CVE-2018-16840

Source
https://curl.se/docs/CVE-2018-16840.html
Import Source
https://curl.se/docs/CURL-CVE-2018-16840.json
JSON Data
https://api.test.osv.dev/v1/vulns/CURL-CVE-2018-16840
Aliases
Published
2018-10-31T08:00:00Z
Modified
2024-07-02T09:22:24Z
Summary
use after free in handle close
Details

libcurl contains a heap use after free flaw in code related to closing an easy handle.

When closing and cleaning up an "easy" handle in the Curl_close() function, the library code first frees a struct (without clearing the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.

Database specific
{
    "CWE": {
        "id": "CWE-416",
        "desc": "Use After Free"
    },
    "award": {
        "amount": "100",
        "currency": "USD"
    },
    "URL": "https://curl.se/docs/CVE-2018-16840.json",
    "package": "curl",
    "severity": "Low",
    "www": "https://curl.se/docs/CVE-2018-16840.html",
    "last_affected": "7.61.1"
}
References
Credits
    • Brian Carpenter (Geeknik Labs) - FINDER
    • Daniel Stenberg - REMEDIATION_DEVELOPER

Affected packages

Git / github.com/curl/curl.git

Affected ranges

Type
SEMVER
Events
Introduced
7.59.0
Fixed
7.62.0
Type
GIT
Repo
https://github.com/curl/curl.git
Events

Affected versions

7.*

7.59.0
7.60.0
7.61.0
7.61.1