libcurl contains two integer overflows in the curl_url_set()
function that
if triggered, can lead to a too small buffer allocation and a subsequent heap
buffer overflow.
The flaws only exist on 32 bit architectures and require excessive string input lengths.
{ "last_affected": "7.64.1", "award": { "amount": "150", "currency": "USD" }, "package": "curl", "URL": "https://curl.se/docs/CVE-2019-5435.json", "severity": "Low", "CWE": { "desc": "Incorrect Calculation of Buffer Size", "id": "CWE-131" }, "issue": "https://hackerone.com/reports/547630", "affects": "both", "www": "https://curl.se/docs/CVE-2019-5435.html" }