DEBIAN-CVE-2022-35260

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2022-35260
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-35260.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-35260
Upstream
Published
2022-12-05T22:15:10Z
Modified
2025-09-19T06:16:08Z
Summary
[none]
Details

curl can be told to parse a .netrc file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte beyond its boundary.This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes.If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service.

References

Affected packages

Debian:12 / curl

Package

Name
curl
Purl
pkg:deb/debian/curl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.86.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / curl

Package

Name
curl
Purl
pkg:deb/debian/curl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.86.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / curl

Package

Name
curl
Purl
pkg:deb/debian/curl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.86.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}