Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "curl-udeb": "7.35.0-1ubuntu2.8", "libcurl3": "7.35.0-1ubuntu2.8", "libcurl4-gnutls-dev": "7.35.0-1ubuntu2.8", "libcurl3-dbgsym": "7.35.0-1ubuntu2.8", "libcurl3-nss": "7.35.0-1ubuntu2.8", "libcurl4-doc": "7.35.0-1ubuntu2.8", "libcurl3-udeb-dbgsym": "7.35.0-1ubuntu2.8", "libcurl3-gnutls-dbgsym": "7.35.0-1ubuntu2.8", "libcurl4-openssl-dev": "7.35.0-1ubuntu2.8", "libcurl4-openssl-dev-dbgsym": "7.35.0-1ubuntu2.8", "curl-dbgsym": "7.35.0-1ubuntu2.8", "curl": "7.35.0-1ubuntu2.8", "libcurl3-udeb": "7.35.0-1ubuntu2.8", "curl-udeb-dbgsym": "7.35.0-1ubuntu2.8", "libcurl4-nss-dev-dbgsym": "7.35.0-1ubuntu2.8", "libcurl3-gnutls": "7.35.0-1ubuntu2.8", "libcurl4-gnutls-dev-dbgsym": "7.35.0-1ubuntu2.8", "libcurl3-nss-dbgsym": "7.35.0-1ubuntu2.8", "libcurl3-dbg": "7.35.0-1ubuntu2.8", "libcurl4-nss-dev": "7.35.0-1ubuntu2.8" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libcurl3": "7.47.0-1ubuntu2.1", "libcurl4-gnutls-dev": "7.47.0-1ubuntu2.1", "libcurl3-dbgsym": "7.47.0-1ubuntu2.1", "libcurl3-nss": "7.47.0-1ubuntu2.1", "libcurl4-doc": "7.47.0-1ubuntu2.1", "libcurl3-gnutls-dbgsym": "7.47.0-1ubuntu2.1", "libcurl4-openssl-dev": "7.47.0-1ubuntu2.1", "libcurl4-openssl-dev-dbgsym": "7.47.0-1ubuntu2.1", "curl-dbgsym": "7.47.0-1ubuntu2.1", "curl": "7.47.0-1ubuntu2.1", "libcurl4-nss-dev-dbgsym": "7.47.0-1ubuntu2.1", "libcurl3-gnutls": "7.47.0-1ubuntu2.1", "libcurl4-gnutls-dev-dbgsym": "7.47.0-1ubuntu2.1", "libcurl3-nss-dbgsym": "7.47.0-1ubuntu2.1", "libcurl3-dbg": "7.47.0-1ubuntu2.1", "libcurl4-nss-dev": "7.47.0-1ubuntu2.1" } ] }