curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "curl-udeb": "7.35.0-1ubuntu2.11", "libcurl3": "7.35.0-1ubuntu2.11", "libcurl4-gnutls-dev": "7.35.0-1ubuntu2.11", "libcurl3-dbgsym": "7.35.0-1ubuntu2.11", "libcurl3-nss": "7.35.0-1ubuntu2.11", "libcurl4-doc": "7.35.0-1ubuntu2.11", "libcurl3-udeb-dbgsym": "7.35.0-1ubuntu2.11", "libcurl3-gnutls-dbgsym": "7.35.0-1ubuntu2.11", "libcurl4-openssl-dev": "7.35.0-1ubuntu2.11", "libcurl4-openssl-dev-dbgsym": "7.35.0-1ubuntu2.11", "curl-dbgsym": "7.35.0-1ubuntu2.11", "curl": "7.35.0-1ubuntu2.11", "libcurl3-udeb": "7.35.0-1ubuntu2.11", "curl-udeb-dbgsym": "7.35.0-1ubuntu2.11", "libcurl4-nss-dev-dbgsym": "7.35.0-1ubuntu2.11", "libcurl3-gnutls": "7.35.0-1ubuntu2.11", "libcurl4-gnutls-dev-dbgsym": "7.35.0-1ubuntu2.11", "libcurl3-nss-dbgsym": "7.35.0-1ubuntu2.11", "libcurl3-dbg": "7.35.0-1ubuntu2.11", "libcurl4-nss-dev": "7.35.0-1ubuntu2.11" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libcurl3": "7.47.0-1ubuntu2.3", "libcurl4-gnutls-dev": "7.47.0-1ubuntu2.3", "libcurl3-dbgsym": "7.47.0-1ubuntu2.3", "libcurl3-nss": "7.47.0-1ubuntu2.3", "libcurl4-doc": "7.47.0-1ubuntu2.3", "libcurl3-gnutls-dbgsym": "7.47.0-1ubuntu2.3", "libcurl4-openssl-dev": "7.47.0-1ubuntu2.3", "libcurl4-openssl-dev-dbgsym": "7.47.0-1ubuntu2.3", "curl-dbgsym": "7.47.0-1ubuntu2.3", "curl": "7.47.0-1ubuntu2.3", "libcurl4-nss-dev-dbgsym": "7.47.0-1ubuntu2.3", "libcurl3-gnutls": "7.47.0-1ubuntu2.3", "libcurl4-gnutls-dev-dbgsym": "7.47.0-1ubuntu2.3", "libcurl3-nss-dbgsym": "7.47.0-1ubuntu2.3", "libcurl3-dbg": "7.47.0-1ubuntu2.3", "libcurl4-nss-dev": "7.47.0-1ubuntu2.3" } ] }