CVE-2024-7264

Name
CVE-2024-7264
Description
libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
https://curl.se/docs/CVE-2024-7264.json
https://curl.se/docs/CVE-2024-7264.html
https://hackerone.com/reports/2629968
http://www.openwall.com/lists/oss-security/2024/07/31/1

Match rules

CPE URI Source package Min version Max version
curl >= 0 <= 8.9.0
curl >= 0 <= 8.8.0
curl >= 0 <= 8.7.1
curl >= 0 <= 8.7.0
curl >= 0 <= 8.6.0
curl >= 0 <= 8.5.0
curl >= 0 <= 8.4.0
curl >= 0 <= 8.3.0
curl >= 0 <= 8.2.1
curl >= 0 <= 8.2.0
curl >= 0 <= 8.1.2
curl >= 0 <= 8.1.1
curl >= 0 <= 8.1.0
curl >= 0 <= 8.0.1
curl >= 0 <= 8.0.0
curl >= 0 <= 7.88.1
curl >= 0 <= 7.88.0
curl >= 0 <= 7.87.0
curl >= 0 <= 7.86.0
curl >= 0 <= 7.85.0
curl >= 0 <= 7.84.0
curl >= 0 <= 7.83.1
curl >= 0 <= 7.83.0
curl >= 0 <= 7.82.0
curl >= 0 <= 7.81.0
curl >= 0 <= 7.80.0
curl >= 0 <= 7.79.1
curl >= 0 <= 7.79.0
curl >= 0 <= 7.78.0
curl >= 0 <= 7.77.0
curl >= 0 <= 7.76.1
curl >= 0 <= 7.76.0
curl >= 0 <= 7.75.0
curl >= 0 <= 7.74.0
curl >= 0 <= 7.73.0
curl >= 0 <= 7.72.0
curl >= 0 <= 7.71.1
curl >= 0 <= 7.71.0
curl >= 0 <= 7.70.0
curl >= 0 <= 7.69.1
curl >= 0 <= 7.69.0
curl >= 0 <= 7.68.0
curl >= 0 <= 7.67.0
curl >= 0 <= 7.66.0
curl >= 0 <= 7.65.3
curl >= 0 <= 7.65.2
curl >= 0 <= 7.65.1
curl >= 0 <= 7.65.0
curl >= 0 <= 7.64.1
curl >= 0 <= 7.64.0
curl >= 0 <= 7.63.0
curl >= 0 <= 7.62.0
curl >= 0 <= 7.61.1
curl >= 0 <= 7.61.0
curl >= 0 <= 7.60.0
curl >= 0 <= 7.59.0
curl >= 0 <= 7.58.0
curl >= 0 <= 7.57.0
curl >= 0 <= 7.56.1
curl >= 0 <= 7.56.0
curl >= 0 <= 7.55.1
curl >= 0 <= 7.55.0
curl >= 0 <= 7.54.1
curl >= 0 <= 7.54.0
curl >= 0 <= 7.53.1
curl >= 0 <= 7.53.0
curl >= 0 <= 7.52.1
curl >= 0 <= 7.52.0
curl >= 0 <= 7.51.0
curl >= 0 <= 7.50.3
curl >= 0 <= 7.50.2
curl >= 0 <= 7.50.1
curl >= 0 <= 7.50.0
curl >= 0 <= 7.49.1
curl >= 0 <= 7.49.0
curl >= 0 <= 7.48.0
curl >= 0 <= 7.47.1
curl >= 0 <= 7.47.0
curl >= 0 <= 7.46.0
curl >= 0 <= 7.45.0
curl >= 0 <= 7.44.0
curl >= 0 <= 7.43.0
curl >= 0 <= 7.42.1
curl >= 0 <= 7.42.0
curl >= 0 <= 7.41.0
curl >= 0 <= 7.40.0
curl >= 0 <= 7.39.0
curl >= 0 <= 7.38.0
curl >= 0 <= 7.37.1
curl >= 0 <= 7.37.0
curl >= 0 <= 7.36.0
curl >= 0 <= 7.35.0
curl >= 0 <= 7.34.0
curl >= 0 <= 7.33.0
curl >= 0 <= 7.32.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
curl 3.17-main 8.9.0-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable