Name | CVE-2024-6874 |
Description | libcurl's URL API function [curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode conversions, to and from IDN. Asking to convert a name that is exactly 256 bytes, libcurl ends up reading outside of a stack based buffer when built to use the *macidn* IDN backend. The conversion function then fills up the provided buffer exactly - but does not null terminate the string. This flaw can lead to stack contents accidently getting returned as part of the converted string. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1076996 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
curl (PTS) | bullseye | 7.74.0-1.3+deb11u13 | fixed |
bullseye (security) | 7.74.0-1.3+deb11u15 | fixed | |
bookworm | 7.88.1-10+deb12u14 | fixed | |
bookworm (security) | 7.88.1-10+deb12u5 | fixed | |
trixie | 8.14.1-2 | fixed | |
forky | 8.16.0-2 | fixed | |
sid | 8.16.0-4 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
curl | source | bullseye | (not affected) | |||
curl | source | bookworm | (not affected) | |||
curl | source | (unstable) | 8.9.0-1 | 1076996 |
[bookworm] - curl <not-affected> (Vulnerable code introduced later)
[bullseye] - curl <not-affected> (Vulnerable code introduced later)
https://curl.se/docs/CVE-2024-6874.html
Introduced in: https://github.com/curl/curl/commit/add22feeef07858307be5722e1869e082554290e (curl-8_8_0)
Fixed by: https://github.com/curl/curl/commit/686d54baf1df6e0775898f484d1670742898b3b2 (curl-8_9_0)