Search for packages
purl | pkg:alpm/archlinux/lib32-curl@7.52.1-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-scf2-8apg-aaap
Aliases: CVE-2017-2629 |
curl before 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server's certificate's validity in the code that checks for a test success or failure. It ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question. This could lead to users not detecting when a server's certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. This flaw also exists in the command line tool (--cert-status). |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-bat6-t5kp-aaam | curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks. |
CVE-2016-9586
|
VCID-d549-5ckr-aaaf | curl before version 7.52.1 is vulnerable to an uninitialized random in libcurl's internal function that returns a good 32bit random value. Having a weak or virtually non-existent random value makes the operations that use it vulnerable. |
CVE-2016-9594
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:47:07.473447+00:00 | Arch Linux Importer | Affected by | VCID-scf2-8apg-aaap | https://security.archlinux.org/AVG-182 | 36.0.0 |
2025-03-28T07:47:00.842673+00:00 | Arch Linux Importer | Fixing | VCID-bat6-t5kp-aaam | https://security.archlinux.org/AVG-115 | 36.0.0 |
2025-03-28T07:47:00.822081+00:00 | Arch Linux Importer | Fixing | VCID-d549-5ckr-aaaf | https://security.archlinux.org/AVG-115 | 36.0.0 |
2024-12-11T10:54:46.536032+00:00 | Arch Linux Importer | Fixing | VCID-bat6-t5kp-aaam | https://security.archlinux.org/AVG-115 | 35.0.0 |
2024-12-11T10:54:46.155611+00:00 | Arch Linux Importer | Fixing | VCID-d549-5ckr-aaaf | https://security.archlinux.org/AVG-115 | 35.0.0 |
2024-09-18T02:02:31.560263+00:00 | Arch Linux Importer | Affected by | VCID-scf2-8apg-aaap | https://security.archlinux.org/AVG-182 | 34.0.1 |
2024-09-18T02:02:23.033458+00:00 | Arch Linux Importer | Fixing | VCID-bat6-t5kp-aaam | https://security.archlinux.org/AVG-115 | 34.0.1 |
2024-09-18T02:02:23.011310+00:00 | Arch Linux Importer | Fixing | VCID-d549-5ckr-aaaf | https://security.archlinux.org/AVG-115 | 34.0.1 |
2024-01-31T12:10:01.273272+00:00 | Arch Linux Importer | Fixing | VCID-bat6-t5kp-aaam | https://security.archlinux.org/AVG-115 | 34.0.0rc2 |
2024-01-31T12:10:01.251308+00:00 | Arch Linux Importer | Fixing | VCID-d549-5ckr-aaaf | https://security.archlinux.org/AVG-115 | 34.0.0rc2 |
2024-01-03T22:28:32.107244+00:00 | Arch Linux Importer | Affected by | VCID-scf2-8apg-aaap | https://security.archlinux.org/AVG-182 | 34.0.0rc1 |
2024-01-03T22:28:24.466473+00:00 | Arch Linux Importer | Fixing | VCID-bat6-t5kp-aaam | https://security.archlinux.org/AVG-115 | 34.0.0rc1 |
2024-01-03T22:28:24.440352+00:00 | Arch Linux Importer | Fixing | VCID-d549-5ckr-aaaf | https://security.archlinux.org/AVG-115 | 34.0.0rc1 |