In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Heap-based Buffer Overflow vulnerabilities in an interactive lesson.
Start learningUpgrade RHEL:8 libcurl-devel to version 0:7.61.1-12.el8 or higher.
This issue was patched in RHSA-2020:1792.
Note: Versions mentioned in the description apply only to the upstream libcurl-devel package and not the libcurl-devel package as distributed by RHEL.
See How to fix? for RHEL:8 relevant fixed versions and status.
A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.