In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade SLES:15.6
libcurl-devel
to version 8.6.0-150600.4.21.1 or higher.
Note: Versions mentioned in the description apply only to the upstream libcurl-devel
package and not the libcurl-devel
package as distributed by SLES
.
See How to fix?
for SLES:15.6
relevant fixed versions and status.
When libcurl is asked to perform automatic gzip decompression of
content-encoded HTTP responses with the CURLOPT_ACCEPT_ENCODING
option,
using zlib 1.2.0.3 or older, an attacker-controlled integer overflow would
make libcurl perform a buffer overflow.