curl supports "globbing" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. Affected versions: curl 7.34.0 up to and including 7.54.1 This flaw only affects the curl command line tool, not the libcurl library.
Acknowledgments: Name: the Curl project Upstream: Brian Carpenter
Created attachment 1308972 [details] Upstream patch
Statement: Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
External References: https://curl.haxx.se/docs/adv_20170809A.html
Created curl tracking bugs for this issue: Affects: fedora-all [bug 1479670] Created mingw-curl tracking bugs for this issue: Affects: epel-7 [bug 1479668] Affects: fedora-all [bug 1479669]
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2018:3558