Your submission was sent successfully! Close


Published: 24 January 2018

libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported ( that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.

From the Ubuntu security team

leosilva> vulnerability code was introduced after version 7.47 leosilva> trusty and precise/esm are not-affected.



CVSS 3 base score: 9.1


Package Release Status
Launchpad, Ubuntu, Debian
Released (7.55.1-1ubuntu2.3)
precise Not vulnerable

trusty Not vulnerable

Released (7.58.0-1)
Released (7.47.0-1ubuntu2.6)