curl can be told to parse a .netrc file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte beyond its boundary.This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes.If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-35260.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "12.6.3"
}
]
},
{
"events": [
{
"introduced": "8.2.0"
},
{
"fixed": "8.2.12"
}
]
},
{
"events": [
{
"introduced": "9.0.0"
},
{
"fixed": "9.0.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.1.0"
}
]
}
]