CVE-2018-16839: SASL password overflow via integer overflow CVE-2018-16840: use-after-free in handle close CVE-2018-16842: warning message out-of-buffer read
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1e27631c9fd6a7055e35628a195fd14c18bc9a1f commit 1e27631c9fd6a7055e35628a195fd14c18bc9a1f Author: Jeroen Roovers <jer@gentoo.org> AuthorDate: 2018-10-31 13:43:47 +0000 Commit: Jeroen Roovers <jer@gentoo.org> CommitDate: 2018-10-31 13:46:14 +0000 net-misc/curl: Version 7.62.0 Package-Manager: Portage-2.3.51, Repoman-2.3.11 Bug: https://bugs.gentoo.org/670026 Signed-off-by: Jeroen Roovers <jer@gentoo.org> net-misc/curl/Manifest | 1 + net-misc/curl/curl-7.62.0.ebuild | 247 +++++++++++++++++++++++++++++++++++++++ 2 files changed, 248 insertions(+)
Cleaned vuln versions after arm stabilization due to long term overdue
This issue was resolved and addressed in GLSA 201903-03 at https://security.gentoo.org/glsa/201903-03 by GLSA coordinator Aaron Bauman (b-man).