Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32027 | A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave. |
Wed, 15 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-01-15T15:59:07.016Z
Reserved: 2023-03-14T00:00:00.000Z
Link: CVE-2023-28320
Updated: 2024-08-02T12:38:24.752Z
Status : Modified
Published: 2023-05-26T21:15:15.937
Modified: 2025-01-15T16:15:25.953
Link: CVE-2023-28320
OpenCVE Enrichment
No data.
EUVD