vulnerability
Red Hat: CVE-2024-7264: curl: libcurl: ASN.1 date parser overread (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:M/Au:S/C:P/I:N/A:C) | Jul 31, 2024 | Feb 20, 2025 | Aug 11, 2025 |
Severity
5
CVSS
(AV:L/AC:M/Au:S/C:P/I:N/A:C)
Published
Jul 31, 2024
Added
Feb 20, 2025
Modified
Aug 11, 2025
Description
libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an
ASN.1 Generalized Time field. If given an syntactically incorrect field, the
parser might end up using -1 for the length of the *time fraction*, leading to
a `strlen()` getting performed on a pointer to a heap buffer area that is not
(purposely) null terminated.
This flaw most likely leads to a crash, but can also lead to heap contents
getting returned to the application when
[CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-mecabredhat-upgrade-mecab-debuginforedhat-upgrade-mecab-debugsourceredhat-upgrade-mecab-develredhat-upgrade-mecab-ipadicredhat-upgrade-mecab-ipadic-eucjpredhat-upgrade-mysqlredhat-upgrade-mysql-commonredhat-upgrade-mysql-debuginforedhat-upgrade-mysql-debugsourceredhat-upgrade-mysql-develredhat-upgrade-mysql-devel-debuginforedhat-upgrade-mysql-errmsgredhat-upgrade-mysql-libsredhat-upgrade-mysql-libs-debuginforedhat-upgrade-mysql-serverredhat-upgrade-mysql-server-debuginforedhat-upgrade-mysql-testredhat-upgrade-mysql-test-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.