Description
A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1804-1 | curl security update |
Debian DSA |
DSA-4633-1 | curl security update |
Ubuntu USN |
USN-3993-1 | curl vulnerabilities |
Ubuntu USN |
USN-3993-2 | curl vulnerability |
References
History
Wed, 15 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
F5
Subscribe
Traffix Signaling Delivery Controller
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Haxx
Subscribe
Libcurl
Subscribe
Netapp
Subscribe
Hci Management Node
Subscribe
Solidfire
Subscribe
Steelstore Cloud Integrated Storage
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Oracle
Subscribe
Enterprise Manager Ops Center
Subscribe
Mysql Server
Subscribe
Oss Support Tools
Subscribe
Redhat
Subscribe
Ansible Tower
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Rhel Eus
Subscribe
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2026-04-15T20:51:25.334Z
Reserved: 2019-01-04T00:00:00.000Z
Link: CVE-2019-5436
Updated: 2024-08-04T19:54:53.472Z
Status : Modified
Published: 2019-05-28T19:29:06.127
Modified: 2026-04-15T21:17:01.457
Link: CVE-2019-5436
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN