{"id":"JLSEC-2025-24","summary":"curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow ...","details":"curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.","modified":"2025-11-03T00:18:52.362990Z","published":"2025-10-10T15:04:01.319Z","upstream":["CVE-2020-8285"],"database_specific":{"license":"CC-BY-4.0","sources":[{"imported":"2025-10-10T14:33:22.313Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8285","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2020-8285","id":"CVE-2020-8285","modified":"2024-11-21T05:38:39.410Z","published":"2020-12-14T20:15:13.983Z"}]},"references":[{"type":"WEB","url":"http://seclists.org/fulldisclosure/2021/Apr/51"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"type":"WEB","url":"https://curl.se/docs/CVE-2020-8285.html"},{"type":"WEB","url":"https://github.com/curl/curl/issues/6255"},{"type":"WEB","url":"https://hackerone.com/reports/1045844"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202012-14"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20210122-0007/"},{"type":"WEB","url":"https://support.apple.com/kb/HT212325"},{"type":"WEB","url":"https://support.apple.com/kb/HT212326"},{"type":"WEB","url":"https://support.apple.com/kb/HT212327"},{"type":"WEB","url":"https://www.debian.org/security/2021/dsa-4881"},{"type":"WEB","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujan2022.html"}],"affected":[{"package":{"name":"LibCURL_jll","ecosystem":"Julia","purl":"pkg:julia/LibCURL_jll?uuid=deac9b47-8bc7-5906-a0fe-35ac56dc84c0"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"7.81.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-24.json"}}],"schema_version":"1.7.3"}