Gentoo Linux Security Advisory 201401-14 - Multiple vulnerabilities have been found in cURL, allowing attackers to execute arbitrary code or cause Denial of Service. Versions less than 7.34.0-r1 are affected.
db468e099ee0183090e4d1c7e60955a697fc5a4848c7ebb9fdb2c66ab4bb731a
Ubuntu Security Notice 1721-1 - It was discovered that curl incorrectly handled SASL authentication when communicating over POP3, SMTP or IMAP. If a user or automated system were tricked into processing a specially crafted URL, an attacker could cause a denial of service, or possibly execute arbitrary code. The default compiler options for affected releases should reduce the vulnerability to a denial of service.
5c1cbb3fe110f501487f14349e4958602952e65e336140f73fe48aeaeae0b7cf
Slackware Security Advisory - New curl packages are available for Slackware 14.0, and -current to fix a security issue.
696a080413a6978708b3fc3c1b210299b3d1debab8e6a328990522b96fac0c2a
A remotely exploitable buffer overflow vulnerability was discovered in the libcurl POP3 and SMTP protocol handlers. Proper exploitation can allow for arbitrary code execution.
8301b167f691755d2779432656ccab76e908343bbdfa0eb41f5123856c8be321