[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1804-1] curl security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : curl
Version        : 7.38.0-4+deb8u15
CVE ID         : CVE-2019-5436
Debian Bug     : 929351

cURL, an URL transfer library, contains a heap buffer overflow in the
function tftp_receive_packet() that receives data from a TFTP server.
It calls recvfrom() with the default size for the buffer rather than
with the size that was used to allocate it. Thus, the content that
might overwrite the heap memory is entirely controlled by the server.

For Debian 8 "Jessie", this problem has been fixed in version
7.38.0-4+deb8u15.

We recommend that you upgrade your curl packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAlzpuu1fFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD
RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7
UeROixAAlONbcTnqeWJKucleanK7HD1z3Z8KB4/ZxyacVstvXiUSC2QohkMt1bQz
H25RvincgnQhYsBaZjHpcMV5jttSkioBhnqkcTIrZI/Yxt8ASQuWu2A3tRT7YjmY
0kDWjLgmpStNR9heTtYWvGlMk9atwoX7gbBJ2GeaBm50W4SSwOLq6oU0LmIpncS1
b6olz+2TcX6xgcBzcNwgdg8WtXgQ36YFMzMnmaory2C56yU0bYgdmwicBKJpv3v+
MfWWk1sVfa98BNibDTcWGnpQLNyDlMFl81JS6UsqhHiuzTpmI+P+q5ZxAIu/351Q
pr3WO+82lNue5ZbSJR/QVgmgWKfRm7N+BFPuDAILugE9uzm1S4jzkQ9zj9j6cEzW
mUC6zizk8cHFSVifnQWLfI4hjedSgkElmt1joXtI3566qyWwvqAFcoCOJtmkFQAE
dfvNs7Ahd1swVsQ/FWTqYIc/vKEZ7mVRHzaLXsja5A3CKjUuQrXpnfOTseR06ODi
T6YRvcYaygG4w+0Eo/On8uYAapcc9Y64uKg3HsAHDBnFO+HCAjns8sQTuESdhNmL
SLh48piIzzxSaVmfvN6PHvPODOWDlWjzA1hWwL/heSAGnd2RNoU9/D8NQhhHQjtC
XOrbfmsaGCmFEUE8yswkN73ksyv29D4lBwOathVquFPlShMQ8QA=
=C7ze
-----END PGP SIGNATURE-----


Reply to: