Debian: DSA-4633-1: curl security update

    Date 24 Feb 2020
    803
    Posted By LinuxSecurity Advisories
    Multiple vulnerabilities were discovered in cURL, an URL transfer library. CVE-2019-5436
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4633-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                       Alessandro Ghedini
    February 22, 2020                     https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : curl
    CVE ID         : CVE-2019-5436 CVE-2019-5481 CVE-2019-5482
    Debian Bug     : 929351 940009 940010
    
    Multiple vulnerabilities were discovered in cURL, an URL transfer
    library.
    
    CVE-2019-5436
    
        A heap buffer overflow in the TFTP receiving code was discovered,
        which could allow DoS or arbitrary code execution. This only affects
        the oldstable distribution (stretch).
    
    CVE-2019-5481
    
        Thomas Vegas discovered a double-free in the FTP-KRB code, triggered
        by a malicious server sending a very large data block.
    
    CVE-2019-5482
    
        Thomas Vegas discovered a heap buffer overflow that could be
        triggered when a small non-default TFTP blocksize is used.
    
    For the oldstable distribution (stretch), these problems have been fixed
    in version 7.52.1-5+deb9u10.
    
    For the stable distribution (buster), these problems have been fixed in
    version 7.64.0-4+deb10u1.
    
    We recommend that you upgrade your curl packages.
    
    For the detailed security status of curl please refer to
    its security tracker page at:
    https://security-tracker.debian.org/tracker/curl
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    Are you considering making the switch to Purism's new Librem 14 Linux laptop to improve your security and privacy online?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/31-are-you-considering-making-the-switch-to-purism-s-new-librem-14-linux-laptop-to-improve-your-security-and-privacy-online?task=poll.vote&format=json
    31
    radio
    [{"id":"109","title":"Yes - the hardware kill switches and default ad blocking\/tracking protection sold me on it.","votes":"2","type":"x","order":"1","pct":40,"resources":[]},{"id":"110","title":"Not sure yet - I need to do more research.","votes":"2","type":"x","order":"2","pct":40,"resources":[]},{"id":"111","title":"No - I'm satisfied with my current laptop and have no security\/privacy concerns.","votes":"1","type":"x","order":"3","pct":20,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.