Package        : curl
Version        : 7.38.0-4+deb8u15
CVE ID         : CVE-2019-5436
Debian Bug     : 929351

cURL, an URL transfer library, contains a heap buffer overflow in the
function tftp_receive_packet() that receives data from a TFTP server.
It calls recvfrom() with the default size for the buffer rather than
with the size that was used to allocate it. Thus, the content that
might overwrite the heap memory is entirely controlled by the server.

For Debian 8 "Jessie", this problem has been fixed in version
7.38.0-4+deb8u15.

We recommend that you upgrade your curl packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-1804-1: curl security update

May 25, 2019
cURL, an URL transfer library, contains a heap buffer overflow in the function tftp_receive_packet() that receives data from a TFTP server

Summary

We recommend that you upgrade your curl packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : curl
Version : 7.38.0-4+deb8u15
CVE ID : CVE-2019-5436
Debian Bug : 929351

Related News