Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.1874 [DLA 1804-1] curl security update 27 May 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: curl Publisher: Debian Operating System: Debian GNU/Linux 8 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-5436 Reference: ESB-2019.1837 Original Bulletin: https://lists.debian.org/debian-lts-announce/2019/05/msg00036.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : curl Version : 7.38.0-4+deb8u15 CVE ID : CVE-2019-5436 Debian Bug : 929351 cURL, an URL transfer library, contains a heap buffer overflow in the function tftp_receive_packet() that receives data from a TFTP server. It calls recvfrom() with the default size for the buffer rather than with the size that was used to allocate it. Thus, the content that might overwrite the heap memory is entirely controlled by the server. For Debian 8 "Jessie", this problem has been fixed in version 7.38.0-4+deb8u15. We recommend that you upgrade your curl packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAlzpuu1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeROixAAlONbcTnqeWJKucleanK7HD1z3Z8KB4/ZxyacVstvXiUSC2QohkMt1bQz H25RvincgnQhYsBaZjHpcMV5jttSkioBhnqkcTIrZI/Yxt8ASQuWu2A3tRT7YjmY 0kDWjLgmpStNR9heTtYWvGlMk9atwoX7gbBJ2GeaBm50W4SSwOLq6oU0LmIpncS1 b6olz+2TcX6xgcBzcNwgdg8WtXgQ36YFMzMnmaory2C56yU0bYgdmwicBKJpv3v+ MfWWk1sVfa98BNibDTcWGnpQLNyDlMFl81JS6UsqhHiuzTpmI+P+q5ZxAIu/351Q pr3WO+82lNue5ZbSJR/QVgmgWKfRm7N+BFPuDAILugE9uzm1S4jzkQ9zj9j6cEzW mUC6zizk8cHFSVifnQWLfI4hjedSgkElmt1joXtI3566qyWwvqAFcoCOJtmkFQAE dfvNs7Ahd1swVsQ/FWTqYIc/vKEZ7mVRHzaLXsja5A3CKjUuQrXpnfOTseR06ODi T6YRvcYaygG4w+0Eo/On8uYAapcc9Y64uKg3HsAHDBnFO+HCAjns8sQTuESdhNmL SLh48piIzzxSaVmfvN6PHvPODOWDlWjzA1hWwL/heSAGnd2RNoU9/D8NQhhHQjtC XOrbfmsaGCmFEUE8yswkN73ksyv29D4lBwOathVquFPlShMQ8QA= =C7ze - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXOssZ2aOgq3Tt24GAQi6Zg//Xk12JtJRT7dpxWlh7eGsw41MWrtQi7vY rO1q0ZZktHO+QbYA/n+FLf+LtFRpdqNy8ufVJ7c+uetrxAJsRq9CyfvkkPWZcX5e 3rwiwn9osYCtJxvA0I0GSEbEIoYVcZoiJFbnYOCvCBNRcvj6U+R0WiFFjRyxdVYn ma0YJwh9/i2HrPYYcy3NPY9l/q2YMrBL3GB/G1iES2EVMGoYN4zJDyAwgHqYdkZI g6ytZQ8pOxSVM+rQIbSuDwT0DPwE6sYT2npF+/SuVj5bvBZgF/byYDs2GVgYbVK5 vGMeeYS8EK5/1pf7HVefgHxkSyjJK0lFAw8f4T4+4VlatZrJ/+eVr+kj/W+LIphc sibFf4pKzPqZX/j6VII+fy+o6BR2RD15nNjcn5Yp3xzCkm9hqQkx9KU9EPre+N9A Ztbwq59bdExCxZv3yB4+lfnn36hVed1WvYhzXPt4TbdhCtzrfEqAYnGvTdwMDlBA EbLSwC4GlbPHmLqcvKGvQxvv8ifTM9fJntLTJTcZPYu452Y0mH3Sq8B8trf4JTJa lLVY1YuFGi4EX2ta65gbZJua8WMVY7wPt1Tx+jWlDNoXnikhuVv0WaJZBOvZBbv+ 2GKrix/H3pph7kq5Gm+JNmNwTBy7P6Rbsof8v7liLdj3BxLpkTuO9asiV1O//9Lk imoAzFsW93I= =GE66 -----END PGP SIGNATURE-----