-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2573
                           curl security update
                               29 July 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           curl
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
Impact/Access:     Modify Arbitrary Files -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-8177  

Reference:         ESB-2020.2193
                   ESB-2020.2192

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2020/07/msg00025.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2295-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Thorsten Alteholz
July 28, 2020                                 https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : curl
Version        : 7.52.1-5+deb9u11
CVE ID         : CVE-2020-8177


A vulnerbailty was found in curl, a command line tool for transferring
data with URL syntax.

When using when using -J (--remote-header-name) and -i (--include) in
the same command line, a malicious server could force curl to overwrite
the contents of local files with incoming HTTP headers.


For Debian 9 stretch, this problem has been fixed in version
7.52.1-5+deb9u11.

We recommend that you upgrade your curl packages.

For the detailed security status of curl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/curl

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=pk/n
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXyDNrONLKJtyKPYoAQgHIg//d6or+nrjO1DgVqlYrsaLapUIrOkL8fMv
TY7tnTAhhFGDBzQIQa+RWhbWjmtwpjArPNk2v8GbVGIjYgRN30z4S0KuY/bRmDDu
nYf5LIvnQh7ZTWRT21wH7wfJqHAUiMZ7t4H2xwh5+Ah1/UebpDLGGgDcH5TZmWYN
55TgpDQQrmraLhyRwBg3I9JEd68Hib2zZvs564q9RYgJ2BuH1qHnoknqTNLCeiZ/
Gn2yNwAzBnGaBnw1JChxPewtsvIgRPQ5w6lmxi4hIZCV93oXm20hhurWQSu4aaVG
VQM38uzeeIX4fEIs9QHda47wusIbSZ3MuN7xMUsHWX++LeSV5vTfvXmkWd7UpoTV
vVSOuPDAm/wM8nQmTb7qmqbWQJ3/IPjgPso20EYPdKKIdZT3h22DtNwGO2/Rh01P
GMLr45CUzDbIWrhc7cnyxJOr5KK2l0n+n2941QNCBg0tCva4WgqQp/c/76fjc5gD
lKHmYIikYjppawwxuzhva53hk8DiN3zg2DWDe8l/kjr8zx1ibhkggAr2Ef8bIb6n
qNZi0ehJGBmUVI9+bQsWlMn/X1Py7aysPphpaZGIWm9SOloEE52dyrYgfd7j6u6L
prjnZJN+St74z5GQ1gYG2enAEwf7fVeMThS/D6BtYObAJKxSN0VB4VZE+D5AILN7
bdNaAihBtdA=
=7BlY
-----END PGP SIGNATURE-----