-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3320
                           curl security update
                             28 September 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           curl
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
Impact/Access:     Access Confidential Data -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-8231  

Reference:         ESB-2020.3016
                   ESB-2020.2869
                   ESB-2020.2865

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2020/09/msg00020.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2382-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Thorsten Alteholz
September 26, 2020                            https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : curl
Version        : 7.52.1-5+deb9u12
CVE ID         : CVE-2020-8231


An issue has been found in curl, a command line tool for transferring data 
with URL syntax.
In rare circumstances, when using the multi API of curl in combination 
with CURLOPT_CONNECT_ONLY, the wrong connection  might be used when 
transfering data later.


For Debian 9 stretch, this problem has been fixed in version
7.52.1-5+deb9u12.

We recommend that you upgrade your curl packages.

For the detailed security status of curl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/curl

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=0t6E
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=kX76
-----END PGP SIGNATURE-----