[ubuntu/eoan-proposed] curl 7.65.3-1ubuntu3 (Accepted)

Alex Murray alex.murray at canonical.com
Wed Sep 11 12:12:13 UTC 2019


curl (7.65.3-1ubuntu3) eoan; urgency=medium

  * SECURITY UPDATE: double-free when using kerberos over FTP may cause
    denial-of-service
    - debian/patches/CVE-2019-5481.patch: update lib/security.c to avoid
      double-free on large memory allocation failures
    - CVE-2019-5481
  * SECURITY UPDATE: heap buffer overflow when receiving TFTP data may
    cause denial-of-service or remote code-execution
    - debian/patches/CVE-2019-5482.patch: ensure to use the correct block
      size when calling recvfrom() if the server returns an OACK without
      specifying a block size in lib/tftp.c
    - CVE-2019-5482

Date: Fri, 06 Sep 2019 14:52:01 +0930
Changed-By: Alex Murray <alex.murray at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/curl/7.65.3-1ubuntu3
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 06 Sep 2019 14:52:01 +0930
Source: curl
Architecture: source
Version: 7.65.3-1ubuntu3
Distribution: eoan
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Alex Murray <alex.murray at canonical.com>
Changes:
 curl (7.65.3-1ubuntu3) eoan; urgency=medium
 .
   * SECURITY UPDATE: double-free when using kerberos over FTP may cause
     denial-of-service
     - debian/patches/CVE-2019-5481.patch: update lib/security.c to avoid
       double-free on large memory allocation failures
     - CVE-2019-5481
   * SECURITY UPDATE: heap buffer overflow when receiving TFTP data may
     cause denial-of-service or remote code-execution
     - debian/patches/CVE-2019-5482.patch: ensure to use the correct block
       size when calling recvfrom() if the server returns an OACK without
       specifying a block size in lib/tftp.c
     - CVE-2019-5482
Checksums-Sha1:
 277a71bf3d6c5ae77a975718f03ad300a621b991 2709 curl_7.65.3-1ubuntu3.dsc
 ed91dbd70c0926ff97243b47068d454af7d4fe9b 30764 curl_7.65.3-1ubuntu3.debian.tar.xz
 dec84d260d0132733c9cd4b213edee895fc45633 8699 curl_7.65.3-1ubuntu3_source.buildinfo
Checksums-Sha256:
 cb62f24f9cda19bdcb719e5edcf92f64a6ed2b2fbe706b75585eeeb6fbfa6968 2709 curl_7.65.3-1ubuntu3.dsc
 4cc76896389aeda3f4a7d27edcc526cd9c944cd42c7d14fd7f95dd21973cf827 30764 curl_7.65.3-1ubuntu3.debian.tar.xz
 b329d3d391506225c8c9132663922176f13f28041dddfc62b50af45bdb557f23 8699 curl_7.65.3-1ubuntu3_source.buildinfo
Files:
 6f2441471103bbff62de186db469ffb8 2709 web optional curl_7.65.3-1ubuntu3.dsc
 0e9747d07e70ab8dce7db59630ee5c4c 30764 web optional curl_7.65.3-1ubuntu3.debian.tar.xz
 f59808c0d2e7145a0d9da40a125628b5 8699 web optional curl_7.65.3-1ubuntu3_source.buildinfo
Original-Maintainer: Alessandro Ghedini <ghedo at debian.org>

-----BEGIN PGP SIGNATURE-----
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=R+fW
-----END PGP SIGNATURE-----


More information about the Eoan-changes mailing list