[ubuntu/xenial-security] curl 7.47.0-1ubuntu2.12 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Wed Feb 6 14:00:46 UTC 2019
curl (7.47.0-1ubuntu2.12) xenial-security; urgency=medium
* SECURITY UPDATE: NTLM type-2 out-of-bounds buffer read
- debian/patches/CVE-2018-16890.patch: fix size check condition for
type2 received data in lib/curl_ntlm_msgs.c.
- CVE-2018-16890
* SECURITY UPDATE: NTLMv2 type-3 header stack buffer overflow
- debian/patches/CVE-2019-3822.patch: ix *_type3_message size check to
avoid buffer overflow in lib/curl_ntlm_msgs.c.
- CVE-2019-3822
* SECURITY UPDATE: SMTP end-of-response out-of-bounds read
- debian/patches/CVE-2019-3823.patch: avoid risk of buffer overflow in
strtol in lib/smtp.c.
- CVE-2019-3823
Date: 2019-01-29 19:04:40.127955+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.12
-------------- next part --------------
Sorry, changesfile not available.
More information about the Xenial-changes
mailing list