-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : curl Version : 7.38.0-4+deb8u15 CVE ID : CVE-2019-5436 Debian Bug : 929351
cURL, an URL transfer library, contains a heap buffer overflow in the function tftp_receive_packet() that receives data from a TFTP server. It calls recvfrom() with the default size for the buffer rather than with the size that was used to allocate it. Thus, the content that might overwrite the heap memory is entirely controlled by the server. For Debian 8 "Jessie", this problem has been fixed in version 7.38.0-4+deb8u15. We recommend that you upgrade your curl packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAlzpuu1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeROixAAlONbcTnqeWJKucleanK7HD1z3Z8KB4/ZxyacVstvXiUSC2QohkMt1bQz H25RvincgnQhYsBaZjHpcMV5jttSkioBhnqkcTIrZI/Yxt8ASQuWu2A3tRT7YjmY 0kDWjLgmpStNR9heTtYWvGlMk9atwoX7gbBJ2GeaBm50W4SSwOLq6oU0LmIpncS1 b6olz+2TcX6xgcBzcNwgdg8WtXgQ36YFMzMnmaory2C56yU0bYgdmwicBKJpv3v+ MfWWk1sVfa98BNibDTcWGnpQLNyDlMFl81JS6UsqhHiuzTpmI+P+q5ZxAIu/351Q pr3WO+82lNue5ZbSJR/QVgmgWKfRm7N+BFPuDAILugE9uzm1S4jzkQ9zj9j6cEzW mUC6zizk8cHFSVifnQWLfI4hjedSgkElmt1joXtI3566qyWwvqAFcoCOJtmkFQAE dfvNs7Ahd1swVsQ/FWTqYIc/vKEZ7mVRHzaLXsja5A3CKjUuQrXpnfOTseR06ODi T6YRvcYaygG4w+0Eo/On8uYAapcc9Y64uKg3HsAHDBnFO+HCAjns8sQTuESdhNmL SLh48piIzzxSaVmfvN6PHvPODOWDlWjzA1hWwL/heSAGnd2RNoU9/D8NQhhHQjtC XOrbfmsaGCmFEUE8yswkN73ksyv29D4lBwOathVquFPlShMQ8QA= =C7ze -----END PGP SIGNATURE-----
