curl (7.47.0-1ubuntu2.12) xenial-security; urgency=medium
* SECURITY UPDATE: NTLM type-2 out-of-bounds buffer read
- debian/patches/CVE-2018-16890.patch: fix size check condition for
type2 received data in lib/curl_ntlm_msgs.c.
- CVE-2018-16890
* SECURITY UPDATE: NTLMv2 type-3 header stack buffer overflow
- debian/patches/CVE-2019-3822.patch: ix *_type3_message size check to
avoid buffer overflow in lib/curl_ntlm_msgs.c.
- CVE-2019-3822
* SECURITY UPDATE: SMTP end-of-response out-of-bounds read
- debian/patches/CVE-2019-3823.patch: avoid risk of buffer overflow in
strtol in lib/smtp.c.
- CVE-2019-3823
Date: 2019-01-29 19:04:40.127955+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
Signed-By: Ubuntu Archive Robot
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.12
Sorry, changesfile not available.
--
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/xenial-changes