Mageia 2019-0337: curl security update
Summary
The updated packages fix security vulnerabilities:
An integer overflow in curl's URL API results in a buffer overflow
in libcurl 7.62.0 to and including 7.64.1. (CVE-2019-5435)
A heap buffer overflow in the TFTP receiving code allows for DoS or
arbitrary code execution in libcurl versions 7.19.4 through 7.64.1
(CVE-2019-5436).
Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to
7.65.3 (CVE-2019-5481).
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to
7.65.3 (CVE-2019-5482).
References
- https://bugs.mageia.org/show_bug.cgi?id=23789
- https://curl.se/changes.html
- https://curl.se/changes.html
- https://curl.se/docs/CVE-2019-5435.html
- https://curl.se/docs/CVE-2019-5436.html
- https://curl.se/docs/CVE-2019-5481.html
- https://curl.se/docs/CVE-2019-5482.html
- https://ubuntu.com/security/notices/USN-3993-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5435
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
Resolution
MGASA-2019-0337 - Updated curl packages fix security vulnerabilities
SRPMS
- 7/core/curl-7.66.0-1.mga7