MGASA-2019-0337

Source
https://advisories.mageia.org/MGASA-2019-0337.html
Import Source
https://advisories.mageia.org/MGASA-2019-0337.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0337
Related
Published
2019-11-30T13:06:06Z
Modified
2019-11-30T12:34:03Z
Summary
Updated curl packages fix security vulnerabilities
Details

The updated packages fix security vulnerabilities:

An integer overflow in curl's URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1. (CVE-2019-5435)

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1 (CVE-2019-5436).

Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3 (CVE-2019-5481).

Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3 (CVE-2019-5482).

References
Credits

Affected packages

Mageia:7 / curl

Package

Name
curl
Purl
pkg:rpm/mageia/curl?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.66.0-1.mga7

Ecosystem specific

{
    "section": "core"
}