USN-3993-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that curl incorrectly handled memory when receiving data
from a TFTP server. A remote attacker could use this issue to cause curl to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2019-5436)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.04 | noarch | libcurl3-gnutls | < 7.35.0-1ubuntu2.20+esm2 | UNKNOWN |
Ubuntu | 14.04 | noarch | curl | < 7.35.0-1ubuntu2.20 | UNKNOWN |
Ubuntu | 14.04 | noarch | curl-dbgsym | < 7.35.0-1ubuntu2.20 | UNKNOWN |
Ubuntu | 14.04 | noarch | curl-udeb | < 7.35.0-1ubuntu2.20 | UNKNOWN |
Ubuntu | 14.04 | noarch | curl-udeb-dbgsym | < 7.35.0-1ubuntu2.20 | UNKNOWN |
Ubuntu | 14.04 | noarch | libcurl3 | < 7.35.0-1ubuntu2.20 | UNKNOWN |
Ubuntu | 14.04 | noarch | libcurl3-dbg | < 7.35.0-1ubuntu2.20 | UNKNOWN |
Ubuntu | 14.04 | noarch | libcurl3-dbgsym | < 7.35.0-1ubuntu2.20 | UNKNOWN |
Ubuntu | 14.04 | noarch | libcurl3-gnutls | < 7.35.0-1ubuntu2.20 | UNKNOWN |
Ubuntu | 14.04 | noarch | libcurl3-gnutls-dbgsym | < 7.35.0-1ubuntu2.20 | UNKNOWN |