UbuntuUpdates.org

Bugs fixes in "curl"

Origin Bug number Title Date fixed
CVE CVE-2019-3822 curl: NTLMv2 type-3 header stack buffer overflow 2019-02-06
CVE CVE-2018-16890 curl: NTLM type-2 out-of-bounds buffer read 2019-02-06
CVE CVE-2019-3823 curl: SMTP end-of-response out-of-bounds read 2019-02-06
CVE CVE-2019-3823 curl: SMTP end-of-response out-of-bounds read 2019-02-06
CVE CVE-2019-3823 curl: SMTP end-of-response out-of-bounds read 2019-02-06
CVE CVE-2019-3822 curl: NTLMv2 type-3 header stack buffer overflow 2019-02-06
CVE CVE-2018-16890 curl: NTLM type-2 out-of-bounds buffer read 2019-02-06
CVE CVE-2019-3823 curl: SMTP end-of-response out-of-bounds read 2019-02-06
CVE CVE-2019-3822 curl: NTLMv2 type-3 header stack buffer overflow 2019-02-06
CVE CVE-2018-16890 curl: NTLM type-2 out-of-bounds buffer read 2019-02-06
CVE CVE-2019-3823 curl: SMTP end-of-response out-of-bounds read 2019-02-06
CVE CVE-2019-3822 curl: NTLMv2 type-3 header stack buffer overflow 2019-02-06
CVE CVE-2018-16890 curl: NTLM type-2 out-of-bounds buffer read 2019-02-06
CVE CVE-2018-16839 SASL password overflow via integer overflow 2018-10-31
CVE CVE-2018-16839 SASL password overflow via integer overflow 2018-10-31
CVE CVE-2018-16839 SASL password overflow via integer overflow 2018-10-31
CVE CVE-2018-16839 SASL password overflow via integer overflow 2018-10-31
CVE CVE-2018-16839 SASL password overflow via integer overflow 2018-10-31
CVE CVE-2018-16839 SASL password overflow via integer overflow 2018-10-31
CVE CVE-2018-14618 curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multipl 2018-09-17



About   -   Send Feedback to @ubuntu_updates