I see that Ubuntu 16.04 LTS have version 7.47.0 [1]. Its been 9 months, 9 releases and at least 15 CVEs since then. I can also see that some of the CVEs was reported to distros@openwall [2]. I (naively) assumed that once this was reported, the package maintainers would update the packages, push a release at the same time as the original developer made a public statement. Then I could just update my system and be done with it.<p>Where is the fault in this chain? How can I as a maintainer of a few servers be sure my servers are secure without manually patching every package?<p>[1] <a href="http://packages.ubuntu.com/xenial/libcurl3" rel="nofollow">http://packages.ubuntu.com/xenial/libcurl3</a>
[2] <a href="http://oss-security.openwall.org/wiki/mailing-lists/distros" rel="nofollow">http://oss-security.openwall.org/wiki/mailing-lists/distros</a><p>EDIT: changed "12 CVEs" to "at least 15 CVEs". The changelog don't have CVE-numbers in the title for all of them.