[USN-3993-2] curl vulnerability
Leonidas S. Barbosa
leo.barbosa at canonical.com
Wed May 22 16:51:33 UTC 2019
==========================================================================
Ubuntu Security Notice USN-3993-2
May 22, 2019
curl vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM
Summary:
curl could be made to crash if it received a specially crafted data.
Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries
Details:
USN-3993-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that curl incorrectly handled memory when receiving
data from a TFTP server. A remote attacker could use this issue to
cause curl to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2019-5436)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
curl 7.35.0-1ubuntu2.20+esm2
libcurl3 7.35.0-1ubuntu2.20+esm2
libcurl3-gnutls 7.35.0-1ubuntu2.20+esm2
libcurl3-nss 7.35.0-1ubuntu2.20+esm2
Ubuntu 12.04 ESM:
curl 7.22.0-3ubuntu4.26
libcurl3 7.22.0-3ubuntu4.26
libcurl3-gnutls 7.22.0-3ubuntu4.26
libcurl3-nss 7.22.0-3ubuntu4.26
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3993-2
https://usn.ubuntu.com/usn/usn-3993-1
CVE-2019-5436
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: This is a digitally signed message part
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20190522/903abaab/attachment-0001.sig>
More information about the ubuntu-security-announce
mailing list