[USN-6429-2] curl vulnerability

Leonidas S. Barbosa leo.barbosa at canonical.com
Wed Oct 11 17:02:54 UTC 2023


==========================================================================
Ubuntu Security Notice USN-6429-2
October 11, 2023

curl vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in curl.

Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries

Details:

USN-6429-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS
and Ubuntu 18.04 LTS.

Original advisory details:

 It was discovered that curl incorrectly handled cookies when an application
 duplicated certain handles. A local attacker could possibly create a cookie
 file and inject arbitrary cookies into subsequent connections.
 (CVE-2023-38546)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  curl                            7.58.0-2ubuntu3.24+esm2
  libcurl3-gnutls                 7.58.0-2ubuntu3.24+esm2
  libcurl3-nss                    7.58.0-2ubuntu3.24+esm2
  libcurl4                        7.58.0-2ubuntu3.24+esm2

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  curl                            7.47.0-1ubuntu2.19+esm10
  libcurl3                        7.47.0-1ubuntu2.19+esm10
  libcurl3-gnutls                 7.47.0-1ubuntu2.19+esm10
  libcurl3-nss                    7.47.0-1ubuntu2.19+esm10

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
  curl                            7.35.0-1ubuntu2.20+esm17
  libcurl3                        7.35.0-1ubuntu2.20+esm17
  libcurl3-gnutls                 7.35.0-1ubuntu2.20+esm17
  libcurl3-nss                    7.35.0-1ubuntu2.20+esm17

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6429-2
  https://ubuntu.com/security/notices/USN-6429-1
  CVE-2023-38546

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20231011/a717afd0/attachment.sig>


More information about the ubuntu-security-announce mailing list