[USN-3648-1] curl vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============5313193841382253780==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”sU5tJg8eYwGNQ0B9uRFuUjLnkBBUmpP5k”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–sU5tJg8eYwGNQ0B9uRFuUjLnkBBUmpP5k
Content-Type: multipart/mixed; boundary=”SZpuFrlrbGOB9BEeIeytlkw9FWyzAO8Ry”;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3648-1] curl vulnerabilities

–SZpuFrlrbGOB9BEeIeytlkw9FWyzAO8Ry
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3648-1
May 16, 2018

curl vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in curl.

Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries

Details:

Dario Weisser discovered that curl incorrectly handled long FTP server
command replies. If a user or automated system were tricked into connecti=
ng
to a malicious FTP server, a remote attacker could use this issue to caus=
e
curl to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 17.10 and Ubuntu 18.04 LT=
S.
(CVE-2018-1000300)

Max Dymond discovered that curl incorrectly handled certain RTSP response=
s.
If a user or automated system were tricked into connecting to a malicious=

server, a remote attacker could use this issue to cause curl to crash,
resulting in a denial of service, or possibly obtain sensitive informatio=
n.
(CVE-2018-1000301)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
curl 7.58.0-2ubuntu3.1
libcurl3-gnutls 7.58.0-2ubuntu3.1
libcurl3-nss 7.58.0-2ubuntu3.1
libcurl4 7.58.0-2ubuntu3.1

Ubuntu 17.10:
curl 7.55.1-1ubuntu2.5
libcurl3 7.55.1-1ubuntu2.5
libcurl3-gnutls 7.55.1-1ubuntu2.5
libcurl3-nss 7.55.1-1ubuntu2.5

Ubuntu 16.04 LTS:
curl 7.47.0-1ubuntu2.8
libcurl3 7.47.0-1ubuntu2.8
libcurl3-gnutls 7.47.0-1ubuntu2.8
libcurl3-nss 7.47.0-1ubuntu2.8

Ubuntu 14.04 LTS:
curl 7.35.0-1ubuntu2.16
libcurl3 7.35.0-1ubuntu2.16
libcurl3-gnutls 7.35.0-1ubuntu2.16
libcurl3-nss 7.35.0-1ubuntu2.16

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3648-1
CVE-2018-1000300, CVE-2018-1000301, CVE-2018-1000303

Package Information:
https://launchpad.net/ubuntu/+source/curl/7.58.0-2ubuntu3.1
https://launchpad.net/ubuntu/+source/curl/7.55.1-1ubuntu2.5
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.8
https://launchpad.net/ubuntu/+source/curl/7.35.0-1ubuntu2.16

–SZpuFrlrbGOB9BEeIeytlkw9FWyzAO8Ry–

–sU5tJg8eYwGNQ0B9uRFuUjLnkBBUmpP5k
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=XZwr
—–END PGP SIGNATURE—–

–sU5tJg8eYwGNQ0B9uRFuUjLnkBBUmpP5k–

–===============5313193841382253780==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============5313193841382253780==–