This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============2942558287171235492==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”sdw6Dc6CTd5gpqoyAjPeKzfm0fW2CjtN4″
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–sdw6Dc6CTd5gpqoyAjPeKzfm0fW2CjtN4
Content-Type: multipart/mixed; boundary=”gBHm8dS5GGnlqrHvTId6EnhoAydUiv353″;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3710-1] curl vulnerability
–gBHm8dS5GGnlqrHvTId6EnhoAydUiv353
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3710-1
July 11, 2018
curl vulnerability
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 18.04 LTS
– Ubuntu 17.10
Summary:
curl could be made to crash or run programs if it received specially
crafted network traffic.
Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries
Details:
Peter Wu discovered that curl incorrectly handled certain SMTP buffers. A=
remote attacker could use this issue to cause curl to crash, resulting in=
a
denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
curl 7.58.0-2ubuntu3.2
libcurl3-gnutls 7.58.0-2ubuntu3.2
libcurl3-nss 7.58.0-2ubuntu3.2
libcurl4 7.58.0-2ubuntu3.2
Ubuntu 17.10:
curl 7.55.1-1ubuntu2.6
libcurl3 7.55.1-1ubuntu2.6
libcurl3-gnutls 7.55.1-1ubuntu2.6
libcurl3-nss 7.55.1-1ubuntu2.6
In general, a standard system update will make all the necessary changes.=
References:
https://usn.ubuntu.com/usn/usn-3710-1
CVE-2018-0500
Package Information:
https://launchpad.net/ubuntu/+source/curl/7.58.0-2ubuntu3.2
https://launchpad.net/ubuntu/+source/curl/7.55.1-1ubuntu2.6
–gBHm8dS5GGnlqrHvTId6EnhoAydUiv353–
–sdw6Dc6CTd5gpqoyAjPeKzfm0fW2CjtN4
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”
—–BEGIN PGP SIGNATURE—–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=v4zj
—–END PGP SIGNATURE—–
–sdw6Dc6CTd5gpqoyAjPeKzfm0fW2CjtN4–
–===============2942558287171235492==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK
–===============2942558287171235492==–