[USN-3805-1] curl vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”KsPDB7v0lbdRfYayQGaxPq0epPxU57iF2″

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–KsPDB7v0lbdRfYayQGaxPq0epPxU57iF2

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3805-1] curl vulnerabilities

–6OiS4KaXfHtBgKvICJPOzS4MuGsqvr8en

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3805-1
October 31, 2018

curl vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in curl.

Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries

Details:

Harry Sintonen discovered that curl incorrectly handled SASL
authentication. A remote attacker could use this issue to cause curl to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2018-16839)

Brian Carpenter discovered that curl incorrectly handled memory when
closing certain handles. A remote attacker could use this issue to cause
curl to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2018-16840)

Brian Carpenter discovered that the curl command-line tool incorrectly
handled error messages. A remote attacker could possibly use this issue t=
o
obtain sensitive information. (CVE-2018-16842)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
curl 7.61.0-1ubuntu2.2
libcurl3-gnutls 7.61.0-1ubuntu2.2
libcurl3-nss 7.61.0-1ubuntu2.2
libcurl4 7.61.0-1ubuntu2.2

Ubuntu 18.04 LTS:
curl 7.58.0-2ubuntu3.5
libcurl3-gnutls 7.58.0-2ubuntu3.5
libcurl3-nss 7.58.0-2ubuntu3.5
libcurl4 7.58.0-2ubuntu3.5

Ubuntu 16.04 LTS:
curl 7.47.0-1ubuntu2.11
libcurl3 7.47.0-1ubuntu2.11
libcurl3-gnutls 7.47.0-1ubuntu2.11
libcurl3-nss 7.47.0-1ubuntu2.11

Ubuntu 14.04 LTS:
curl 7.35.0-1ubuntu2.19
libcurl3 7.35.0-1ubuntu2.19
libcurl3-gnutls 7.35.0-1ubuntu2.19
libcurl3-nss 7.35.0-1ubuntu2.19

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3805-1
CVE-2018-16839, CVE-2018-16840, CVE-2018-16842

Package Information:
https://launchpad.net/ubuntu/+source/curl/7.61.0-1ubuntu2.2
https://launchpad.net/ubuntu/+source/curl/7.58.0-2ubuntu3.5
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.11
https://launchpad.net/ubuntu/+source/curl/7.35.0-1ubuntu2.19

–6OiS4KaXfHtBgKvICJPOzS4MuGsqvr8en–

–KsPDB7v0lbdRfYayQGaxPq0epPxU57iF2

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAlvZq00ACgkQZWnYVadE
vpMLlA/9HLCmpns1DM3hS7gXMTrwCY1wh2uyPJm8JK/443RqB3O45V5WYBv6/tzW
WdM6syDiQd/uIRTiUQoh1IP/neGXgFnAHBO++mOOjoZuLoFgu7AEUoWa8Lrx8cpA
QZLZTFfCq2RL4iCYu3I7iUdhd7DUpv3J0AIkSQuu8dO46+1ONoayVdrowTdPGCbx
URpvgBaImaSUeiQz4UMZdWwaYkj1mLW+V4EjWg62nsLpqjp9NhgbNWyMBQQQ0REE
9hgiLCjd1iOORqLvPQW/DlQTveH1iCocqG5fg93CrIMunp8mGiyebZjeoHd3ZwWY
HD9iBSdbzv8cCfJPtf1T2Ki08fErVtACsZOM7tImgRda6M1Dyj4zlgOUIGrKQEJD
tBamXopu96w/Sg18lAwXyroUofQ+KH454ICivLbGjS4KFFqjGi2yoK9zhOi/Xh85
CYORhwt25XPHTovzLxpd8BJHN/62nDzfw0+ipl8a1icGSA68Q4u9591zqjia6Y0k
uPj9YISD4I8edgQ/xZP6u3rekI4zanlfNQwx+lz+FuIFQqd9axdScuqK4Y2eBRgO
tO/J63Ys6AZoOMNpauREqsfzGyKlZEMzwrdy10HKw5+Rt5i+w0o7EBGZ9ibbzkcN
i42qZ4dFA7wFPtBkhB8PGEUY5OGhI7+4jTguSYh8viDPps6IDI8=
=fLBw
—–END PGP SIGNATURE—–

–KsPDB7v0lbdRfYayQGaxPq0epPxU57iF2–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK