USN-4129-2: curl vulnerability
12 September 2019
curl could be made to crash or possibly execute arbitrary code if it incorrectly handled memory during TFTP transfers.
Releases
Packages
- curl - HTTP, HTTPS, and FTP client and client libraries
Details
USN-4129-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM and 14.04 ESM.
Original advisory details:
Thomas Vegas discovered that curl incorrectly handled memory during TFTP
transfers. A remote attacker could use this issue to crash curl, resulting
in a denial of service, or possibly execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
-
libcurl3-gnutls
-
7.35.0-1ubuntu2.20+esm3
-
libcurl3-nss
-
7.35.0-1ubuntu2.20+esm3
-
libcurl3
-
7.35.0-1ubuntu2.20+esm3
-
curl
-
7.35.0-1ubuntu2.20+esm3
Ubuntu 12.04
-
libcurl3-gnutls
-
7.22.0-3ubuntu4.27
-
libcurl3-nss
-
7.22.0-3ubuntu4.27
-
libcurl3
-
7.22.0-3ubuntu4.27
-
curl
-
7.22.0-3ubuntu4.27
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4129-1: libcurl4-doc, libcurl4-nss-dev, libcurl4-openssl-dev, libcurl3, libcurl3-gnutls, libcurl3-nss, libcurl4, libcurl4-gnutls-dev, curl