==========================================================================
Ubuntu Security Notice USN-2399-1
November 10, 2014
curl vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS
Summary:
curl could expose sensitive information over the network.
Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries
Details:
Symeon Paraschoudis discovered that curl incorrectly handled memory when
being used with CURLOPT_COPYPOSTFIELDS and curl_easy_duphandle(). This may
result in sensitive data being incorrectly sent to the remote server.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.10:
libcurl3 7.37.1-1ubuntu3.1
libcurl3-gnutls 7.37.1-1ubuntu3.1
libcurl3-nss 7.37.1-1ubuntu3.1
Ubuntu 14.04 LTS:
libcurl3 7.35.0-1ubuntu2.2
libcurl3-gnutls 7.35.0-1ubuntu2.2
libcurl3-nss 7.35.0-1ubuntu2.2
Ubuntu 12.04 LTS:
libcurl3 7.22.0-3ubuntu4.11
libcurl3-gnutls 7.22.0-3ubuntu4.11
libcurl3-nss 7.22.0-3ubuntu4.11
Ubuntu 10.04 LTS:
libcurl3 7.19.7-1ubuntu1.10
libcurl3-gnutls 7.19.7-1ubuntu1.10
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2399-1
CVE-2014-3707
Package Information:
https://launchpad.net/ubuntu/+source/curl/7.37.1-1ubuntu3.1
https://launchpad.net/ubuntu/+source/curl/7.35.0-1ubuntu2.2
https://launchpad.net/ubuntu/+source/curl/7.22.0-3ubuntu4.11
https://launchpad.net/ubuntu/+source/curl/7.19.7-1ubuntu1.10
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=VhMK
—–END PGP SIGNATURE—–
—