==========================================================================
Ubuntu Security Notice USN-3048-1
August 08, 2016
curl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in curl.
Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries
Details:
Bru Rom discovered that curl incorrectly handled client certificates when
resuming a TLS session. (CVE-2016-5419)
It was discovered that curl incorrectly handled client certificates when
reusing TLS connections. (CVE-2016-5420)
Marcelo Echeverria and Fernando Muñoz discovered that curl incorrectly
reused a connection struct, contrary to expectations. This issue only
applied to Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-5421)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
libcurl3 7.47.0-1ubuntu2.1
libcurl3-gnutls 7.47.0-1ubuntu2.1
libcurl3-nss 7.47.0-1ubuntu2.1
Ubuntu 14.04 LTS:
libcurl3 7.35.0-1ubuntu2.8
libcurl3-gnutls 7.35.0-1ubuntu2.8
libcurl3-nss 7.35.0-1ubuntu2.8
Ubuntu 12.04 LTS:
libcurl3 7.22.0-3ubuntu4.16
libcurl3-gnutls 7.22.0-3ubuntu4.16
libcurl3-nss 7.22.0-3ubuntu4.16
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3048-1
CVE-2016-5419, CVE-2016-5420, CVE-2016-5421
Package Information:
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.1
https://launchpad.net/ubuntu/+source/curl/7.35.0-1ubuntu2.8
https://launchpad.net/ubuntu/+source/curl/7.22.0-3ubuntu4.16
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=ACsy
—–END PGP SIGNATURE—–
—