==========================================================================
Ubuntu Security Notice USN-3710-1
July 11, 2018
curl vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 18.04 LTS
– Ubuntu 17.10
Summary:
curl could be made to crash or run programs if it received specially
crafted network traffic.
Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries
Details:
Peter Wu discovered that curl incorrectly handled certain SMTP buffers. A
remote attacker could use this issue to cause curl to crash, resulting in a
denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
curl 7.58.0-2ubuntu3.2
libcurl3-gnutls 7.58.0-2ubuntu3.2
libcurl3-nss 7.58.0-2ubuntu3.2
libcurl4 7.58.0-2ubuntu3.2
Ubuntu 17.10:
curl 7.55.1-1ubuntu2.6
libcurl3 7.55.1-1ubuntu2.6
libcurl3-gnutls 7.55.1-1ubuntu2.6
libcurl3-nss 7.55.1-1ubuntu2.6
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3710-1
CVE-2018-0500
Package Information:
https://launchpad.net/ubuntu/+source/curl/7.58.0-2ubuntu3.2
https://launchpad.net/ubuntu/+source/curl/7.55.1-1ubuntu2.6
—–BEGIN PGP SIGNATURE—–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=v4zj
—–END PGP SIGNATURE—–
—