You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa curl

Sigurnosni nedostaci programskog paketa curl

==========================================================================
Ubuntu Security Notice USN-3993-1
May 22, 2019

curl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.04
– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in curl.

Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries

Details:

Wenchao Li discovered that curl incorrectly handled memory in the
curl_url_set() function. A remote attacker could use this issue to cause
curl to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 19.04. (CVE-2019-5435)

It was discovered that curl incorrectly handled memory when receiving data
from a TFTP server. A remote attacker could use this issue to cause curl to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2019-5436)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
curl 7.64.0-2ubuntu1.1
libcurl3-gnutls 7.64.0-2ubuntu1.1
libcurl3-nss 7.64.0-2ubuntu1.1
libcurl4 7.64.0-2ubuntu1.1

Ubuntu 18.10:
curl 7.61.0-1ubuntu2.4
libcurl3-gnutls 7.61.0-1ubuntu2.4
libcurl3-nss 7.61.0-1ubuntu2.4
libcurl4 7.61.0-1ubuntu2.4

Ubuntu 18.04 LTS:
curl 7.58.0-2ubuntu3.7
libcurl3-gnutls 7.58.0-2ubuntu3.7
libcurl3-nss 7.58.0-2ubuntu3.7
libcurl4 7.58.0-2ubuntu3.7

Ubuntu 16.04 LTS:
curl 7.47.0-1ubuntu2.13
libcurl3 7.47.0-1ubuntu2.13
libcurl3-gnutls 7.47.0-1ubuntu2.13
libcurl3-nss 7.47.0-1ubuntu2.13

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3993-1
CVE-2019-5435, CVE-2019-5436

Package Information:
https://launchpad.net/ubuntu/+source/curl/7.64.0-2ubuntu1.1
https://launchpad.net/ubuntu/+source/curl/7.61.0-1ubuntu2.4
https://launchpad.net/ubuntu/+source/curl/7.58.0-2ubuntu3.7
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.13

—–BEGIN PGP SIGNATURE—–
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=DOP6
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-3993-2
May 22, 2019

curl vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM

Summary:

curl could be made to crash if it received a specially crafted data.

Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries

Details:

USN-3993-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

 It was discovered that curl incorrectly handled memory when receiving
 data from a TFTP server. A remote attacker could use this issue to
 cause  curl to  crash, resulting in a denial of service, or possibly
 execute arbitrary code. (CVE-2019-5436)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
  curl                            7.35.0-1ubuntu2.20+esm2
  libcurl3                        7.35.0-1ubuntu2.20+esm2
  libcurl3-gnutls                 7.35.0-1ubuntu2.20+esm2
  libcurl3-nss                    7.35.0-1ubuntu2.20+esm2

Ubuntu 12.04 ESM:
  curl                            7.22.0-3ubuntu4.26
  libcurl3                        7.22.0-3ubuntu4.26
  libcurl3-gnutls                 7.22.0-3ubuntu4.26
  libcurl3-nss                    7.22.0-3ubuntu4.26

In general, a standard system update will make all the necessary
changes.

References:
  https://usn.ubuntu.com/usn/usn-3993-2
  https://usn.ubuntu.com/usn/usn-3993-1
  CVE-2019-5436—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=x8YA
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa chromium

Otkriveni su sigurnosni nedostaci u programskom paketu chromium za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close