==========================================================================
Ubuntu Security Notice USN-3993-1
May 22, 2019
curl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 19.04
– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in curl.
Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries
Details:
Wenchao Li discovered that curl incorrectly handled memory in the
curl_url_set() function. A remote attacker could use this issue to cause
curl to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 19.04. (CVE-2019-5435)
It was discovered that curl incorrectly handled memory when receiving data
from a TFTP server. A remote attacker could use this issue to cause curl to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2019-5436)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
curl 7.64.0-2ubuntu1.1
libcurl3-gnutls 7.64.0-2ubuntu1.1
libcurl3-nss 7.64.0-2ubuntu1.1
libcurl4 7.64.0-2ubuntu1.1
Ubuntu 18.10:
curl 7.61.0-1ubuntu2.4
libcurl3-gnutls 7.61.0-1ubuntu2.4
libcurl3-nss 7.61.0-1ubuntu2.4
libcurl4 7.61.0-1ubuntu2.4
Ubuntu 18.04 LTS:
curl 7.58.0-2ubuntu3.7
libcurl3-gnutls 7.58.0-2ubuntu3.7
libcurl3-nss 7.58.0-2ubuntu3.7
libcurl4 7.58.0-2ubuntu3.7
Ubuntu 16.04 LTS:
curl 7.47.0-1ubuntu2.13
libcurl3 7.47.0-1ubuntu2.13
libcurl3-gnutls 7.47.0-1ubuntu2.13
libcurl3-nss 7.47.0-1ubuntu2.13
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3993-1
CVE-2019-5435, CVE-2019-5436
Package Information:
https://launchpad.net/ubuntu/+source/curl/7.64.0-2ubuntu1.1
https://launchpad.net/ubuntu/+source/curl/7.61.0-1ubuntu2.4
https://launchpad.net/ubuntu/+source/curl/7.58.0-2ubuntu3.7
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.13
—–BEGIN PGP SIGNATURE—–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=DOP6
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3993-2
May 22, 2019
curl vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM
Summary:
curl could be made to crash if it received a specially crafted data.
Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries
Details:
USN-3993-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that curl incorrectly handled memory when receiving
data from a TFTP server. A remote attacker could use this issue to
cause curl to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2019-5436)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
curl 7.35.0-1ubuntu2.20+esm2
libcurl3 7.35.0-1ubuntu2.20+esm2
libcurl3-gnutls 7.35.0-1ubuntu2.20+esm2
libcurl3-nss 7.35.0-1ubuntu2.20+esm2
Ubuntu 12.04 ESM:
curl 7.22.0-3ubuntu4.26
libcurl3 7.22.0-3ubuntu4.26
libcurl3-gnutls 7.22.0-3ubuntu4.26
libcurl3-nss 7.22.0-3ubuntu4.26
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3993-2
https://usn.ubuntu.com/usn/usn-3993-1
CVE-2019-5436—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQIcBAABCAAGBQJc5X4WAAoJEEW851uECx9pAuIP/jKmG5ScJSpBzzEBN8nINuVO
GG6+nZIVTwKOCYX4ByJHlOCUwpMTI4Icn89Ug0lza68ED/Ni3wM55yahpYo0Nggr
7Ehsu7oLYTYOYLWmCv///OlhIbSeDMOhsUcDrlgWKTPPfkA2K1JTjg4HTdZVKIQe
6F++DJnX6Mq6JOf4H2XET7lTFeKbOjnJ3tfcbdsDjrNhPd7LzBUiaFEj9I132TOC
4oi+KPjwmXYt5dkXAD5P076N33maz8sUCgXvimmIZrF3JzT0wT3kL3idsLwOqXFj
1lvLr2nBNFvgL6Ysj3LwlgTehiPWAPGGYKzK4jVRZOcB7Tzkjrq041HqT5dXVN2V
kCtJbuwXdA/gnDfKQyLzSiZjtX9osnHTb+Zt0hx8ZrnBjHfMmOvqnOO2fzkUaN8t
MJgxUBN9oWK9v/d0LPG5UeiebCnQ6/Ky+dq9Rs5NFQO7UEq06AIvuRQVD0Msrkjl
cjm5vPwjrF9Hwmz3dtr3HH0b80cFTWfct7TXUjpafnAOdFh2VWY9hDnfuxqVWUzp
b25Kw5pqkkDBZgOD2kXgEmBDFl+1x0Psv+wXlul0S+dXFd8102ha89EZAeebtNVR
IwmL9dhuy38AoZVE1EG5jraC+jDXB8HefVlchZqDqZp6dh247hjp3c1cIFydtNnr
5FUqXgFXEWOSFoFx8Idx
=x8YA
—–END PGP SIGNATURE—–
—