==========================================================================
Ubuntu Security Notice USN-4665-2
December 09, 2020
curl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in curl.
Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries
Details:
USN-4665-1 fixed several vulnerabilities in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
Varnavas Papaioannou discovered that curl incorrectly handled FTP PASV
responses. An attacker could possibly use this issue to trick curl into
connecting to an arbitrary IP address and be used to perform port scanner
and other information gathering. (CVE-2020-8284)
It was discovered that curl incorrectly handled FTP wildcard matchins. A
remote attacker could possibly use this issue to cause curl to consume
resources and crash, resulting in a denial of service. (CVE-2020-8285)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
curl 7.35.0-1ubuntu2.20+esm6
libcurl3 7.35.0-1ubuntu2.20+esm6
libcurl3-gnutls 7.35.0-1ubuntu2.20+esm6
libcurl3-nss 7.35.0-1ubuntu2.20+esm6
Ubuntu 12.04 ESM:
curl 7.22.0-3ubuntu4.29
libcurl3 7.22.0-3ubuntu4.29
libcurl3-gnutls 7.22.0-3ubuntu4.29
libcurl3-nss 7.22.0-3ubuntu4.29
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4665-2
https://usn.ubuntu.com/4665-1
CVE-2020-8284, CVE-2020-8285
—–BEGIN PGP SIGNATURE—–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=hFvN
—–END PGP SIGNATURE—–
—