USN-5587-1: curl vulnerability
1 September 2022
curl could be denied access to a HTTP(S) content if it recieved a specially crafted cookie.
Releases
Packages
- curl - HTTP, HTTPS, and FTP client and client libraries
Details
Axel Chong discovered that when curl accepted and sent back
cookies containing control bytes that a HTTP(S) server might
return a 400 (Bad Request Error) response. A malicious cookie
host could possibly use this to cause denial-of-service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
-
libcurl3-gnutls
-
7.81.0-1ubuntu1.4
-
libcurl3-nss
-
7.81.0-1ubuntu1.4
-
libcurl4
-
7.81.0-1ubuntu1.4
-
curl
-
7.81.0-1ubuntu1.4
Ubuntu 20.04
-
libcurl3-gnutls
-
7.68.0-1ubuntu2.13
-
libcurl3-nss
-
7.68.0-1ubuntu2.13
-
libcurl4
-
7.68.0-1ubuntu2.13
-
curl
-
7.68.0-1ubuntu2.13
Ubuntu 18.04
-
libcurl3-gnutls
-
7.58.0-2ubuntu3.20
-
libcurl3-nss
-
7.58.0-2ubuntu3.20
-
libcurl4
-
7.58.0-2ubuntu3.20
-
curl
-
7.58.0-2ubuntu3.20
Ubuntu 16.04
-
libcurl3-gnutls
-
7.47.0-1ubuntu2.19+esm5
Available with Ubuntu Pro
-
libcurl3-nss
-
7.47.0-1ubuntu2.19+esm5
Available with Ubuntu Pro
-
libcurl3
-
7.47.0-1ubuntu2.19+esm5
Available with Ubuntu Pro
-
curl
-
7.47.0-1ubuntu2.19+esm5
Available with Ubuntu Pro
Ubuntu 14.04
-
libcurl3-gnutls
-
7.35.0-1ubuntu2.20+esm12
Available with Ubuntu Pro
-
libcurl3-nss
-
7.35.0-1ubuntu2.20+esm12
Available with Ubuntu Pro
-
libcurl3
-
7.35.0-1ubuntu2.20+esm12
Available with Ubuntu Pro
-
curl
-
7.35.0-1ubuntu2.20+esm12
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.