USN-5702-2: curl vulnerability
26 October 2022
curl could crash if it received a specially crafted POST operations after PUT operations.
Releases
Packages
- curl - HTTP, HTTPS, and FTP client and client libraries
Details
USN-5702-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Robby Simpson discovered that curl incorrectly handled certain POST
operations after PUT operations. This issue could cause applications using
curl to send the wrong data, perform incorrect memory operations, or crash.
(CVE-2022-32221)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
libcurl3-gnutls
-
7.47.0-1ubuntu2.19+esm6
Available with Ubuntu Pro
-
libcurl3-nss
-
7.47.0-1ubuntu2.19+esm6
Available with Ubuntu Pro
-
libcurl3
-
7.47.0-1ubuntu2.19+esm6
Available with Ubuntu Pro
-
curl
-
7.47.0-1ubuntu2.19+esm6
Available with Ubuntu Pro
Ubuntu 14.04
-
libcurl3-gnutls
-
7.35.0-1ubuntu2.20+esm13
Available with Ubuntu Pro
-
libcurl3-nss
-
7.35.0-1ubuntu2.20+esm13
Available with Ubuntu Pro
-
libcurl3
-
7.35.0-1ubuntu2.20+esm13
Available with Ubuntu Pro
-
curl
-
7.35.0-1ubuntu2.20+esm13
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5702-1: libcurl4-nss-dev, libcurl4, libcurl3-nss, libcurl3-gnutls, libcurl4-gnutls-dev, curl, libcurl4-doc, libcurl4-openssl-dev
- USN-5823-1: mysql-server-core-5.7, mysql-testsuite-8.0, mysql-8.0, mysql-client-core-5.7, mysql-testsuite, libmysqld-dev, libmysqlclient20, mysql-server-5.7, mysql-server, libmysqlclient-dev, mysql-source-8.0, mysql-client-core-8.0, mysql-testsuite-5.7, mysql-source-5.7, mysql-router, mysql-client-5.7, mysql-client, mysql-server-core-8.0, mysql-server-8.0, libmysqlclient21, mysql-client-8.0, mysql-5.7