USN-3765-1: curl vulnerability
17 September 2018
curl could be made to run arbitrary code if it received a specially crafted input.
Releases
Packages
- curl - HTTP, HTTPS, and FTP client and client libraries
Details
It was discovered that curl incorrectly handled certain inputs.
An attacker could possibly use this to execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
curl
-
7.58.0-2ubuntu3.3
-
libcurl3-gnutls
-
7.58.0-2ubuntu3.3
-
libcurl3-nss
-
7.58.0-2ubuntu3.3
-
libcurl4
-
7.58.0-2ubuntu3.3
Ubuntu 16.04
-
curl
-
7.47.0-1ubuntu2.9
-
libcurl3
-
7.47.0-1ubuntu2.9
-
libcurl3-gnutls
-
7.47.0-1ubuntu2.9
-
libcurl3-nss
-
7.47.0-1ubuntu2.9
Ubuntu 14.04
-
curl
-
7.35.0-1ubuntu2.17
-
libcurl3
-
7.35.0-1ubuntu2.17
-
libcurl3-gnutls
-
7.35.0-1ubuntu2.17
-
libcurl3-nss
-
7.35.0-1ubuntu2.17
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3765-2: libcurl3-nss, curl, libcurl3-gnutls, libcurl3