Ubuntu 4129-2: curl vulnerability

    Date12 Sep 2019
    Posted ByLinuxSecurity Advisories
    Ubuntu Large
    curl could be made to crash or possibly execute arbitrary code if it incorrectly handled memory during TFTP transfers.
    Ubuntu Security Notice USN-4129-2
    September 12, 2019
    curl vulnerability
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 14.04 ESM
    - Ubuntu 12.04 ESM
    curl could be made to crash or possibly execute arbitrary code
    if it incorrectly handled memory during TFTP transfers.
    Software Description:
    - curl: HTTP, HTTPS, and FTP client and client libraries
    USN-4129-1 fixed a vulnerability in curl. This update provides
    the corresponding update for Ubuntu 12.04 ESM and 14.04 ESM.
    Original advisory details:
     Thomas Vegas discovered that curl incorrectly handled memory during TFTP
     transfers. A remote attacker could use this issue to crash curl, resulting
     in a denial of service, or possibly execute arbitrary code.
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 14.04 ESM:
      curl                            7.35.0-1ubuntu2.20+esm3
      libcurl3                        7.35.0-1ubuntu2.20+esm3
      libcurl3-gnutls                 7.35.0-1ubuntu2.20+esm3
      libcurl3-nss                    7.35.0-1ubuntu2.20+esm3
    Ubuntu 12.04 ESM:
      curl                            7.22.0-3ubuntu4.27
      libcurl3                        7.22.0-3ubuntu4.27
      libcurl3-gnutls                 7.22.0-3ubuntu4.27
      libcurl3-nss                    7.22.0-3ubuntu4.27
    In general, a standard system update will make all the necessary changes.
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"38","type":"x","order":"1","pct":52.05,"resources":[]},{"id":"88","title":"Should be more technical","votes":"10","type":"x","order":"2","pct":13.7,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"25","type":"x","order":"3","pct":34.25,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.