USN-3993-2: curl vulnerability
22 May 2019
curl could be made to crash if it received a specially crafted data.
Releases
Packages
- curl - HTTP, HTTPS, and FTP client and client libraries
Details
USN-3993-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
It was discovered that curl incorrectly handled memory when receiving data
from a TFTP server. A remote attacker could use this issue to cause curl to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2019-5436)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
-
libcurl3-gnutls
-
7.35.0-1ubuntu2.20+esm2
-
libcurl3-nss
-
7.35.0-1ubuntu2.20+esm2
-
libcurl3
-
7.35.0-1ubuntu2.20+esm2
-
curl
-
7.35.0-1ubuntu2.20+esm2
Ubuntu 12.04
-
libcurl3-gnutls
-
7.22.0-3ubuntu4.26
-
libcurl3-nss
-
7.22.0-3ubuntu4.26
-
libcurl3
-
7.22.0-3ubuntu4.26
-
curl
-
7.22.0-3ubuntu4.26
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3993-1: libcurl3-nss, libcurl4-openssl-dev, libcurl4-gnutls-dev, libcurl4, libcurl3-gnutls, libcurl4-doc, curl, libcurl4-nss-dev, libcurl3