This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============7039160705137994772==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="JGW40kXFUqOo1CLXeil9uJInxoJaEf68H"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--JGW40kXFUqOo1CLXeil9uJInxoJaEf68H
Content-Type: multipart/mixed; boundary="eefLTKuPHtgGcI5bBSn676THjx6uRLhhm"
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3048-1] curl vulnerabilities
--eefLTKuPHtgGcI5bBSn676THjx6uRLhhm
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable
==========================================================================
Ubuntu Security Notice USN-3048-1
August 08, 2016
curl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in curl.
Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries
Details:
Bru Rom discovered that curl incorrectly handled client certificates when
resuming a TLS session. (CVE-2016-5419)
It was discovered that curl incorrectly handled client certificates when
reusing TLS connections. (CVE-2016-5420)
Marcelo Echeverria and Fernando Muñoz discovered that curl incorrectly
reused a connection struct, contrary to expectations. This issue only
applied to Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-5421)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
libcurl3 7.47.0-1ubuntu2.1
libcurl3-gnutls 7.47.0-1ubuntu2.1
libcurl3-nss 7.47.0-1ubuntu2.1
Ubuntu 14.04 LTS:
libcurl3 7.35.0-1ubuntu2.8
libcurl3-gnutls 7.35.0-1ubuntu2.8
libcurl3-nss 7.35.0-1ubuntu2.8
Ubuntu 12.04 LTS:
libcurl3 7.22.0-3ubuntu4.16
libcurl3-gnutls 7.22.0-3ubuntu4.16
libcurl3-nss 7.22.0-3ubuntu4.16
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3048-1
CVE-2016-5419, CVE-2016-5420, CVE-2016-5421
Package Information:
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.1
https://launchpad.net/ubuntu/+source/curl/7.35.0-1ubuntu2.8
https://launchpad.net/ubuntu/+source/curl/7.22.0-3ubuntu4.16
--eefLTKuPHtgGcI5bBSn676THjx6uRLhhm--
--JGW40kXFUqOo1CLXeil9uJInxoJaEf68H
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=ACsy
-----END PGP SIGNATURE-----
--JGW40kXFUqOo1CLXeil9uJInxoJaEf68H--
--===============7039160705137994772==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============7039160705137994772==--
|