USN-6429-1: curl vulnerabilities
11 October 2023
Several security issues were fixed in curl.
Releases
Packages
- curl - HTTP, HTTPS, and FTP client and client libraries
Details
Jay Satiro discovered that curl incorrectly handled hostnames when using a
SOCKS5 proxy. In environments where curl is configured to use a SOCKS5
proxy, a remote attacker could possibly use this issue to execute arbitrary
code. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-38545)
It was discovered that curl incorrectly handled cookies when an application
duplicated certain handles. A local attacker could possibly create a cookie
file and inject arbitrary cookies into subsequent connections.
(CVE-2023-38546)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.04
-
curl
-
7.88.1-8ubuntu2.3
-
libcurl3-gnutls
-
7.88.1-8ubuntu2.3
-
libcurl3-nss
-
7.88.1-8ubuntu2.3
-
libcurl4
-
7.88.1-8ubuntu2.3
Ubuntu 22.04
-
curl
-
7.81.0-1ubuntu1.14
-
libcurl3-gnutls
-
7.81.0-1ubuntu1.14
-
libcurl3-nss
-
7.81.0-1ubuntu1.14
-
libcurl4
-
7.81.0-1ubuntu1.14
Ubuntu 20.04
-
curl
-
7.68.0-1ubuntu2.20
-
libcurl3-gnutls
-
7.68.0-1ubuntu2.20
-
libcurl3-nss
-
7.68.0-1ubuntu2.20
-
libcurl4
-
7.68.0-1ubuntu2.20
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6429-2: curl, libcurl4-nss-dev, libcurl4-openssl-dev, libcurl3-gnutls, libcurl3, libcurl4-doc, libcurl3-nss, libcurl4-gnutls-dev, libcurl4
- USN-6429-3: curl, libcurl4-nss-dev, libcurl4-openssl-dev, libcurl3-gnutls, libcurl4-gnutls-dev, libcurl4-doc, libcurl3-nss, libcurl4