USN-5702-2: curl vulnerability

Publication date

26 October 2022

Overview

curl could crash if it received a specially crafted POST operations after PUT operations.


Packages

  • curl - HTTP, HTTPS, and FTP client and client libraries

Details

USN-5702-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Robby Simpson discovered that curl incorrectly handled certain POST
operations after PUT operations. This issue could cause applications using
curl to send the wrong data, perform incorrect memory operations, or crash.
(CVE-2022-32221)

USN-5702-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Robby Simpson discovered that curl incorrectly handled certain POST
operations after PUT operations. This issue could cause applications using
curl to send the wrong data, perform incorrect memory operations, or crash.
(CVE-2022-32221)

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
16.04 xenial libcurl3-gnutls –  7.47.0-1ubuntu2.19+esm6  
libcurl3-nss –  7.47.0-1ubuntu2.19+esm6  
libcurl3 –  7.47.0-1ubuntu2.19+esm6  
curl –  7.47.0-1ubuntu2.19+esm6  
14.04 trusty libcurl3-gnutls –  7.35.0-1ubuntu2.20+esm13  
libcurl3-nss –  7.35.0-1ubuntu2.20+esm13  
libcurl3 –  7.35.0-1ubuntu2.20+esm13  
curl –  7.35.0-1ubuntu2.20+esm13  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›