Packages
- curl - HTTP, HTTPS, and FTP client and client libraries
Details
Daniel Stenberg discovered that curl incorrectly handled large floating
point output. A remote attacker could use this issue to cause curl to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2016-9586)
Even Rouault discovered that curl incorrectly handled large file names when
doing TFTP transfers. A remote attacker could use this issue to cause curl
to crash, resulting in a denial of service, or possibly obtain sensitive
memory contents. (CVE-2017-1000100)
Brian Carpenter and Yongji Ouyang discovered that curl incorrectly handled
numerical range globbing. A remote attacker could use this issue to cause
curl to crash, resulting in a denial of service, or possibly obtain
sensitive memory contents. (
Daniel Stenberg discovered that curl incorrectly handled large floating
point output. A remote attacker could use this issue to cause curl to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2016-9586)
Even Rouault discovered that curl incorrectly handled large file names when
doing TFTP transfers. A remote attacker could use this issue to cause curl
to crash, resulting in a denial of service, or possibly obtain sensitive
memory contents. (CVE-2017-1000100)
Brian Carpenter and Yongji Ouyang discovered that curl incorrectly handled
numerical range globbing. A remote attacker could use this issue to cause
curl to crash, resulting in a denial of service, or possibly obtain
sensitive memory contents. (CVE-2017-1000101)
Max Dymond discovered that curl incorrectly handled FTP PWD responses. A
remote attacker could use this issue to cause curl to crash, resulting in a
denial of service. (CVE-2017-1000254)
Brian Carpenter discovered that curl incorrectly handled the --write-out
command line option. A local attacker could possibly use this issue to
obtain sensitive memory contents. (CVE-2017-7407)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
17.04 zesty | curl – 7.52.1-4ubuntu1.2 | ||
libcurl3 – 7.52.1-4ubuntu1.2 | |||
libcurl3-gnutls – 7.52.1-4ubuntu1.2 | |||
libcurl3-nss – 7.52.1-4ubuntu1.2 | |||
16.04 xenial | curl – 7.47.0-1ubuntu2.3 | ||
libcurl3 – 7.47.0-1ubuntu2.3 | |||
libcurl3-gnutls – 7.47.0-1ubuntu2.3 | |||
libcurl3-nss – 7.47.0-1ubuntu2.3 | |||
14.04 trusty | curl – 7.35.0-1ubuntu2.11 | ||
libcurl3 – 7.35.0-1ubuntu2.11 | |||
libcurl3-gnutls – 7.35.0-1ubuntu2.11 | |||
libcurl3-nss – 7.35.0-1ubuntu2.11 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.