News

Tuesday, September 16, 2014

ubuntu-security-announce Digest, Vol 120, Issue 10

Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com

To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com

You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."


Today's Topics:

1. [USN-2346-1] curl vulnerabilities (Marc Deslauriers)


----------------------------------------------------------------------

Message: 1
Date: Mon, 15 Sep 2014 08:28:05 -0400
From: Marc Deslauriers <marc.deslauriers@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2346-1] curl vulnerabilities
Message-ID: <5416DB55.2060802@canonical.com>
Content-Type: text/plain; charset="utf-8"

==========================================================================
Ubuntu Security Notice USN-2346-1
September 15, 2014

curl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in curl.

Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries

Details:

Tim Ruehsen discovered that curl incorrectly handled partial literal IP
addresses. This could lead to the disclosure of cookies to the wrong site,
and malicious sites being able to set cookies for others. (CVE-2014-3613)

Tim Ruehsen discovered that curl incorrectly allowed cookies to be set
for Top Level Domains (TLDs). This could allow a malicious site to set a
cookie that gets sent to other sites. (CVE-2014-3620)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
libcurl3 7.35.0-1ubuntu2.1
libcurl3-gnutls 7.35.0-1ubuntu2.1
libcurl3-nss 7.35.0-1ubuntu2.1

Ubuntu 12.04 LTS:
libcurl3 7.22.0-3ubuntu4.10
libcurl3-gnutls 7.22.0-3ubuntu4.10
libcurl3-nss 7.22.0-3ubuntu4.10

Ubuntu 10.04 LTS:
libcurl3 7.19.7-1ubuntu1.9
libcurl3-gnutls 7.19.7-1ubuntu1.9

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2346-1
CVE-2014-3613, CVE-2014-3620

Package Information:
https://launchpad.net/ubuntu/+source/curl/7.35.0-1ubuntu2.1
https://launchpad.net/ubuntu/+source/curl/7.22.0-3ubuntu4.10
https://launchpad.net/ubuntu/+source/curl/7.19.7-1ubuntu1.9


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140915/3be35a8d/attachment-0001.pgp>

------------------------------

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


End of ubuntu-security-announce Digest, Vol 120, Issue 10
*********************************************************

No comments:

Blog Archive