-----BEGIN PGP SIGNATURE-----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=Ep+Q
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6641-1
February 19, 2024
curl vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
curl could be made to set cookies that would bypass PSL checks.
Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries
Details:
Harry Sintonen discovered that curl incorrectly handled mixed case cookie
domains. A remote attacker could possibly use this issue to set cookies
that get sent to different and unrelated sites and domains.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
curl 7.58.0-2ubuntu3.24+esm3
libcurl3-gnutls 7.58.0-2ubuntu3.24+esm3
libcurl3-nss 7.58.0-2ubuntu3.24+esm3
libcurl4 7.58.0-2ubuntu3.24+esm3
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
curl 7.47.0-1ubuntu2.19+esm11
libcurl3 7.47.0-1ubuntu2.19+esm11
libcurl3-gnutls 7.47.0-1ubuntu2.19+esm11
libcurl3-nss 7.47.0-1ubuntu2.19+esm11
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6641-1
CVE-2023-46218
No comments:
Post a Comment