what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Ubuntu Security Notice USN-5964-1

Ubuntu Security Notice USN-5964-1
Posted Mar 21, 2023
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5964-1 - Harry Sintonen discovered that curl incorrectly handled certain TELNET connection options. Due to lack of proper input scrubbing, curl could pass on user name and telnet options to the server as provided, contrary to expectations. Harry Sintonen discovered that curl incorrectly handled special tilde characters when used with SFTP paths. A remote attacker could possibly use this issue to circumvent filtering.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536, CVE-2023-27538
SHA-256 | 7303af9763b09b697c1acbc39214d51f90dd82cd2f8e2e8bd2040d6a4b2ec3e8

Ubuntu Security Notice USN-5964-1

Change Mirror Download
==========================================================================
Ubuntu Security Notice USN-5964-1
March 20, 2023

curl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in curl.

Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries

Details:

Harry Sintonen discovered that curl incorrectly handled certain TELNET
connection options. Due to lack of proper input scrubbing, curl could pass
on user name and telnet options to the server as provided, contrary to
expectations. (CVE-2023-27533)

Harry Sintonen discovered that curl incorrectly handled special tilde
characters when used with SFTP paths. A remote attacker could possibly use
this issue to circumvent filtering. (CVE-2023-27534)

Harry Sintonen discovered that curl incorrectly reused certain FTP
connections. This could lead to the wrong credentials being reused,
contrary to expectations. (CVE-2023-27535)

Harry Sintonen discovered that curl incorrectly reused connections when the
GSS delegation option had been changed. This could lead to the option being
reused, contrary to expectations. (CVE-2023-27536)

Harry Sintonen discovered that curl incorrectly reused certain SSH
connections. This could lead to the wrong credentials being reused,
contrary to expectations. (CVE-2023-27538)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
curl 7.85.0-1ubuntu0.5
libcurl3-gnutls 7.85.0-1ubuntu0.5
libcurl3-nss 7.85.0-1ubuntu0.5
libcurl4 7.85.0-1ubuntu0.5

Ubuntu 22.04 LTS:
curl 7.81.0-1ubuntu1.10
libcurl3-gnutls 7.81.0-1ubuntu1.10
libcurl3-nss 7.81.0-1ubuntu1.10
libcurl4 7.81.0-1ubuntu1.10

Ubuntu 20.04 LTS:
curl 7.68.0-1ubuntu2.18
libcurl3-gnutls 7.68.0-1ubuntu2.18
libcurl3-nss 7.68.0-1ubuntu2.18
libcurl4 7.68.0-1ubuntu2.18

Ubuntu 18.04 LTS:
curl 7.58.0-2ubuntu3.24
libcurl3-gnutls 7.58.0-2ubuntu3.24
libcurl3-nss 7.58.0-2ubuntu3.24
libcurl4 7.58.0-2ubuntu3.24

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5964-1
CVE-2023-27533, CVE-2023-27534, CVE-2023-27535, CVE-2023-27536,
CVE-2023-27538

Package Information:
https://launchpad.net/ubuntu/+source/curl/7.85.0-1ubuntu0.5
https://launchpad.net/ubuntu/+source/curl/7.81.0-1ubuntu1.10
https://launchpad.net/ubuntu/+source/curl/7.68.0-1ubuntu2.18
https://launchpad.net/ubuntu/+source/curl/7.58.0-2ubuntu3.24
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close