First published: Mon Sep 17 2018(Updated: )
It was discovered that curl incorrectly handled certain inputs. An attacker could possibly use this to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/curl | <7.58.0-2ubuntu3.3 | 7.58.0-2ubuntu3.3 |
=18.04 | ||
All of | ||
ubuntu/libcurl3-gnutls | <7.58.0-2ubuntu3.3 | 7.58.0-2ubuntu3.3 |
=18.04 | ||
All of | ||
ubuntu/libcurl3-nss | <7.58.0-2ubuntu3.3 | 7.58.0-2ubuntu3.3 |
=18.04 | ||
All of | ||
ubuntu/libcurl4 | <7.58.0-2ubuntu3.3 | 7.58.0-2ubuntu3.3 |
=18.04 | ||
All of | ||
ubuntu/curl | <7.47.0-1ubuntu2.9 | 7.47.0-1ubuntu2.9 |
=16.04 | ||
All of | ||
ubuntu/libcurl3 | <7.47.0-1ubuntu2.9 | 7.47.0-1ubuntu2.9 |
=16.04 | ||
All of | ||
ubuntu/libcurl3-gnutls | <7.47.0-1ubuntu2.9 | 7.47.0-1ubuntu2.9 |
=16.04 | ||
All of | ||
ubuntu/libcurl3-nss | <7.47.0-1ubuntu2.9 | 7.47.0-1ubuntu2.9 |
=16.04 | ||
All of | ||
ubuntu/curl | <7.35.0-1ubuntu2.17 | 7.35.0-1ubuntu2.17 |
=14.04 | ||
All of | ||
ubuntu/libcurl3 | <7.35.0-1ubuntu2.17 | 7.35.0-1ubuntu2.17 |
=14.04 | ||
All of | ||
ubuntu/libcurl3-gnutls | <7.35.0-1ubuntu2.17 | 7.35.0-1ubuntu2.17 |
=14.04 | ||
All of | ||
ubuntu/libcurl3-nss | <7.35.0-1ubuntu2.17 | 7.35.0-1ubuntu2.17 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
High
It affects curl versions up to 7.58.0-2ubuntu3.3 and libcurl3-gnutls, libcurl3-nss, and libcurl4 versions up to 7.58.0-2ubuntu3.3.
It affects curl versions up to 7.47.0-1ubuntu2.9 and libcurl3, libcurl3-gnutls, and libcurl3-nss versions up to 7.47.0-1ubuntu2.9.
It affects curl versions up to 7.35.0-1ubuntu2.17 and libcurl3, libcurl3-gnutls, and libcurl3-nss versions up to 7.35.0-1ubuntu2.17.
Upgrade curl and libcurl packages to the latest version available for your Ubuntu release.