First published: Mon Sep 17 2018(Updated: )
USN-3765-1 fixed a vulnerability in curl. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: It was discovered that curl incorrectly handled certain inputs. An attacker could possibly use this to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libcurl3-nss | <7.22.0-3ubuntu4.23 | 7.22.0-3ubuntu4.23 |
Ubuntu Ubuntu | =12.04 | |
All of | ||
ubuntu/curl | <7.22.0-3ubuntu4.23 | 7.22.0-3ubuntu4.23 |
Ubuntu Ubuntu | =12.04 | |
All of | ||
ubuntu/libcurl3-gnutls | <7.22.0-3ubuntu4.23 | 7.22.0-3ubuntu4.23 |
Ubuntu Ubuntu | =12.04 | |
All of | ||
ubuntu/libcurl3 | <7.22.0-3ubuntu4.23 | 7.22.0-3ubuntu4.23 |
Ubuntu Ubuntu | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is USN-3765-2.
The vulnerability affects libcurl3-nss, curl, libcurl3, and libcurl3-gnutls packages on Ubuntu 12.04.
The severity of the vulnerability is not specified in the provided information.
To fix the vulnerability, update the affected packages to version 7.22.0-3ubuntu4.23 or later.
You can find more information about the vulnerability at the following references: [CVE-2018-14618](https://ubuntu.com/security/CVE-2018-14618), [USN-3765-1](https://ubuntu.com/security/notices/USN-3765-1), [Launchpad](https://launchpad.net/ubuntu/+source/curl/7.22.0-3ubuntu4.23).