TITLE: Ubuntu update for libcurl2/libcurl3 SECUNIA ADVISORY ID: SA17208 VERIFY ADVISORY: http://secunia.com/advisories/17208/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Ubuntu Linux 5.04 http://secunia.com/product/5036/ Ubuntu Linux 4.10 http://secunia.com/product/4491/ DESCRIPTION: Ubuntu has issued an update for libcurl2/libcurl3. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. For more information: SA17193 SOLUTION: Apply updated packages. -- Ubuntu 4.10 (Warty Warthog) -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.0.is.7.11.2-1ubuntu0.2.diff.gz Size/MD5: 160693 33fd9275c2cb8eb2d1c64907418f17c1 http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.0.is.7.11.2-1ubuntu0.2.dsc Size/MD5: 707 eb53d05be8edddff7682d01524d6fffd http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.0.is.7.11.2.orig.tar.gz Size/MD5: 1435629 25e6617ea7dec34d072426942b77801f amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.0.is.7.11.2-1ubuntu0.2_amd64.deb Size/MD5: 108704 23aad1ad58b9a51f82c50abb83497317 http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2-dbg_7.12.0.is.7.11.2-1ubuntu0.2_amd64.deb Size/MD5: 1043840 b2acaba139ef78225314f3ef2175bc69 http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2-dev_7.12.0.is.7.11.2-1ubuntu0.2_amd64.deb Size/MD5: 568238 5095e501e5fc65f75ddf055d751d5f69 http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl2-gssapi_7.12.0.is.7.11.2-1ubuntu0.2_amd64.deb Size/MD5: 112040 bfc514504ff0898ef87749e138a36f1f http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2_7.12.0.is.7.11.2-1ubuntu0.2_amd64.deb Size/MD5: 224744 f58e0e9c9c16233579c6a7155a1d585e i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.0.is.7.11.2-1ubuntu0.2_i386.deb Size/MD5: 107882 9764d045f57bd73949f8e04e6e9bee4e http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2-dbg_7.12.0.is.7.11.2-1ubuntu0.2_i386.deb Size/MD5: 1029158 b9b7e352e2caa013b779ee2b2d567cc9 http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2-dev_7.12.0.is.7.11.2-1ubuntu0.2_i386.deb Size/MD5: 556734 ad2e921671e7b8d101110f85f21e9657 http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl2-gssapi_7.12.0.is.7.11.2-1ubuntu0.2_i386.deb Size/MD5: 110044 8ea041119444cff6e1bae8feaa473d4a http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2_7.12.0.is.7.11.2-1ubuntu0.2_i386.deb Size/MD5: 222982 adbb21cdc1a69f4ffd055e06064c747c powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.0.is.7.11.2-1ubuntu0.2_powerpc.deb Size/MD5: 110204 6e3c5a2dd81fabe800a140211948d896 http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2-dbg_7.12.0.is.7.11.2-1ubuntu0.2_powerpc.deb Size/MD5: 1052982 269cea1705aafc866068d103b577a915 http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2-dev_7.12.0.is.7.11.2-1ubuntu0.2_powerpc.deb Size/MD5: 573634 3d2426cdc56331107781c30e15c61458 http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl2-gssapi_7.12.0.is.7.11.2-1ubuntu0.2_powerpc.deb Size/MD5: 116446 b2489d686aa3117ee3c148ded72ae91d http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl2_7.12.0.is.7.11.2-1ubuntu0.2_powerpc.deb Size/MD5: 229588 f9d604f7f30225b76ae46700c8c8b7df -- Ubuntu 5.04 (Hoary Hedgehog) -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.3-2ubuntu3.1.diff.gz Size/MD5: 1261546 be3df128a235f59670e92685004ccdb1 http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.3-2ubuntu3.1.dsc Size/MD5: 832 bc7457a3aa27c5d889c09847f0b62974 http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.3-2ubuntu3.2.diff.gz Size/MD5: 1261590 5188b612f9a5c7d5e280fccb12d8ac02 http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.3-2ubuntu3.2.dsc Size/MD5: 832 264904c761e21e7c4d2f72fd8cdc8ccd http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.3.orig.tar.gz Size/MD5: 2135477 653d1227c58ca870f95c488db62033f8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.3-2ubuntu3.2_amd64.deb Size/MD5: 166298 d060a434dfb10c3a169c253e4ba56461 http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl2-dev_7.11.2-12ubuntu3.2_amd64.deb Size/MD5: 341376 c409235fdfe2c2245510b38a77bf794d http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl2_7.11.2-12ubuntu3.2_amd64.deb Size/MD5: 225678 f14b801c68990e1f23296decbf34f33d http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl3-dbg_7.12.3-2ubuntu3.2_amd64.deb Size/MD5: 991662 1538f3addaa9e6375d29c3bfd780fc20 http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl3-dev_7.12.3-2ubuntu3.2_amd64.deb Size/MD5: 1217422 a5e692fba45c2df0a9654d266ca79bc4 http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl3-gssapi_7.12.3-2ubuntu3.2_amd64.deb Size/MD5: 137874 05a9449b5044393392ec323f3e1e6d70 http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl3_7.12.3-2ubuntu3.2_amd64.deb Size/MD5: 254250 50daddd8be0ac62f185fa61e54b0f7b7 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.3-2ubuntu3.2_i386.deb Size/MD5: 165432 9cc856bcb3a2ffd36aedef324705a484 http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl2-dev_7.11.2-12ubuntu3.2_i386.deb Size/MD5: 328024 d93bc4d2d92499e2283b794c928eef1e http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl2_7.11.2-12ubuntu3.2_i386.deb Size/MD5: 223856 17eae5634df05924a22aef0c142f7891 http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl3-dbg_7.12.3-2ubuntu3.2_i386.deb Size/MD5: 989598 e9407dffd07dd2b51376c3d41df45e5f http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl3-dev_7.12.3-2ubuntu3.2_i386.deb Size/MD5: 1202722 62c665c0888bb506e8d74f76d8968414 http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl3-gssapi_7.12.3-2ubuntu3.2_i386.deb Size/MD5: 134946 347cd59c616b389217d571e877a88e71 http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl3_7.12.3-2ubuntu3.2_i386.deb Size/MD5: 251718 1726eda9f084d12bf0b9d07df889f30a powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.12.3-2ubuntu3.2_powerpc.deb Size/MD5: 168816 ba7348387bdfe8b9c2db4d5cba3ec2c2 http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl2-dev_7.11.2-12ubuntu3.2_powerpc.deb Size/MD5: 346022 3e962937da92dc998546ebf58a3c30a1 http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl2_7.11.2-12ubuntu3.2_powerpc.deb Size/MD5: 230506 3a34d094f0b0fd8d3014e36044ab7322 http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl3-dbg_7.12.3-2ubuntu3.2_powerpc.deb Size/MD5: 1601262 8091c58cf6f26bd5974e4a1159d0330e http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl3-dev_7.12.3-2ubuntu3.2_powerpc.deb Size/MD5: 1223446 f1ee786efe6884f52f7ae15b8080faa3 http://security.ubuntu.com/ubuntu/pool/universe/c/curl/libcurl3-gssapi_7.12.3-2ubuntu3.2_powerpc.deb Size/MD5: 142712 f75b25faffb8b55e79d87edb5090bc7a http://security.ubuntu.com/ubuntu/pool/main/c/curl/libcurl3_7.12.3-2ubuntu3.2_powerpc.deb Size/MD5: 258902 d0f5ba7c2d5f5fa1ef71da7d0aad5f9d ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-205-1 OTHER REFERENCES: SA17193: http://secunia.com/advisories/17193/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------