Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-6718-3

Ubuntu Security Notice 6718-3 - USN-6718-1 fixed vulnerabilities in curl. This update provides the corresponding updates for Ubuntu 24.04 LTS. Dan Fandrich discovered that curl would incorrectly use the default set of protocols when a parameter option disabled all protocols without adding any, contrary to expectations. This issue only affected Ubuntu 23.10. It was discovered that curl incorrectly handled memory when limiting the amount of headers when HTTP/2 server push is allowed. A remote attacker could possibly use this issue to cause curl to consume resources, leading to a denial of service.

Packet Storm
#vulnerability#ubuntu#dos#ssl
==========================================================================Ubuntu Security Notice USN-6718-3April 29, 2024curl vulnerabilities==========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 24.04 LTSSummary:Several security issues were fixed in curl.Software Description:- curl: HTTP, HTTPS, and FTP client and client librariesDetails:USN-6718-1 fixed vulnerabilities in curl. This update provides thecorresponding updates for Ubuntu 24.04 LTS.Original advisory details:  Dan Fandrich discovered that curl would incorrectly use the default set of  protocols when a parameter option disabled all protocols without adding  any, contrary to expectations. This issue only affected Ubuntu 23.10.  (CVE-2024-2004)   It was discovered that curl incorrectly handled memory when limiting the  amount of headers when HTTP/2 server push is allowed. A remote attacker  could possibly use this issue to cause curl to consume resources, leading  to a denial of service. (CVE-2024-2398)Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 24.04 LTS   curl                            8.5.0-2ubuntu10.1   libcurl3t64-gnutls              8.5.0-2ubuntu10.1   libcurl4t64                     8.5.0-2ubuntu10.1In general, a standard system update will make all the necessary changes.References:   https://ubuntu.com/security/notices/USN-6718-3   https://ubuntu.com/security/notices/USN-6718-1   CVE-2024-2004, CVE-2024-2398Package Information:   https://launchpad.net/ubuntu/+source/curl/8.5.0-2ubuntu10.1

Related news

Red Hat Security Advisory 2024-7213-03

Red Hat Security Advisory 2024-7213-03 - Updated service-interconnect container images are now available for Service Interconnect 1.4 LTS for RHEL 9.

Gentoo Linux Security Advisory 202409-20

Gentoo Linux Security Advisory 202409-20 - Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. Versions greater than or equal to 8.7.1 are affected.

Red Hat Security Advisory 2024-3998-03

Red Hat Security Advisory 2024-3998-03 - An update for curl is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.

Ubuntu Security Notice USN-6718-1

Ubuntu Security Notice 6718-1 - Dan Fandrich discovered that curl would incorrectly use the default set of protocols when a parameter option disabled all protocols without adding any, contrary to expectations. This issue only affected Ubuntu 23.10. It was discovered that curl incorrectly handled memory when limiting the amount of headers when HTTP/2 server push is allowed. A remote attacker could possibly use this issue to cause curl to consume resources, leading to a denial of service.

Ubuntu Security Notice USN-6718-1

Ubuntu Security Notice 6718-1 - Dan Fandrich discovered that curl would incorrectly use the default set of protocols when a parameter option disabled all protocols without adding any, contrary to expectations. This issue only affected Ubuntu 23.10. It was discovered that curl incorrectly handled memory when limiting the amount of headers when HTTP/2 server push is allowed. A remote attacker could possibly use this issue to cause curl to consume resources, leading to a denial of service.

Packet Storm: Latest News

Grav CMS 1.7.44 Server-Side Template Injection