Package "curl"

Name: curl


command line tool for transferring data with URL syntax

Latest version: 7.81.0-1ubuntu1.3
Release: jammy (22.04)
Level: security
Repository: main
Homepage: https://curl.haxx.se


Download "curl"

Other versions of "curl" in Jammy

Repository Area Version
base main 7.81.0-1
updates main 7.81.0-1ubuntu1.3

Packages in group

Deleted packages are displayed in grey.


Version: 7.81.0-1ubuntu1.3 2022-06-29 14:06:20 UTC

  curl (7.81.0-1ubuntu1.3) jammy-security; urgency=medium

  * SECURITY UPDATE: Set-cookie denial of service
    - debian/patches/CVE-2022-32205.patch: apply limits to cookies
      specifications in lib/cookie.c, lib/cookie.h, lib/http.c, lib/urldata.h.
    - CVE-2022-32205
  * SECURITY UPDATE: HTTP compression denial of service
    - debian/patches/CVE-2022-32206.patch: return error on too many
      compression steps in lib/content_encoding.c.
    - CVE-2022-32206
  * SECURITY UPDATE: Unpreserved file permissions
    - debian/patches/CVE-2022-32207.patch: add Curl_fopen()
      for better overwriting of files in lib/Makefile.inc,
      lib/cookie.c, lib/fopen.c, lib/fopen.h.
    - CVE-2022-32207
  * SECURITY UPDATE: FTP-KRB bad msg verification
    - debian/patches/CVE-2022-32208.patch: return error properly
      on decode errors in lib/krb5.c.
    - CVE-2022-32208

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 20 Jun 2022 15:08:01 -0300

Source diff to previous version
CVE-2022-32205 Set-Cookie denial of service
CVE-2022-32206 HTTP compression denial of service
CVE-2022-32207 Unpreserved file permissions
CVE-2022-32208 FTP-KRB bad message verification

Version: 7.81.0-1ubuntu1.2 2022-05-11 14:06:30 UTC

  curl (7.81.0-1ubuntu1.2) jammy-security; urgency=medium

  * SECURITY UPDATE: percent-encoded path separator in URL host
    - debian/patches/CVE-2022-27780.patch: reject percent-decoding host
      name into separator bytes in lib/urlapi.c.
    - CVE-2022-27780
  * SECURITY UPDATE: CERTINFO never-ending busy-loop
    - debian/patches/CVE-2022-27781.patch: return error if seemingly stuck
      in a cert loop in lib/vtls/nss.c.
    - CVE-2022-27781
  * SECURITY UPDATE: TLS and SSH connection too eager reuse
    - debian/patches/CVE-2022-27782.patch: check more TLS details for
      connection reuse in lib/setopt.c, lib/url.c, lib/urldata.h,
      lib/vtls/gtls.c, lib/vtls/openssl.c, lib/vtls/nss.c, lib/vtls/vtls.c,
    - CVE-2022-27782

 -- Marc Deslauriers <email address hidden> Mon, 09 May 2022 08:34:24 -0400

Source diff to previous version
CVE-2022-27780 curl: percent-encoded path separator in URL host
CVE-2022-27781 curl: CERTINFO never-ending busy-loop
CVE-2022-27782 curl: TLS and SSH connection too eager reuse

Version: 7.81.0-1ubuntu1.1 2022-04-28 20:06:27 UTC

  curl (7.81.0-1ubuntu1.1) jammy-security; urgency=medium

    - debian/patches/CVE-2022-22576.patch: check sasl additional
      parameters for conn resuse in lib/strcase.c, lib/strcase.h,
      lib/url.c, lib/urldata.h, lib/vtls/vtls.c.
    - CVE-2022-22576
  * SECURITY UPDATE: Credential leak on redirect
    - debian/patches/CVE-2022-27774-1.patch: store conn_remote_port
      in the info struct to make it available after the connection ended
      in lib/connect.c, lib/urldata.h.
    - debian/patches/CVE-2022-27774-2.patch: redirects to other protocols
      or ports clear auth in lib/transfer.c.
    - debian/patches/CVE-2022-27774-3.patch: adds tests to verify
      these fix in tests/data/Makefile.inc, tests/data/test973,
      tests/data/test974, tests/data/test975, tests/data/test976.
    - CVE-2022-27774
  * SECURITY UPDATE: Bad local IPV6 connection reuse
    - debian/patches/CVE-2022-27775.patch: include the zone id in the
      'bundle' haskey in lib/conncache.c.
    - CVE-2022-27775
  * SECURITY UPDATE: Auth/cookie leak on redirect
    - debian/patches/CVE-2022-27776.patch: avoid auth/cookie on redirects
      same host diff port in lib/http.c, lib/urldata.h.
    - CVE-2022-27776

 -- Leonidas Da Silva Barbosa <email address hidden> Wed, 20 Apr 2022 11:50:18 -0300

CVE-2022-22576 OAUTH2 bearer bypass in connection re-use
CVE-2022-27774 Credential leak on redirect
CVE-2022-27775 Bad local IPv6 connection reuse
CVE-2022-27776 Auth/cookie leak on redirect

About   -   Send Feedback to @ubuntu_updates