USN-6429-1 fixed vulnerabilities in curl. This update provides the corresponding updates for Ubuntu 23.10.
Original advisory details:
Jay Satiro discovered that curl incorrectly handled hostnames when using a SOCKS5 proxy. In environments where curl is configured to use a SOCKS5 proxy, a remote attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-38545)
It was discovered that curl incorrectly handled cookies when an application duplicated certain handles. A local attacker could possibly create a cookie file and inject arbitrary cookies into subsequent connections. (CVE-2023-38546)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "8.2.1-1ubuntu3.1", "binary_name": "curl" }, { "binary_version": "8.2.1-1ubuntu3.1", "binary_name": "curl-dbgsym" }, { "binary_version": "8.2.1-1ubuntu3.1", "binary_name": "libcurl3-gnutls" }, { "binary_version": "8.2.1-1ubuntu3.1", "binary_name": "libcurl3-gnutls-dbgsym" }, { "binary_version": "8.2.1-1ubuntu3.1", "binary_name": "libcurl3-nss" }, { "binary_version": "8.2.1-1ubuntu3.1", "binary_name": "libcurl3-nss-dbgsym" }, { "binary_version": "8.2.1-1ubuntu3.1", "binary_name": "libcurl4" }, { "binary_version": "8.2.1-1ubuntu3.1", "binary_name": "libcurl4-dbgsym" }, { "binary_version": "8.2.1-1ubuntu3.1", "binary_name": "libcurl4-doc" }, { "binary_version": "8.2.1-1ubuntu3.1", "binary_name": "libcurl4-gnutls-dev" }, { "binary_version": "8.2.1-1ubuntu3.1", "binary_name": "libcurl4-nss-dev" }, { "binary_version": "8.2.1-1ubuntu3.1", "binary_name": "libcurl4-openssl-dev" } ] }