Curl/Evince Updates for Ubuntu
Posted on: 12/05/2017 08:24 AM

The following updates has been released for Ubuntu Linux:

USN-3498-2: curl vulnerability
USN-3503-1: Evince vulnerability

USN-3498-2: curl vulnerability

==========================================================================
Ubuntu Security Notice USN-3498-2
December 04, 2017

curl vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

curl could be made to crash if it received specially crafted
input.

Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries

Details:

USN-3498-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

 It was discovered that curl incorrectly handled FTP wildcard matching.
 A remote attacker could use this issue to cause curl to crash,
 resulting in a denial of service, or possibly obtain sensitive
 information. (CVE-2017-8817)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
  curl 7.22.0-3ubuntu4.19
  libcurl3 7.22.0-3ubuntu4.19
  libcurl3-gnutls 7.22.0-3ubuntu4.19
  libcurl3-nss 7.22.0-3ubuntu4.19

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3498-2
  https://www.ubuntu.com/usn/usn-3498-1
  CVE-2017-8817


USN-3503-1: Evince vulnerability


==========================================================================
Ubuntu Security Notice USN-3503-1
December 04, 2017

evince vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Evince could be made to run programs if it printed a specially crafted
file.

Software Description:
- evince: Document viewer

Details:

It was discovered that Evince incorrectly handled printing certain DVI
files. If a user were tricked into opening and printing a specially-named
DVI file, an attacker could use this issue to execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
evince 3.24.0-0ubuntu1.3
evince-common 3.24.0-0ubuntu1.3

Ubuntu 16.04 LTS:
evince 3.18.2-1ubuntu4.3
evince-common 3.18.2-1ubuntu4.3

Ubuntu 14.04 LTS:
evince 3.10.3-0ubuntu10.4
evince-common 3.10.3-0ubuntu10.4

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3503-1
CVE-2017-1000159

Package Information:
https://launchpad.net/ubuntu/+source/evince/3.24.0-0ubuntu1.3
https://launchpad.net/ubuntu/+source/evince/3.18.2-1ubuntu4.3
https://launchpad.net/ubuntu/+source/evince/3.10.3-0ubuntu10.4





Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/curlevince_updates_for_ubuntu.html)