You are here

Hírolvasó

USN-3587-2: Dovecot vulnerabilities

Ubuntu security notices - 2018.04.02, h - 15:41
dovecot vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 ESM
Summary

Several security issues were fixed in Dovecot.

Software Description
  • dovecot - IMAP and POP3 email server
Details

USN-3587-1 fixed a vulnerability in Dovecot. This update provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

It was discovered that Dovecot incorrectly handled parsing certain email addresses. A remote attacker could use this issue to cause Dovecot to crash, resulting in a denial of service, or possibly obtain sensitive information. (CVE-2017-14461)

It was discovered that Dovecot incorrectly handled TLS SNI config lookups. A remote attacker could possibly use this issue to cause Dovecot to crash, resulting in a denial of service. (CVE-2017-15130)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 ESM
dovecot-core - 1:2.0.19-0ubuntu2.5

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Kategóriák: Securiy

USN-3531-3: intel-microcode update

Ubuntu security notices - 2018.03.29, cs - 17:36
intel-microcode update

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

The system could be made to expose sensitive information.

Software Description
  • intel-microcode - Processor microcode for Intel CPUs
Details

Jann Horn discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2017-5715)

This update provides the corrected microcode updates required for the corresponding Linux kernel updates.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
intel-microcode - 3.20180312.0~ubuntu17.10.1
Ubuntu 16.04 LTS
intel-microcode - 3.20180312.0~ubuntu16.04.1
Ubuntu 14.04 LTS
intel-microcode - 3.20180312.0~ubuntu14.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

References
Kategóriák: Securiy

USN-3545-1: Thunderbird vulnerabilities

Ubuntu security notices - 2018.03.29, cs - 16:14
thunderbird vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Several security issues were fixed in Thunderbird.

Software Description
  • thunderbird - Mozilla Open Source mail and newsgroup client
Details

Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, or execute arbitrary code. (CVE-2018-5125, CVE-2018-5127, CVE-2018-5129, CVE-2018-5144, CVE-2018-5145, CVE-2018-5146)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
thunderbird - 1:52.7.0+build1-0ubuntu0.17.10.1
Ubuntu 16.04 LTS
thunderbird - 1:52.7.0+build1-0ubuntu0.16.04.1
Ubuntu 14.04 LTS
thunderbird - 1:52.7.0+build1-0ubuntu0.14.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Thunderbird to make all the necessary changes.

References
Kategóriák: Securiy

USN-3612-1: librelp vulnerability

Ubuntu security notices - 2018.03.28, sze - 20:58
librelp vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
Summary

librelp could be made to crash or run programs if it received specially crafted network traffic.

Software Description
  • librelp - Reliable Event Logging Protocol (RELP) library
Details

Bas van Schaik and Kevin Backhouse discovered that librelp incorrectly handled checking certain x509 certificates. A remote attacker able to connect to rsyslog could possibly use this issue to execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS
librelp0 - 1.2.2-2ubuntu1.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart rsyslog to make all the necessary changes.

References
Kategóriák: Securiy

USN-3611-1: OpenSSL vulnerability

Ubuntu security notices - 2018.03.28, sze - 20:53
openssl vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

OpenSSL could be made to crash if it received specially crafted network traffic.

Software Description
  • openssl - Secure Socket Layer (SSL) cryptographic library and tools
Details

It was discovered that OpenSSL incorrectly handled certain ASN.1 types. A remote attacker could possibly use this issue to cause a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
libssl1.0.0 - 1.0.2g-1ubuntu13.4
Ubuntu 16.04 LTS
libssl1.0.0 - 1.0.2g-1ubuntu4.11
Ubuntu 14.04 LTS
libssl1.0.0 - 1.0.1f-1ubuntu2.24

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

References
Kategóriák: Securiy

USN-3610-1: ICU vulnerability

Ubuntu security notices - 2018.03.28, sze - 20:46
icu vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

ICU could be made to crash if it received specially crafted input.

Software Description
  • icu - International Components for Unicode library
Details

It was discovered that ICU incorrectly handled certain calendars. If an application using ICU processed crafted data, a remote attacker could possibly cause it to crash, leading to a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
libicu57 - 57.1-6ubuntu0.3
Ubuntu 16.04 LTS
libicu55 - 55.1-7ubuntu0.4
Ubuntu 14.04 LTS
libicu52 - 52.1-3ubuntu0.8

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Kategóriák: Securiy

USN-3609-1: Firefox vulnerability

Ubuntu security notices - 2018.03.27, k - 23:10
firefox vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Firefox could be made to crash or run programs as your login if it opened a malicious website.

Software Description
  • firefox - Mozilla Open Source web browser
Details

A use-after-free was discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service or execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
firefox - 59.0.2+build1-0ubuntu0.17.10.1
Ubuntu 16.04 LTS
firefox - 59.0.2+build1-0ubuntu0.16.04.1
Ubuntu 14.04 LTS
firefox - 59.0.2+build1-0ubuntu0.14.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make all the necessary changes.

References
Kategóriák: Securiy

USN-3608-1: Zsh vulnerabilities

Ubuntu security notices - 2018.03.27, k - 17:16
zsh vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Several security issues were fixed in Zsh.

Software Description
  • zsh - shell with lots of features
Details

Richard Maciel Costa discovered that Zsh incorrectly handled certain inputs. An attacker could possibly use this to cause a denial of service. (CVE-2018-1071)

It was discovered that Zsh incorrectly handled certain files. An attacker could possibly use this to execute arbitrary code. (CVE-2018-1083)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
zsh - 5.2-5ubuntu1.2
Ubuntu 16.04 LTS
zsh - 5.1.1-1ubuntu2.2
Ubuntu 14.04 LTS
zsh - 5.0.2-3ubuntu6.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Zsh to make all the necessary changes

References
Kategóriák: Securiy

USN-3607-1: Screen Resolution Extra vulnerability

Ubuntu security notices - 2018.03.27, k - 00:35
screen-resolution-extra vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Screen Resolution Extra could be tricked into bypassing PolicyKit authorizations.

Software Description
  • screen-resolution-extra - Extension for the GNOME screen resolution applet
Details

It was discovered that Screen Resolution Extra was using PolicyKit in an unsafe manner. A local attacker could potentially exploit this issue to bypass intended PolicyKit authorizations.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
screen-resolution-extra - 0.17.1.1
Ubuntu 16.04 LTS
screen-resolution-extra - 0.17.1.1~16.04.1
Ubuntu 14.04 LTS
screen-resolution-extra - 0.17.1.1~14.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Kategóriák: Securiy

USN-3606-1: LibTIFF vulnerabilities

Ubuntu security notices - 2018.03.26, h - 14:50
tiff vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

LibTIFF could be made to crash or run programs as your login if it opened a specially crafted file.

Software Description
  • tiff - Tag Image File Format (TIFF) library
Details

It was discovered that LibTIFF incorrectly handled certain malformed images. If a user or automated system were tricked into opening a specially crafted image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
libtiff-tools - 4.0.8-5ubuntu0.1
libtiff5 - 4.0.8-5ubuntu0.1
Ubuntu 16.04 LTS
libtiff-tools - 4.0.6-1ubuntu0.4
libtiff5 - 4.0.6-1ubuntu0.4
Ubuntu 14.04 LTS
libtiff-tools - 4.0.3-7ubuntu0.9
libtiff5 - 4.0.3-7ubuntu0.9

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Kategóriák: Securiy

USN-3595-2: Samba vulnerability

Ubuntu security notices - 2018.03.23, p - 19:24
samba vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 ESM
Summary

Samba could be made to crash if it received specially crafted input.

Software Description
  • samba - SMB/CIFS file, print, and login server for Unix
Details

USN-3595-1 fix a vulnerability in Samba. This update provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

It was discovered that Samba incorrectly validated inputs to the RPC spoolss service. An authenticated attacker could use this issue to cause the service to crash, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 ESM
samba - 2:3.6.25-0ubuntu0.12.04.15

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Kategóriák: Securiy

USN-3605-1: Sharutils vulnerability

Ubuntu security notices - 2018.03.22, cs - 17:13
sharutils vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Sharutils could be made to execute arbitrary code if it opened a specially crafted file.

Software Description
  • sharutils - shar, unshar, uuencode, uudecode
Details

It was discovered that Sharutils incorrectly handled certain files. An attacker could possibly use this to execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
sharutils - 1:4.15.2-2ubuntu0.1
Ubuntu 16.04 LTS
sharutils - 1:4.15.2-1ubuntu0.1
Ubuntu 14.04 LTS
sharutils - 1:4.14-1ubuntu1.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Kategóriák: Securiy

USN-3604-1: libvorbis vulnerability

Ubuntu security notices - 2018.03.22, cs - 13:15
libvorbis vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

libvorbis could be made to crash or run programs as your login if it opened a specially crafted file.

Software Description
  • libvorbis - The Vorbis General Audio Compression Codec
Details

Richard Zhu discovered that libvorbis incorrectly handled certain sound files. An attacker could use this to cause libvorbis to crash, resulting in a denial or service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
libvorbis0a - 1.3.5-4ubuntu0.2
Ubuntu 16.04 LTS
libvorbis0a - 1.3.5-3ubuntu0.2
Ubuntu 14.04 LTS
libvorbis0a - 1.3.2-1.3ubuntu1.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system upgrade you need to restart any applications that use libvorbis, such as Totem and gtkpod, to effect the necessary changes.

References
Kategóriák: Securiy

USN-3603-2: Paramiko vulnerability

Ubuntu security notices - 2018.03.20, k - 21:29
paramiko vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 ESM
Summary

Paramiko could be made to run programs if it received specially crafted network traffic.

Software Description
  • paramiko - Make ssh v2 connections with Python
Details

USN-3603-1 fixed a vulnerability in Paramiko. This update provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Matthijs Kooijman discovered that Paramiko’s SSH server implementation did not properly require authentication before processing requests. An unauthenticated remote attacker could possibly use this to execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 ESM
python-paramiko - 1.7.7.1-2ubuntu1.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart any applications using Paramiko’s server implementation to make all the necessary changes.

References
Kategóriák: Securiy

USN-3603-1: Paramiko vulnerability

Ubuntu security notices - 2018.03.20, k - 21:10
paramiko vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Paramiko could be made to run programs if it received specially crafted network traffic.

Software Description
  • paramiko - Python SSH2 library
Details

Matthijs Kooijman discovered that Paramiko’s SSH server implementation did not properly require authentication before processing requests. An unauthenticated remote attacker could possibly use this to execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
python-paramiko - 2.0.0-1ubuntu0.1
python3-paramiko - 2.0.0-1ubuntu0.1
Ubuntu 16.04 LTS
python-paramiko - 1.16.0-1ubuntu0.1
python3-paramiko - 1.16.0-1ubuntu0.1
Ubuntu 14.04 LTS
python-paramiko - 1.10.1-1git1ubuntu0.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart any applications using Paramiko’s server implementation to make all the necessary changes.

References
Kategóriák: Securiy

USN-3602-1: LibTIFF vulnerabilities

Ubuntu security notices - 2018.03.20, k - 19:20
tiff vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

LibTIFF could be made to crash or run programs as your login if it opened a specially crafted file.

Software Description
  • tiff - Tag Image File Format (TIFF) library
Details

It was discovered that LibTIFF incorrectly handled certain malformed images. If a user or automated system were tricked into opening a specially crafted image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS
libtiff-tools - 4.0.6-1ubuntu0.3
libtiff5 - 4.0.6-1ubuntu0.3
Ubuntu 14.04 LTS
libtiff-tools - 4.0.3-7ubuntu0.8
libtiff5 - 4.0.3-7ubuntu0.8

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Kategóriák: Securiy

USN-3601-1: Memcached vulnerability

Ubuntu security notices - 2018.03.19, h - 20:53
memcached vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Memcached could be made to crash if it received specially crafted network traffic.

Software Description
  • memcached - high-performance memory object caching system
Details

It was discovered that Memcached incorrectly handled reusing certain items. A remote attacker could possibly use this issue to cause Memcached to crash, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
memcached - 1.4.33-1ubuntu3.3
Ubuntu 16.04 LTS
memcached - 1.4.25-2ubuntu1.4
Ubuntu 14.04 LTS
memcached - 1.4.14-0ubuntu9.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Kategóriák: Securiy

USN-3600-1: PHP vulnerabilities

Ubuntu security notices - 2018.03.19, h - 13:53
php5, php7.0, php7.1 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Several security issues were fixed in PHP.

Software Description
  • php7.1 - HTML-embedded scripting language interpreter
  • php7.0 - HTML-embedded scripting language interpreter
  • php5 - HTML-embedded scripting language interpreter
Details

It was discovered that PHP incorrectly handled certain stream metadata. A remote attacker could possibly use this issue to set arbitrary metadata. This issue only affected Ubuntu 14.04 LTS. (CVE-2016-10712)

It was discovered that PHP incorrectly handled the PHAR 404 error page. A remote attacker could possibly use this issue to conduct cross-site scripting (XSS) attacks. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2018-5712)

It was discovered that PHP incorrectly handled parsing certain HTTP responses. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2018-7584)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
libapache2-mod-php7.1 - 7.1.15-0ubuntu0.17.10.1
php7.1-cgi - 7.1.15-0ubuntu0.17.10.1
php7.1-cli - 7.1.15-0ubuntu0.17.10.1
php7.1-fpm - 7.1.15-0ubuntu0.17.10.1
Ubuntu 16.04 LTS
libapache2-mod-php7.0 - 7.0.28-0ubuntu0.16.04.1
php7.0-cgi - 7.0.28-0ubuntu0.16.04.1
php7.0-cli - 7.0.28-0ubuntu0.16.04.1
php7.0-fpm - 7.0.28-0ubuntu0.16.04.1
Ubuntu 14.04 LTS
libapache2-mod-php5 - 5.5.9+dfsg-1ubuntu4.24
php5-cgi - 5.5.9+dfsg-1ubuntu4.24
php5-cli - 5.5.9+dfsg-1ubuntu4.24
php5-fpm - 5.5.9+dfsg-1ubuntu4.24

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In Ubuntu 16.04 LTS and Ubuntu 17.10, this update uses a new upstream release, which includes additional bug fixes.

In general, a standard system update will make all the necessary changes.

References
Kategóriák: Securiy

USN-3599-1: Firefox vulnerability

Ubuntu security notices - 2018.03.16, p - 23:48
firefox vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Firefox could be made to crash or run programs as your login if it opened a malicious website.

Software Description
  • firefox - Mozilla Open Source web browser
Details

An out-of-bounds write was discovered when processing Vorbis audio data. If a user were tricked in to opening a specially crafted website, an attacker could exploit this to cause a denial of service, or execute arbitrary code. (CVE-2018-5146)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
firefox - 59.0.1+build1-0ubuntu0.17.10.1
Ubuntu 16.04 LTS
firefox - 59.0.1+build1-0ubuntu0.16.04.1
Ubuntu 14.04 LTS
firefox - 59.0.1+build1-0ubuntu0.14.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make all the necessary changes.

References
Kategóriák: Securiy

USN-3598-1: curl vulnerabilities

Ubuntu security notices - 2018.03.15, cs - 14:02
curl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
Summary

Several security issues were fixed in curl.

Software Description
  • curl - HTTP, HTTPS, and FTP client and client libraries
Details

Phan Thanh discovered that curl incorrectly handled certain FTP paths. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2018-1000120)

Dario Weisser discovered that curl incorrectly handled certain LDAP URLs. An attacker could possibly use this issue to cause a denial of service. (CVE-2018-1000121)

Max Dymond discovered that curl incorrectly handled certain RTSP data. An attacker could possibly use this to cause a denial of service or even to get access to sensitive data. (CVE-2018-1000122)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10
curl - 7.55.1-1ubuntu2.4
libcurl3 - 7.55.1-1ubuntu2.4
libcurl3-gnutls - 7.55.1-1ubuntu2.4
libcurl3-nss - 7.55.1-1ubuntu2.4
Ubuntu 16.04 LTS
curl - 7.47.0-1ubuntu2.7
libcurl3 - 7.47.0-1ubuntu2.7
libcurl3-gnutls - 7.47.0-1ubuntu2.7
libcurl3-nss - 7.47.0-1ubuntu2.7
Ubuntu 14.04 LTS
curl - 7.35.0-1ubuntu2.15
libcurl3 - 7.35.0-1ubuntu2.15
libcurl3-gnutls - 7.35.0-1ubuntu2.15
libcurl3-nss - 7.35.0-1ubuntu2.15

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References
Kategóriák: Securiy

Oldalak

Subscribe to Informatikai megoldások hírolvasó