CVE-2015-3145

Publication date 22 April 2015

Last updated 24 July 2024


Ubuntu priority

The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.

Read the notes from the security team

Status

Package Ubuntu Release Status
curl 15.04 vivid
Fixed 7.38.0-3ubuntu2.2
14.10 utopic
Fixed 7.37.1-1ubuntu3.4
14.04 LTS trusty
Fixed 7.35.0-1ubuntu2.5
12.04 LTS precise
Not affected
10.04 LTS lucid
Not affected

Notes


mdeslaur

7.31.0+

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
curl

References

Related Ubuntu Security Notices (USN)

Other references