In order to fix the problem, users just have to update the operating system

Apr 16, 2013 19:31 GMT  ·  By

On May 15, in a security notice Canonical published details about a curl vulnerability for its Ubuntu 12.10, Ubuntu 12.04 LTS, Ubuntu 11.10, Ubuntu 10.04 LTS, and Ubuntu 8.04 LTS operating systems.

According to Canonical, applications using libcurl could be made to expose sensitive information over the network.

It was discovered that libcurl was vulnerable to a cookie leak when the library was performing requests across domains with matching Tails. curl did not properly restrict cookies to the domains and the subdomains.

If a user or automated system were tricked into processing a specially crafted URL, an attacker could read cookie values stored by unrelated webservers.

The security flaws can be fixed if you upgrade your system(s) to the latest libcurl3 package, for each specific distribution. To apply the update, run the Update Manager application.

In general, a standard system update will make all the necessary changes. A system restart won't be necessary to implement the changes.