Users will have to upgrade their systems in order to fix the problem

Feb 5, 2014 18:01 GMT  ·  By

Canonical published in a security notice details about another curl vulnerability in its Ubuntu 13.10, Ubuntu 13.04, Ubuntu 12.10, and Ubuntu 12.04 LTS operating systems.

According to the company, libcurl could have been made to expose sensitive information.

It has been discovered that libcurl incorrectly reused connections when NTLM authentication was being used. This could have led to the use of unintended credentials, possibly exposing sensitive information in the process.

For a more detailed description of the problems, you can see Canonical's security notification.

The security flaws can be fixed if you upgrade your system(s) to the latest libcurl3-nss, libcurl3-gnutls, and libcurl3 packages specific to each distribution. To apply the update, run the Update Manager application.

In general, a standard system update will make all the necessary changes. A system restart will not be needed.