Cloud Foundry Logo
blog single gear
Security Advisory

USN-4402-1: curl vulnerabilities

USN-4402-1: curl vulnerabilities




Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 14.04
  • Canonical Ubuntu 16.04
  • Canonical Ubuntu 18.04


Marek Szlagor, Gregory Jefferis and Jeroen Ooms discovered that curl incorrectly handled certain credentials. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 19.10 and Ubuntu 20.04 LTS. (CVE-2020-8169)

It was discovered that curl incorrectly handled certain parameters. An attacker could possibly use this issue to overwrite a local file. (CVE-2020-8177)

CVEs contained in this USN include: CVE-2020-8169, CVE-2020-8177.

Affected Cloud Foundry Products and Versions

Severity is medium unless otherwise noted.

  • cflinuxfs3
    • All versions prior to 0.196.0
  • Xenial Stemcells
    • 170.x versions prior to 170.222
    • 250.x versions prior to 250.201
    • 315.x versions prior to 315.188
    • 456.x versions prior to 456.115
    • 621.x versions prior to 621.77
    • All other stemcells not listed.
  • CF Deployment
    • All versions prior to v13.6.0


Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:

  • cflinuxfs3
    • Upgrade All versions to 0.196.0 or greater
  • Xenial Stemcells
    • Upgrade 170.x versions to 170.222 or greater
    • Upgrade 250.x versions to 250.201 or greater
    • Upgrade 315.x versions to 315.188 or greater
    • Upgrade 456.x versions to 456.115 or greater
    • Upgrade 621.x versions to 621.77 or greater
    • All other stemcells should be upgraded to the latest version available on
  • CF Deployment
    • Upgrade All versions to v13.6.0 or greater


2020-06-24: Initial vulnerability report published.

Cloud Foundry Foundation Security Team Profile Image

Cloud Foundry Foundation Security Team, AUTHOR