[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1Vi792-0007bM-Cu@alpha.psidef.org>
Date: Sun, 17 Nov 2013 13:32:28 -0500
From: Michael Gilbert <mgilbert@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 2798-1] curl security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2798-1 security@...ian.org
http://www.debian.org/security/ Michael Gilbert
November 17, 2013 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : curl
Vulnerability : unchecked ssl certificate host name
Problem type : remote
Debian-specific: no
CVE ID : CVE-2013-4545
Scott Cantor discovered that curl, a file retrieval tool, would disable
the CURLOPT_SSLVERIFYHOST check when the CURLOPT_SSL_VERIFYPEER setting
was disabled. This would also disable ssl certificate host name checks
when it should have only disabled verification of the certificate trust
chain.
The default configuration for the curl package is not affected by this
issue since CURLOPT_SSLVERIFYPEER is enabled by default.
For the oldstable distribution (squeeze), this problem has been fixed in
version 7.21.0-2.1+squeeze5.
For the stable distribution (wheezy), this problem has been fixed in
version 7.26.0-1+wheezy5.
For the testing (jessie) and unstable (sid) distributions, this problem
has been fixed in version 7.33.0-1.
We recommend that you upgrade your curl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)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=
=6NFF
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists