Advisories ยป MGASA-2016-0285

Updated curl packages fix security vulnerability

Publication date: 31 Aug 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-5419 , CVE-2016-5420 , CVE-2016-5421

Description

libcurl before 7.50.1 would attempt to resume a TLS session even if the
client certificate had changed. That is unacceptable since a server by
specification is allowed to skip the client certificate check on resume,
and may instead use the old identity which was established by the previous
certificate (or no certificate) (CVE-2016-5419).

In libcurl before 7.50.1, when using a client certificate for a connection
that was then put into the connection pool, that connection could then
wrongly get reused in a subsequent request to that same server. This
mistakenly using the wrong connection could lead to applications sending
requests to the wrong realms of the server using authentication that it
wasn't supposed to have for those operations (CVE-2016-5420).

libcurl before 7.50.1 is vulnerable to a use-after-free flaw in
curl_easy_perform() (CVE-2016-5421).
                

References

SRPMS

5/core