—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-3638-1 security@debian.org
https://www.debian.org/security/ Alessandro Ghedini
August 03, 2016 https://www.debian.org/security/faq
– ————————————————————————-
Package : curl
CVE ID : CVE-2016-5419 CVE-2016-5420 CVE-2016-5421
Several vulnerabilities were discovered in cURL, an URL transfer library:
CVE-2016-5419
Bru Rom discovered that libcurl would attempt to resume a TLS session
even if the client certificate had changed.
CVE-2016-5420
It was discovered that libcurl did not consider client certificates
when reusing TLS connections.
CVE-2016-5421
Marcelo Echeverria and Fernando Muñoz discovered that libcurl was
vulnerable to a use-after-free flaw.
For the stable distribution (jessie), these problems have been fixed in
version 7.38.0-4+deb8u4.
For the unstable distribution (sid), these problems have been fixed in
version 7.50.1-1.
We recommend that you upgrade your curl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=7epV
—–END PGP SIGNATURE—–