You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa curl

Sigurnosni nedostaci programskog paketa curl

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-3638-1 security@debian.org
https://www.debian.org/security/ Alessandro Ghedini
August 03, 2016 https://www.debian.org/security/faq
– ————————————————————————-

Package : curl
CVE ID : CVE-2016-5419 CVE-2016-5420 CVE-2016-5421

Several vulnerabilities were discovered in cURL, an URL transfer library:

CVE-2016-5419

Bru Rom discovered that libcurl would attempt to resume a TLS session
even if the client certificate had changed.

CVE-2016-5420

It was discovered that libcurl did not consider client certificates
when reusing TLS connections.

CVE-2016-5421

Marcelo Echeverria and Fernando Muñoz discovered that libcurl was
vulnerable to a use-after-free flaw.

For the stable distribution (jessie), these problems have been fixed in
version 7.38.0-4+deb8u4.

For the unstable distribution (sid), these problems have been fixed in
version 7.50.1-1.

We recommend that you upgrade your curl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=7epV
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa ntp

Otkriveni su sigurnosni nedostaci u programskom paketu ntp za RHEL 6.7 Extended Update Support. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje...

Close