Linux Security
    Linux Security
    Linux Security

    Debian: DSA-2824-1: curl security update

    Date 19 Dec 2013
    135
    Posted By LinuxSecurity Advisories
    Marc Deslauriers discovered that curl, a file retrieval tool, would mistakenly skip verifying the CN and SAN name fields when digital signature verification was disabled in the libcurl GnuTLS backend.
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2824-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                      Salvatore Bonaccorso
    December 19, 2013                      https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : curl
    Vulnerability  : unchecked tls/ssl certificate host name
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2013-6422
    
    Marc Deslauriers discovered that curl, a file retrieval tool, would
    mistakenly skip verifying the CN and SAN name fields when digital
    signature verification was disabled in the libcurl GnuTLS backend.
    
    The default configuration for the curl package is not affected by this
    issue since the digital signature verification is enabled by default.
    
    The oldstable distribution (squeeze) is not affected by this problem.
    
    For the stable distribution (wheezy), this problem has been fixed in
    version 7.26.0-1+wheezy7.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 7.34.0-1.
    
    We recommend that you upgrade your curl packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    Advisories

    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.