-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3638-1 security@xxxxxxxxxx https://www.debian.org/security/ Alessandro Ghedini August 03, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : curl CVE ID : CVE-2016-5419 CVE-2016-5420 CVE-2016-5421 Several vulnerabilities were discovered in cURL, an URL transfer library: CVE-2016-5419 Bru Rom discovered that libcurl would attempt to resume a TLS session even if the client certificate had changed. CVE-2016-5420 It was discovered that libcurl did not consider client certificates when reusing TLS connections. CVE-2016-5421 Marcelo Echeverria and Fernando Muñoz discovered that libcurl was vulnerable to a use-after-free flaw. For the stable distribution (jessie), these problems have been fixed in version 7.38.0-4+deb8u4. For the unstable distribution (sid), these problems have been fixed in version 7.50.1-1. We recommend that you upgrade your curl packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCgAGBQJXoelFAAoJEG8My+AhYkcoivcP/R9PdMtMAPDu4wcFNewTirmt pGLmiGr7cvdB+XsiZzDHT7TaICZ6EVyHWhcIAQsjJMRXvjMdQwz7ZBxywY1jduMs Y7FRMSYva0cDHad7VmYA3vmOKICMp6WJSsHwvAdTVuHS64LKofsXLYvdhwP0do1r HbCjE3QPLXiCIP7gI9fuELZSLqI1VtdeBBbrvc+1TFCFTqUD2drQxkifa+52JCX/ LiItZpdO27kjASyeRVKw4zygRQ4qRksJSRHV7fGAKR3nZXqgZaszL+hLaUjnLm2/ fdzNo06waTq+NLno/Jv6gHKHmQqnOw9dXVlkIEuFR0Fs96JPyLNTJwnCcxId5T30 61qdkQQWP01bNLEn08wCq0JOSiUKo+4zCrjtIBaYYoEsLzIL81y4m7ccezEeroaK EcVb91K7RvQ6yLvfRLFV7tn8vlP4BtwC9UY/GugXr+bW+h4SPoPA/MpG6Od00Kvq B21YkC8NWW0Nv+N/19IE+kkuWj2kkGg57o37kZHHEdmFk/zN4tveShalSFqPHb/2 17I+ybcduGPs5u5JKEEb9MlCLjCKJ4bew6iGI7gR/O5I/sXkytw48rS16SII0GwG OAxGZbaf9lMxurus//gwBaqiKfkIj+qqEd0aE7uQCB4IUZ6ManLfPttGodqm845H DYfowieOUvFCv0qPctOv =7epV -----END PGP SIGNATURE-----