Summary: | <net-misc/curl-7.49.0: TLS certificate check bypass with mbedTLS/PolarSSL (CVE-2016-3739) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | blueness, gregkh |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2016/05/18/2 | ||
Whiteboard: | A3 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2016-05-18 10:28:43 UTC
(In reply to Agostino Sarubbo from comment #0) > > @maintainer(s): after the bump, in case we need to stabilize the package, > please let us know if it is ready for the stabilization or not. we can start stabilization. KEYWORDS="alpha amd64 arm hppa ia64 ppc ppc64 sparc x86" Arches, please stabilize; =net-misc/curl-7.49.0 Stable targets: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 dependency.bad [fatal] 28 net-misc/curl/curl-7.49.0.ebuild: DEPEND: amd64(default/linux/amd64/13.0) [ 'net-libs/mbedtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?]'] Stable for PPC64. Stable for HPPA. Stable on alpha. (including =net-libs/mbedtls-2.2.1) arm stable amd64 stable x86 stable it looks like ia64 was dropped when mbedtls was added in 7.46.0-r1, but i can't find any comments/bugs pointing this out or requesting ia64 changes. so nothing beyond 7.45.0 has been tested on ia64 at all so far. along those lines, i haven't seen any requests for keyword testing for mbedtls. i've added keywords for the missing arches to mbedtls now though, and re-added ~ia64 to the newer versions of curl. (In reply to SpanKY from comment #10) > > along those lines, i haven't seen any requests for keyword testing for > mbedtls. > > i've added keywords for the missing arches to mbedtls now though, and > re-added ~ia64 to the newer versions of curl. I stabilized net-misc/curl-7.49.0 for ppc and net-libs/mbedtls-2.2.1 for arm/ppc/ppc64 Here's what's left: Keywords for net-misc/curl: | | u | | a a a n p r s | n | | l m r h i m m i p i s p | u s | r | p d a m p a 6 i o p c s 3 a x | s l | e | h 6 r 6 p 6 8 p s p 6 c 9 s r 8 | e o | p | a 4 m 4 a 4 k s 2 c 4 v 0 h c 6 | d t | o ----------+---------------------------------+-----+------- 7.45.0 | + + + + + + + ~ o + + o + + + + | o 0 | gentoo 7.47.1 | ~ ~ + + + ~ ~ ~ o ~ + o ~ ~ ~ ~ | o | gentoo [I]7.49.0 | + + + ~ + ~ ~ ~ o + + o ~ ~ ~ + | o | gentoo 7.49.1 | ~ ~ ~ ~ ~ ~ ~ ~ o ~ ~ o ~ ~ ~ ~ | o | gentoo Keywords for net-libs/mbedtls: | | u | | a a a n p r s | n | | l m r h i m m i p i s p | u s | r | p d a m p a 6 i o p c s 3 a x | s l | e | h 6 r 6 p 6 8 p s p 6 c 9 s r 8 | e o | p | a 4 m 4 a 4 k s 2 c 4 v 0 h c 6 | d t | o ------+---------------------------------+--------+------- 2.1.3 | ~ ~ ~ o ~ o o ~ o ~ ~ o ~ o ~ ~ | # 0/10 | gentoo 2.2.0 | ~ ~ + o + o o ~ o ~ + o ~ o ~ ~ | o | gentoo 2.2.1 | + + + ~ ~ ~ ~ ~ o + + o ~ ~ ~ + | o | gentoo @hppa can you please stablize =net-libs/mbedtls-2.2.1 net-libs/mbedtls-2.2.1: Stable for HPPA. sparc stable ia64 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. (In reply to Agostino Sarubbo from comment #14) > ia64 stable. > > Maintainer(s), please cleanup. > Security, please add it to the existing request, or file a new one. okay vulnerable versions cleaned up. CVE-2016-3739 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3739): The (1) mbed_connect_step1 function in lib/vtls/mbedtls.c and (2) polarssl_connect_step1 function in lib/vtls/polarssl.c in cURL and libcurl before 7.49.0, when using SSLv3 or making a TLS connection to a URL that uses a numerical IP address, allow remote attackers to spoof servers via an arbitrary valid certificate. This issue was resolved and addressed in GLSA 201701-47 at https://security.gentoo.org/glsa/201701-47 by GLSA coordinator Thomas Deutschmann (whissi). This issue was resolved and addressed in GLSA 201701-47 at https://security.gentoo.org/glsa/201701-47 by GLSA coordinator Thomas Deutschmann (whissi). |