aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authordelphij <delphij@FreeBSD.org>2013-12-19 07:04:24 +0800
committerdelphij <delphij@FreeBSD.org>2013-12-19 07:04:24 +0800
commit8c22919f153e55385c781806cf0e679d76119d86 (patch)
tree61c87dca698b425a6df10184c8d862fbe31ab876 /security
parent4ccde899e821ee9637699adbd6326766b61cfeb3 (diff)
downloadfreebsd-ports-gnome-8c22919f153e55385c781806cf0e679d76119d86.tar.gz
freebsd-ports-gnome-8c22919f153e55385c781806cf0e679d76119d86.tar.zst
freebsd-ports-gnome-8c22919f153e55385c781806cf0e679d76119d86.zip
Apply vendor fix for CVE-2013-6422, cURL libcurl cert name check ignore
with GnuTLS. Document the vulnerability fix in vuxml while I'm here.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml43
1 files changed, 43 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e5413c1757f2..fcd7fe1f60e7 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,49 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="4e1f4abc-6837-11e3-9cda-3c970e169bc2">
+ <topic>cURL library -- cert name check ignore with GnuTLS</topic>
+ <affects>
+ <package>
+ <name>curl</name>
+ <range><ge>7.21.4</ge><lt>7.33.0_2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>cURL project reports:</p>
+ <blockquote cite="http://curl.haxx.se/docs/adv_20131217.html">
+ <p>libcurl is vulnerable to a case of missing out the checking
+ of the certificate CN or SAN name field when the digital
+ signature verification is turned off.</p>
+ <p>libcurl offers two separate and independent options for
+ verifying a server's TLS certificate. CURLOPT_SSL_VERIFYPEER
+ and CURLOPT_SSL_VERIFYHOST. The first one tells libcurl to
+ verify the trust chain using a CA cert bundle, while the
+ second tells libcurl to make sure that the name fields in
+ the server certificate meets the criteria. Both options are
+ enabled by default.</p>
+ <p>This flaw had the effect that when an application disabled
+ CURLOPT_SSL_VERIFYPEER, libcurl mistakenly also skipped the
+ CURLOPT_SSL_VERIFYHOST check. Applications can disable
+ CURLOPT_SSL_VERIFYPEER and still achieve security by doing
+ the check on its own using other means.</p>
+ <p>The curl command line tool is not affected by this problem
+ as it either enables both options or disables both at the
+ same time.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://curl.haxx.se/docs/adv_20131217.html</url>
+ <cvename>CVE-2013-6422</cvename>
+ </references>
+ <dates>
+ <discovery>2013-12-17</discovery>
+ <entry>2013-12-18</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2e5715f8-67f7-11e3-9811-b499baab0cbe">
<topic>gnupg -- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis attack</topic>
<affects>