{"id":"MGASA-2016-0285","summary":"Updated curl packages fix security vulnerability","details":"libcurl before 7.50.1 would attempt to resume a TLS session even if the\nclient certificate had changed. That is unacceptable since a server by\nspecification is allowed to skip the client certificate check on resume,\nand may instead use the old identity which was established by the previous\ncertificate (or no certificate) (CVE-2016-5419).\n\nIn libcurl before 7.50.1, when using a client certificate for a connection\nthat was then put into the connection pool, that connection could then\nwrongly get reused in a subsequent request to that same server. This\nmistakenly using the wrong connection could lead to applications sending\nrequests to the wrong realms of the server using authentication that it\nwasn't supposed to have for those operations (CVE-2016-5420).\n\nlibcurl before 7.50.1 is vulnerable to a use-after-free flaw in\ncurl_easy_perform() (CVE-2016-5421).\n","modified":"2026-04-16T06:23:06.666190413Z","published":"2016-08-31T15:32:33Z","upstream":["CVE-2016-5419","CVE-2016-5420","CVE-2016-5421"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0285.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=19123"},{"type":"WEB","url":"https://curl.haxx.se/docs/adv_20160803A.html"},{"type":"WEB","url":"https://curl.haxx.se/docs/adv_20160803B.html"},{"type":"WEB","url":"https://curl.haxx.se/docs/adv_20160803C.html"}],"affected":[{"package":{"name":"curl","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/curl?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.40.0-3.4.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0285.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}