curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "curl-udeb": "7.35.0-1ubuntu2.10", "libcurl3": "7.35.0-1ubuntu2.10", "libcurl4-gnutls-dev": "7.35.0-1ubuntu2.10", "libcurl3-dbgsym": "7.35.0-1ubuntu2.10", "libcurl3-nss": "7.35.0-1ubuntu2.10", "libcurl4-doc": "7.35.0-1ubuntu2.10", "libcurl3-udeb-dbgsym": "7.35.0-1ubuntu2.10", "libcurl3-gnutls-dbgsym": "7.35.0-1ubuntu2.10", "libcurl4-openssl-dev": "7.35.0-1ubuntu2.10", "libcurl4-openssl-dev-dbgsym": "7.35.0-1ubuntu2.10", "curl-dbgsym": "7.35.0-1ubuntu2.10", "curl": "7.35.0-1ubuntu2.10", "libcurl3-udeb": "7.35.0-1ubuntu2.10", "curl-udeb-dbgsym": "7.35.0-1ubuntu2.10", "libcurl4-nss-dev-dbgsym": "7.35.0-1ubuntu2.10", "libcurl3-gnutls": "7.35.0-1ubuntu2.10", "libcurl4-gnutls-dev-dbgsym": "7.35.0-1ubuntu2.10", "libcurl3-nss-dbgsym": "7.35.0-1ubuntu2.10", "libcurl3-dbg": "7.35.0-1ubuntu2.10", "libcurl4-nss-dev": "7.35.0-1ubuntu2.10" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libcurl3": "7.47.0-1ubuntu2.2", "libcurl4-gnutls-dev": "7.47.0-1ubuntu2.2", "libcurl3-dbgsym": "7.47.0-1ubuntu2.2", "libcurl3-nss": "7.47.0-1ubuntu2.2", "libcurl4-doc": "7.47.0-1ubuntu2.2", "libcurl3-gnutls-dbgsym": "7.47.0-1ubuntu2.2", "libcurl4-openssl-dev": "7.47.0-1ubuntu2.2", "libcurl4-openssl-dev-dbgsym": "7.47.0-1ubuntu2.2", "curl-dbgsym": "7.47.0-1ubuntu2.2", "curl": "7.47.0-1ubuntu2.2", "libcurl4-nss-dev-dbgsym": "7.47.0-1ubuntu2.2", "libcurl3-gnutls": "7.47.0-1ubuntu2.2", "libcurl4-gnutls-dev-dbgsym": "7.47.0-1ubuntu2.2", "libcurl3-nss-dbgsym": "7.47.0-1ubuntu2.2", "libcurl3-dbg": "7.47.0-1ubuntu2.2", "libcurl4-nss-dev": "7.47.0-1ubuntu2.2" } ] }