From mboxrd@z Thu Jan 1 00:00:00 1970 From: ludo@gnu.org (Ludovic =?utf-8?Q?Court=C3=A8s?=) Subject: Re: [PATCH 0/1] curl: Fix CVE-2016-3739. Date: Sun, 12 Jun 2016 22:51:14 +0200 Message-ID: <87inxei119.fsf@gnu.org> References: Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:39090) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1bCCLs-0008L9-G2 for guix-devel@gnu.org; Sun, 12 Jun 2016 16:51:25 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1bCCLm-0002lt-FR for guix-devel@gnu.org; Sun, 12 Jun 2016 16:51:23 -0400 In-Reply-To: (Leo Famulari's message of "Sat, 11 Jun 2016 23:38:29 -0400") List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org Sender: "Guix-devel" To: Leo Famulari Cc: guix-devel@gnu.org Leo Famulari skribis: > If your SSL / TLS provider is mbedTLS (formerly PolarSSL), there is a > bug in curl [CVE-2016-3739] that allows an attacker to bypass the full > certificate check by presenting any valid certificate. > > So, you might think are connecting to https://example.com, when in fact > the attacker has a certificate for any other domain. > > We don't package mbedTLS, but I still think we should provide the fixed > source code. OTOH this will incur additional grafting for no reason, WDYT? Thanks, Ludo=E2=80=99.