GLSA-201703-04 : cURL: Certificate validation error

Medium Nessus Plugin ID 99011


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-201703-04 (cURL: Certificate validation error)

cURL and applications linked against libcurl support “OCSP stapling”, also known as the TLS Certificate Status Request extension (using the CURLOPT_SSL_VERIFYSTATUS option). When telling cURL to use this feature, it uses that TLS extension to ask for a fresh proof of the server’s certificate’s validity. If the server doesn’t support the extension, or fails to provide said proof, cURL is expected to return an error.
Due to a coding mistake, the code that checks for a test success or failure, ends up always thinking there’s valid proof, even when there is none or if the server doesn’t support the TLS extension in question.
Impact :

Due to the error, a user maybe does not detect when a server’s certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality.
Workaround :

There is no known workaround at this time.


All cURL users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-misc/curl-7.53.0'

See Also

Plugin Details

Severity: Medium

ID: 99011

File Name: gentoo_GLSA-201703-04.nasl

Version: $Revision: 3.1 $

Type: local

Published: 2017/03/28

Modified: 2017/03/28

Dependencies: 12634

Risk Information

Risk Factor: Medium

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:curl, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 2017/03/28

Reference Information

CVE: CVE-2017-2629

GLSA: 201703-04