[Bug 1556330] Re: upstream curl bug #1371: p12 client certificates code is broken
Matthew Hall
mhall at mhcomputing.net
Sat Jul 16 01:14:02 UTC 2016
Hello,
I am very sorry for the delay in testing this.
I noticed that the package libcurl4-doc is missing. I wasn't sure if it
was obsolete, or a mistake, or not included in the test packages only.
Otherwise the package is working perfectly and is ready for release to
Ubuntu 14.04 LTS.
Thanks for all of your help to make this fix possible.
Sincerely,
Matthew.
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to curl in Ubuntu.
https://bugs.launchpad.net/bugs/1556330
Title:
upstream curl bug #1371: p12 client certificates code is broken
Status in curl package in Ubuntu:
Fix Released
Status in curl source package in Trusty:
Fix Committed
Bug description:
[Impact]
The bug makes it impossible to use PKCS#12 secure storage of client
certificates and private keys with any affected Ubuntu releases. The
fix is one line fixing a broken switch statement and was already
tested against Ubuntu 14.04 LTS with a rebuilt curl package.
This was fixed in upstream libcurl in the following bug:
https://sourceforge.net/p/curl/bugs/1371/
The bug fix consists of one missing break statement at the end of a
case in a switch statement.
I personally patched the bug using source code release
curl_7.35.0-1ubuntu2.6.dsc, used in Ubuntu 14.04 LTS, and verified it
does indeed fix the bug and all of the package's tests still pass
afterwards.
[Test Case]
The bug can be reproduced using the following libcurl parameters (even
via CLI, pycurl, etc.).
CURLOPT_SSLCERTTYPE == "P12"
CURLOPT_SSLCERT = path to PKCS#12
CURLOPT_SSLKEY = path to PKCS#12
CURLOPT_SSLKEYPASSWD = key for PKCS#12 if needed
Basically, just use a PKCS#12 format client certificate and private
key against some certificate protected web server.
[Regression Potential]
If it could possibly break anything, which is extraordinarily
unlikely, it would break one of the three client certificate formats
(most likely PKCS#12 but also PEM or DER). Note 1/3 formats is already
broken due to the bug. Client certificates of all three types could be
checked to prevent this.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/curl/+bug/1556330/+subscriptions
More information about the foundations-bugs
mailing list