File _patchinfo of Package patchinfo.24053
<patchinfo incident="24053"> <issue tracker="bnc" id="1198723">VUL-1: CVE-2022-27775: curl: Bad local IPv6 connection reuse</issue> <issue tracker="bnc" id="1198614">VUL-1: CVE-2022-22576: curl: OAUTH2 bearer bypass in connection re-use</issue> <issue tracker="bnc" id="1198766">VUL-1: CVE-2022-27776: curl: Auth/cookie leak on redirect</issue> <issue tracker="cve" id="2022-22576"/> <issue tracker="cve" id="2022-27775"/> <issue tracker="cve" id="2022-27776"/> <packager>david.anes</packager> <rating>moderate</rating> <category>security</category> <summary>Security update for curl</summary> <description>This update for curl fixes the following issues: - CVE-2022-27776: Fixed auth/cookie leak on redirect (bsc#1198766) - CVE-2022-27775: Fixed bad local IPv6 connection reuse (bsc#1198723) - CVE-2022-22576: Fixed OAUTH2 bearer bypass in connection re-use (bsc#1198614) </description> </patchinfo>