File _patchinfo of Package patchinfo.24053

<patchinfo incident="24053">
  <issue tracker="bnc" id="1198723">VUL-1: CVE-2022-27775: curl: Bad local IPv6 connection reuse</issue>
  <issue tracker="bnc" id="1198614">VUL-1: CVE-2022-22576: curl: OAUTH2 bearer bypass in connection re-use</issue>
  <issue tracker="bnc" id="1198766">VUL-1: CVE-2022-27776: curl: Auth/cookie leak on redirect</issue>
  <issue tracker="cve" id="2022-22576"/>
  <issue tracker="cve" id="2022-27775"/>
  <issue tracker="cve" id="2022-27776"/>
  <packager>david.anes</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for curl</summary>
  <description>This update for curl fixes the following issues:

- CVE-2022-27776: Fixed auth/cookie leak on redirect (bsc#1198766)
- CVE-2022-27775: Fixed bad local IPv6 connection reuse (bsc#1198723)
- CVE-2022-22576: Fixed OAUTH2 bearer bypass in connection re-use (bsc#1198614)
</description>
</patchinfo>
openSUSE Build Service is sponsored by