File _patchinfo of Package patchinfo.24053
<patchinfo incident="24053">
<issue tracker="bnc" id="1198723">VUL-1: CVE-2022-27775: curl: Bad local IPv6 connection reuse</issue>
<issue tracker="bnc" id="1198614">VUL-1: CVE-2022-22576: curl: OAUTH2 bearer bypass in connection re-use</issue>
<issue tracker="bnc" id="1198766">VUL-1: CVE-2022-27776: curl: Auth/cookie leak on redirect</issue>
<issue tracker="cve" id="2022-22576"/>
<issue tracker="cve" id="2022-27775"/>
<issue tracker="cve" id="2022-27776"/>
<packager>david.anes</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for curl</summary>
<description>This update for curl fixes the following issues:
- CVE-2022-27776: Fixed auth/cookie leak on redirect (bsc#1198766)
- CVE-2022-27775: Fixed bad local IPv6 connection reuse (bsc#1198723)
- CVE-2022-22576: Fixed OAUTH2 bearer bypass in connection re-use (bsc#1198614)
</description>
</patchinfo>