File _patchinfo of Package patchinfo.5626
<patchinfo incident="5626">
<issue id="991389" tracker="bnc">VUL-0: CVE-2016-5419: curl: TLS session resumption client cert bypass</issue>
<issue id="991391" tracker="bnc">VUL-0: CVE-2016-5421: curl: use of connection struct after free</issue>
<issue id="991390" tracker="bnc">VUL-0: CVE-2016-5420: curl: Re-using connections with wrong client cert</issue>
<issue id="991746" tracker="bnc">SLES 12 libcurl performance decline from SLES 11 SP4</issue>
<issue id="997420" tracker="bnc">VUL-1: CVE-2016-7141: curl: Incorrect reuse of client certificates</issue>
<issue id="2016-5419" tracker="cve" />
<issue id="2016-5421" tracker="cve" />
<issue id="2016-5420" tracker="cve" />
<issue id="2016-7141" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>pjanouch</packager>
<description>This update for curl fixes the following issues:
Security issues fixed:
- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-5421: use of connection struct after free (bsc#991391)
- CVE-2016-7141: Fixed incorrect reuse of client certificates with NSS (bsc#997420)
Also the following bug was fixed:
- fixing a performance issue (bsc#991746)
This update was imported from the SUSE:SLE-12:Update update project.</description>
<summary>Security update for curl</summary>
</patchinfo>