File _patchinfo of Package patchinfo.5626

<patchinfo incident="5626">
  <issue id="991389" tracker="bnc">VUL-0: CVE-2016-5419: curl: TLS session resumption client cert bypass</issue>
  <issue id="991391" tracker="bnc">VUL-0: CVE-2016-5421: curl: use of connection struct after free</issue>
  <issue id="991390" tracker="bnc">VUL-0: CVE-2016-5420: curl: Re-using connections with wrong client cert</issue>
  <issue id="991746" tracker="bnc">SLES 12 libcurl performance decline from SLES 11 SP4</issue>
  <issue id="997420" tracker="bnc">VUL-1: CVE-2016-7141: curl: Incorrect reuse of client certificates</issue>
 
  <issue id="2016-5419" tracker="cve" />
  <issue id="2016-5421" tracker="cve" />
  <issue id="2016-5420" tracker="cve" />
  <issue id="2016-7141" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>pjanouch</packager>
  <description>This update for curl fixes the following issues:

Security issues fixed:
- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-5421: use of connection struct after free (bsc#991391)
- CVE-2016-7141: Fixed incorrect reuse of client certificates with NSS (bsc#997420)

Also the following bug was fixed:
- fixing a performance issue (bsc#991746)

This update was imported from the SUSE:SLE-12:Update update project.</description>
  <summary>Security update for curl</summary>
</patchinfo>
openSUSE Build Service is sponsored by