Hello community,

here is the log from the commit of package patchinfo.5542 for 
openSUSE:13.2:Update checked in at 2016-09-02 15:01:52
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.5542 (Old)
 and      /work/SRC/openSUSE:13.2:Update/.patchinfo.5542.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.5542"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="5542">
  <issue id="991389" tracker="bnc">VUL-0: CVE-2016-5419: curl: TLS session 
resumption client cert bypass</issue>
  <issue id="991746" tracker="bnc">SLES 12 libcurl performance decline from  
SLES 11 SP4</issue>
  <issue id="991391" tracker="bnc">VUL-0: CVE-2016-5421: curl: use of 
connection struct after free</issue>
  <issue id="991390" tracker="bnc">VUL-0: CVE-2016-5420: curl: Re-using 
connections with wrong client cert</issue>
  <issue id="2016-5419" tracker="cve" />
  <issue id="2016-5421" tracker="cve" />
  <issue id="2016-5420" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>pjanouch</packager>
  <description>
This update for curl fixes the following issues:

- fixing a performance regression with FTP (boo#991746)
- TLS session resumption client cert bypass (boo#991389, CVE-2016-5419)
- Re-using connections with wrong client cert (boo#991390, CVE-2016-5420)
- use of connection struct after free (boo#991391, CVE-2016-5421)

</description>
  <summary>Security update for curl</summary>
</patchinfo>

Reply via email to