curl (7.47.0-1ubuntu2.1) xenial-security; urgency=medium

  * SECURITY UPDATE: TLS session resumption client cert bypass
    - debian/patches/CVE-2016-5419.patch: switch off SSL session id when
      client cert is used in lib/url.c, lib/urldata.h, lib/vtls/vtls.c.
    - CVE-2016-5419
  * SECURITY UPDATE: re-using connections with wrong client cert
    - debian/patches/CVE-2016-5420.patch: only reuse connections with the
      same client cert in lib/vtls/vtls.c.
    - CVE-2016-5420
  * SECURITY UPDATE: use of connection struct after free
    - debian/patches/CVE-2016-5421.patch: clear connection pointer for easy
      handles in lib/multi.c.
    - CVE-2016-5421

Date: 2016-08-05 17:14:12.766529+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.1
Sorry, changesfile not available.
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to