curl (7.47.0-1ubuntu2.1) xenial-security; urgency=medium

  * SECURITY UPDATE: TLS session resumption client cert bypass
    - debian/patches/CVE-2016-5419.patch: switch off SSL session id when
      client cert is used in lib/url.c, lib/urldata.h, lib/vtls/vtls.c.
    - CVE-2016-5419
  * SECURITY UPDATE: re-using connections with wrong client cert
    - debian/patches/CVE-2016-5420.patch: only reuse connections with the
      same client cert in lib/vtls/vtls.c.
    - CVE-2016-5420
  * SECURITY UPDATE: use of connection struct after free
    - debian/patches/CVE-2016-5421.patch: clear connection pointer for easy
      handles in lib/multi.c.
    - CVE-2016-5421

Date: 2016-08-05 17:14:12.766529+00:00
Changed-By: Marc Deslauriers <>
Signed-By: Ubuntu Archive Robot 
Sorry, changesfile not available.
Xenial-changes mailing list
Modify settings or unsubscribe at:

Reply via email to