Hello community, here is the log from the commit of package patchinfo.5542 for openSUSE:13.2:Update checked in at 2016-09-02 15:01:52 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.5542 (Old) and /work/SRC/openSUSE:13.2:Update/.patchinfo.5542.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "patchinfo.5542" Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo incident="5542"> <issue id="991389" tracker="bnc">VUL-0: CVE-2016-5419: curl: TLS session resumption client cert bypass</issue> <issue id="991746" tracker="bnc">SLES 12 libcurl performance decline from SLES 11 SP4</issue> <issue id="991391" tracker="bnc">VUL-0: CVE-2016-5421: curl: use of connection struct after free</issue> <issue id="991390" tracker="bnc">VUL-0: CVE-2016-5420: curl: Re-using connections with wrong client cert</issue> <issue id="2016-5419" tracker="cve" /> <issue id="2016-5421" tracker="cve" /> <issue id="2016-5420" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>pjanouch</packager> <description> This update for curl fixes the following issues: - fixing a performance regression with FTP (boo#991746) - TLS session resumption client cert bypass (boo#991389, CVE-2016-5419) - Re-using connections with wrong client cert (boo#991390, CVE-2016-5420) - use of connection struct after free (boo#991391, CVE-2016-5421) </description> <summary>Security update for curl</summary> </patchinfo>