openSUSE Security Update : curl (openSUSE-2016-1124)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for curl fixes the following issues :

Security issues fixed :

- CVE-2016-5419: TLS session resumption client cert bypass
(bsc#991389)

- CVE-2016-5420: Re-using connections with wrong client
cert (bsc#991390)

- CVE-2016-5421: use of connection struct after free
(bsc#991391)

- CVE-2016-7141: Fixed incorrect reuse of client
certificates with NSS (bsc#997420)

Also the following bug was fixed :

- fixing a performance issue (bsc#991746)

This update was imported from the SUSE:SLE-12:Update update project.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=991389
https://bugzilla.opensuse.org/show_bug.cgi?id=991390
https://bugzilla.opensuse.org/show_bug.cgi?id=991391
https://bugzilla.opensuse.org/show_bug.cgi?id=991746
https://bugzilla.opensuse.org/show_bug.cgi?id=997420

Solution :

Update the affected curl packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: SuSE Local Security Checks

Nessus Plugin ID: 93708 ()

Bugtraq ID:

CVE ID: CVE-2016-5419
CVE-2016-5420
CVE-2016-5421
CVE-2016-7141

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now