{"affected":[{"ecosystem_specific":{"binaries":[{"libcurl-devel":"7.19.7-1.20.42.1"}]},"package":{"ecosystem":"SUSE:Studio Onsite 1.3","name":"curl","purl":"pkg:rpm/suse/curl&distro=SUSE%20Studio%20Onsite%201.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"7.19.7-1.20.42.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for curl fixes the following issues:\n\n- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)\n- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)\n","id":"SUSE-SU-2016:2155-1","modified":"2016-08-25T13:04:29Z","published":"2016-08-25T13:04:29Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20162155-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/991389"},{"type":"REPORT","url":"https://bugzilla.suse.com/991390"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5419"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5420"}],"related":["CVE-2016-5419","CVE-2016-5420"],"summary":"Security update for curl","upstream":["CVE-2016-5419","CVE-2016-5420"]}