Description:
- CVE-2022-27782: check additional TLS or SSH connection parameters that should
have prohibited connection reuse
- CVE-2022-27781: add limit of certificates which can be traversed breaking
possible infinite loop
- CVE-2022-27780: exclude malicious characters from url to prevent incorrect
address decoding
Updated packages:
-
curl-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
sha:850650ec2b94671182651a51aa38c204cd210fda
-
libcurl-minimal-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
sha:a0e37ce8ed35f9433459f7e93ff16cc1f881df91
-
curl-minimal-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
sha:70b0a4d053fa4b152d1172b3c4f3eb6d72667b41
-
libcurl-devel-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
sha:dcc8ae96ced2adff34b7a0dfad37fd43557f390e
-
libcurl-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
sha:6681f4dc9319d856884523e834e3ec08206aff61
-
libcurl-devel-7.61.1-22.el8.tuxcare.els2.i686.rpm
sha:39c12a185d250f6ce8030c63595f3bb59867633c
-
libcurl-7.61.1-22.el8.tuxcare.els2.i686.rpm
sha:bf3550b109163849426c0401df51a91541d78f18
-
libcurl-minimal-7.61.1-22.el8.tuxcare.els2.i686.rpm
sha:95703b9a681dcedc967ce1598ff72831986fd6b2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.