[CLSA-2022:1671123782] curl: Fix of CVE-2022-32221
Type:
security
Severity:
Critical
Release date:
2022-12-15
Description:
- CVE-2022-32221: fix issue when POST following PUT confusion - fix the contents of some test suites: replace the unsupported variable TESTNUMBER with a real value
Updated packages:
  • curl-7.61.1-22.el8.tuxcare.els5.x86_64.rpm
    sha:a45fa6ed2a0f5bf40c7347826fca50b2b5b497b3
  • curl-minimal-7.61.1-22.el8.tuxcare.els5.x86_64.rpm
    sha:8f19065a5978a99a6228c3123c507210678357ab
  • libcurl-7.61.1-22.el8.tuxcare.els5.i686.rpm
    sha:1728bb3ab533483f9fb5fd5a40af9f14551d124e
  • libcurl-7.61.1-22.el8.tuxcare.els5.x86_64.rpm
    sha:4463ba7be029ff77a35a171aac59a82787ba742e
  • libcurl-devel-7.61.1-22.el8.tuxcare.els5.i686.rpm
    sha:156cda4a2a86f5b26250da942fcc3e132321f444
  • libcurl-devel-7.61.1-22.el8.tuxcare.els5.x86_64.rpm
    sha:66f513837c35f1e540c3263d1e0242598c1d758d
  • libcurl-minimal-7.61.1-22.el8.tuxcare.els5.i686.rpm
    sha:b07f770f255fa3686a04b0ccfe50ff70950c0c7b
  • libcurl-minimal-7.61.1-22.el8.tuxcare.els5.x86_64.rpm
    sha:5f138e66b1302c475e58c2d6bdcb8c3f937f5074
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.