Description:
- CVE-2022-27782: check additional TLS or SSH connection parameters that should
have prohibited connection reuse
- CVE-2022-27781: add limit of certificates which can be traversed breaking
possible infinite loop
- CVE-2022-27780: exclude malicious characters from url to prevent incorrect
address decoding
Updated packages:
-
curl-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
sha:9f57aa0be76c93125666424f2aa544fbc3f2eb39
-
libcurl-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
sha:02514a125a817d60353b855b14c2cbb66d634077
-
libcurl-devel-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
sha:dd0b51aa89c8467164445f9c233648f33f5d9e75
-
libcurl-7.61.1-22.el8.tuxcare.els2.i686.rpm
sha:4a7bea5818cbe0bfcdcb2588190169b012e65161
-
curl-minimal-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
sha:87a4204ac04664c2df06960b583f4ec3a150e69a
-
libcurl-minimal-7.61.1-22.el8.tuxcare.els2.x86_64.rpm
sha:ffa10d8612db1e0010f835ea9353e4be0b847576
-
libcurl-devel-7.61.1-22.el8.tuxcare.els2.i686.rpm
sha:3830958cde7538d1fc35d82b7ccec89b4c90cc28
-
libcurl-minimal-7.61.1-22.el8.tuxcare.els2.i686.rpm
sha:0e34eefcd29db34bea4a5b7f052c6ffa0af42438
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.