[CLSA-2022:1671123986] curl: Fix of CVE-2022-32221
Type:
security
Severity:
Critical
Release date:
2022-12-15
Description:
- CVE-2022-32221: fix issue when POST following PUT confusion - fix the contents of some test suites: replace the unsupported variable TESTNUMBER with a real value
Updated packages:
  • curl-7.61.1-22.el8.tuxcare.els5.x86_64.rpm
    sha:eb00ebece1122fbddb11ddd36fee2cf3c45437ab
  • curl-minimal-7.61.1-22.el8.tuxcare.els5.x86_64.rpm
    sha:b30b3146f9bebc8a3e5d95e2a4e733e78b18ba9b
  • libcurl-7.61.1-22.el8.tuxcare.els5.i686.rpm
    sha:1155d609a735cb86ba72156036bdd42bdf58c5a8
  • libcurl-7.61.1-22.el8.tuxcare.els5.x86_64.rpm
    sha:d2dd03bd65a7224fd3fadfe448d46b0c6ce2b78e
  • libcurl-devel-7.61.1-22.el8.tuxcare.els5.i686.rpm
    sha:b124884381763934cdac62a744ac2ac6a63b73e9
  • libcurl-devel-7.61.1-22.el8.tuxcare.els5.x86_64.rpm
    sha:36ffdc4e32d7fbc3524008280dc1d1fdd7ecbcc5
  • libcurl-minimal-7.61.1-22.el8.tuxcare.els5.i686.rpm
    sha:875b91252715a5928bb841c9dedf3ce22dd17737
  • libcurl-minimal-7.61.1-22.el8.tuxcare.els5.x86_64.rpm
    sha:914976e854086fb3ccacba80d11a5f2a0c06e505
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.