Release date:
2022-06-28 15:41:37 UTC
Description:
* SECURITY UPDATE: malicious server could make libcurl get stuck in a
never-ending busy-loop when trying to retrieve cert information
- debian/patches/CVE-2022-27781.patch: add maximum value of possible
traversed certificates
- CVE-2022-27781
Updated packages:
-
curl_7.47.0-1ubuntu2.23+tuxcare.els2_amd64.deb
sha:f1b8e2de8a4bfc57476787cc3db968607fe4d729
-
libcurl3_7.47.0-1ubuntu2.23+tuxcare.els2_amd64.deb
sha:21e3da2965c235f8897273087a01dc46b47f461c
-
libcurl3-gnutls_7.47.0-1ubuntu2.23+tuxcare.els2_amd64.deb
sha:7ea845b333caebec41612d33899faa1630ad05b1
-
libcurl3-nss_7.47.0-1ubuntu2.23+tuxcare.els2_amd64.deb
sha:ee1ff547c33eb5731522a9f6b82685777ab9f4f9
-
libcurl4-doc_7.47.0-1ubuntu2.23+tuxcare.els2_all.deb
sha:816465d41af425660120beae7e9bf2a7ceadfd9f
-
libcurl4-gnutls-dev_7.47.0-1ubuntu2.23+tuxcare.els2_amd64.deb
sha:abb2b62edc181bf3207b0ea5f41b024141735c9c
-
libcurl4-nss-dev_7.47.0-1ubuntu2.23+tuxcare.els2_amd64.deb
sha:bdb8c31d40bdad823d4bc96989483b1a1fdbb5ab
-
libcurl4-openssl-dev_7.47.0-1ubuntu2.23+tuxcare.els2_amd64.deb
sha:b4068b9d0d1f6ec74bdc67887afa1c2dd92708c2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.