summaryrefslogtreecommitdiff
path: root/README_LVM.TXT
diff options
context:
space:
mode:
authorPatrick J Volkerding <volkerdi@slackware.com>2022-05-11 19:01:59 +0000
committerEric Hameleers <alien@slackware.com>2022-05-12 13:29:51 +0200
commit96bf53e55d898cd6e2090476ee0f9066138d9ea3 (patch)
treee71e51c666db7941b21ce6c16630997c3f39bd83 /README_LVM.TXT
parent3c08cf6792eda8b7caf0d00f330bf289a5501341 (diff)
downloadcurrent-20220511190159_15.0.tar.gz
Wed May 11 19:01:59 UTC 202220220511190159_15.0
patches/packages/curl-7.83.1-x86_64-1_slack15.0.txz: Upgraded. This update fixes security issues: HSTS bypass via trailing dot. TLS and SSH connection too eager reuse. CERTINFO never-ending busy-loop. percent-encoded path separator in URL host. cookie for trailing dot TLD. curl removes wrong file on error. For more information, see: https://curl.se/docs/CVE-2022-30115.html https://curl.se/docs/CVE-2022-27782.html https://curl.se/docs/CVE-2022-27781.html https://curl.se/docs/CVE-2022-27780.html https://curl.se/docs/CVE-2022-27779.html https://curl.se/docs/CVE-2022-27778.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30115 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27779 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27778 (* Security fix *)
Diffstat (limited to 'README_LVM.TXT')
0 files changed, 0 insertions, 0 deletions