![]() Fixes following two vulnerabilities:
* CVE-2023-38545: SOCKS5 heap buffer overflow
https://curl.se/docs/CVE-2023-38545.html
* CVE-2023-38546: cookie injection with none file
https://curl.se/docs/CVE-2023-38546.html
Signed-off-by: Jan Čermák <sairon@sairon.cz>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit
|
||
---|---|---|
.. | ||
Config.in | ||
libcurl.hash | ||
libcurl.mk |