![]() Fixes the following security issues: CVE-2024-23770: Local Leak of Authentication Parameter in Process List CVE-2024-23771: Basic Auth Timing Attack https://security.opensuse.org/2024/01/22/darkhttpd-basic-auth-issues.html Notice that CVE-2024-23770 is only documented as a known weakness, not fixed. Also change the license logic to use the dedicated COPYING file available since 1.14: |
||
---|---|---|
.. | ||
Config.in | ||
S50darkhttpd | ||
darkhttpd.hash | ||
darkhttpd.mk | ||
darkhttpd.service |