Hi Alessandro,
On Thu, Apr 10, 2014 at 01:38:37PM +0200, Alessandro Ghedini wrote:
> On gio, apr 10, 2014 at 12:47:39 +0200, Moritz Muehlenhoff wrote:
> > On Thu, Apr 10, 2014 at 12:01:03PM +0200, Alessandro Ghedini wrote:
> > > On mer, mar 26, 2014 at 06:50:41 +0100, Salvatore Bonaccorso wrote:
>
On gio, apr 10, 2014 at 12:47:39 +0200, Moritz Muehlenhoff wrote:
> On Thu, Apr 10, 2014 at 12:01:03PM +0200, Alessandro Ghedini wrote:
> > On mer, mar 26, 2014 at 06:50:41 +0100, Salvatore Bonaccorso wrote:
> > > Package: curl
> > > Version: 7.21.0-1
> > > Severity: grave
> > > Tags: security upst
On Thu, Apr 10, 2014 at 12:01:03PM +0200, Alessandro Ghedini wrote:
> On mer, mar 26, 2014 at 06:50:41 +0100, Salvatore Bonaccorso wrote:
> > Package: curl
> > Version: 7.21.0-1
> > Severity: grave
> > Tags: security upstream fixed-upstream
> >
> > Hi Alessandro,
> >
> > For having this reference
On mer, mar 26, 2014 at 06:50:41 +0100, Salvatore Bonaccorso wrote:
> Package: curl
> Version: 7.21.0-1
> Severity: grave
> Tags: security upstream fixed-upstream
>
> Hi Alessandro,
>
> For having this referenced also in the Debian BTS, the following
> vulnerabilities were published for curl.
>
Package: curl
Version: 7.21.0-1
Severity: grave
Tags: security upstream fixed-upstream
Hi Alessandro,
For having this referenced also in the Debian BTS, the following
vulnerabilities were published for curl.
CVE-2014-0138[0]:
libcurl wrong re-use of connections
CVE-2014-0139[1]:
libcurl IP addr
5 matches
Mail list logo