Buy commercial curl support from WolfSSL. We help you work
out your issues, debug your libcurl applications, use the API, port to new
platforms, add new features and more. With a team lead by the curl founder
himself.
Re: CVE-2022-43552
- Contemporary messages sorted: [ by date ] [ by thread ] [ by subject ] [ by author ] [ by messages with attachments ]
From: Petr Pisar via curl-users <curl-users_at_lists.haxx.se>
Date: Sun, 13 Aug 2023 20:36:56 +0200
V Fri, Aug 11, 2023 at 02:06:27PM -0600, Bob via curl-users napsal(a):
> Unfortunately, per RH site for the CVE they have it listed as Out of support scope.
>
That does not mean that RH won't fix it if you ask. That was just an automatic
close for low-level vulnerability in a product which is in a Maintanance
Support 2 phase
<https://access.redhat.com/support/policy/updates/errata/#Maintenance_Support_2_Phase>.
-- Petr
Received on 2023-08-13
Date: Sun, 13 Aug 2023 20:36:56 +0200
V Fri, Aug 11, 2023 at 02:06:27PM -0600, Bob via curl-users napsal(a):
> Unfortunately, per RH site for the CVE they have it listed as Out of support scope.
>
That does not mean that RH won't fix it if you ask. That was just an automatic
close for low-level vulnerability in a product which is in a Maintanance
Support 2 phase
<https://access.redhat.com/support/policy/updates/errata/#Maintenance_Support_2_Phase>.
-- Petr
-- Unsubscribe: https://lists.haxx.se/mailman/listinfo/curl-users Etiquette: https://curl.se/mail/etiquette.html
- application/pgp-signature attachment: signature.asc