diff options
author | Cristian Rodriguez <crrodriguez@opensuse.org> | 2013-11-07 14:29:54 +0000 |
---|---|---|
committer | Tatsuya Kinoshita <tats@debian.org> | 2013-11-07 14:29:54 +0000 |
commit | 095195f62944b7558ec70a1cd2a59570cddb1dc2 (patch) | |
tree | 26d678c8d02014f89cb0b768a0c82e485293618a /Bonus/2ch.cgi | |
parent | Merge from upstream on 2012-05-22 (diff) | |
download | w3m-095195f62944b7558ec70a1cd2a59570cddb1dc2.tar.gz w3m-095195f62944b7558ec70a1cd2a59570cddb1dc2.zip |
Use SSL_OP_NO_COMPRESSION if available
Due to the "CRIME attack" (CVE-2012-4929) HTTPS clients
that negotiate TLS-level compression can be abused for
MITM attacks.
Patch from openSUSE on 2012-11-12:
https://build.opensuse.org/request/show/141054
Diffstat (limited to 'Bonus/2ch.cgi')
0 files changed, 0 insertions, 0 deletions