| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
(closes: #844726)
|
| |
|
| |
|
|
|
|
| |
[CVE-2016-9442]
|
|
|
|
| |
[CVE-2016-9425] [CVE-2016-9428]
|
| |
|
| |
|
| |
|
|
|
|
| |
[CVE-2016-9435] [CVE-2016-9436]
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
[CVE-2016-9423] [CVE-2016-9431]
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
- Use SSL_OP_NO_COMPRESSION if available due to the "CRIME attack".
[CVE-2012-4929]
- Use SSL_MODE_RELEASE_BUFFERS if available.
|
| |
|
| |
|
| |
|
|
|
|
| |
Bug: https://sourceforge.net/p/w3m/patches/66/
|
| |
|