tests
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-14 23:25:29 +02:00 |
.gitignore
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-14 23:25:29 +02:00 |
0001-curl-7.76.1-resource-leaks.patch
|
Resolves: #1938699 - http2: fix resource leaks detected by Coverity
|
2021-05-03 20:49:06 +02:00 |
0002-curl-7.76.1-CVE-2021-22898.patch
|
Resolves: CVE-2021-22898 - fix TELNET stack contents disclosure
|
2021-05-26 13:10:43 +02:00 |
0003-curl-7.76.1-CVE-2021-22901.patch
|
Resolves: CVE-2021-22901 - fix TLS session caching disaster
|
2021-05-26 13:10:45 +02:00 |
0004-curl-7.76.1-ldaps-segv.patch
|
Resolves: #1941925 - fix SIGSEGV upon disconnect of a ldaps:// transfer
|
2021-06-02 15:49:30 +02:00 |
0005-curl-7.76.1-CVE-2021-22924.patch
|
Resolves: CVE-2021-22924 - fix bad connection reuse due to flawed path name checks
|
2021-07-22 09:30:43 +02:00 |
0006-curl-7.76.1-CVE-2021-22925.patch
|
Resolves: CVE-2021-22925 - fix TELNET stack contents disclosure again
|
2021-07-22 09:30:56 +02:00 |
0007-curl-7.76.1-CVE-2021-22945.patch
|
Resolves: CVE-2021-22945 - fix use-after-free and double-free in MQTT sending
|
2021-09-17 10:35:29 +02:00 |
0008-curl-7.76.1-CVE-2021-22946.patch
|
Resolves: CVE-2021-22946 - fix protocol downgrade required TLS bypass
|
2021-09-17 10:35:38 +02:00 |
0009-curl-7.76.1-CVE-2021-22947.patch
|
Resolves: CVE-2021-22947 - fix STARTTLS protocol injection via MITM
|
2021-09-17 10:35:40 +02:00 |
0010-curl-7.76.1-CVE-2022-22576.patch
|
Resolves: CVE-2022-22576 - fix OAUTH2 bearer bypass in connection re-use
|
2022-04-28 13:34:45 +02:00 |
0011-curl-7.76.1-CVE-2022-27775.patch
|
Resolves: CVE-2022-27775 - fix bad local IPv6 connection reuse
|
2022-04-28 13:35:10 +02:00 |
0012-curl-7.76.1-CVE-2022-27776.patch
|
Resolves: CVE-2022-27776 - fix auth/cookie leak on redirect
|
2022-04-28 13:35:30 +02:00 |
0013-curl-7.76.1-CVE-2022-27774.patch
|
Resolves: CVE-2022-27774 - fix leak of SRP credentials in redirects
|
2022-05-02 10:34:03 +02:00 |
0014-curl-7.76.1-CVE-2022-27782.patch
|
Resolves: CVE-2022-27782 - fix too eager reuse of TLS and SSH connections
|
2022-05-11 14:13:31 +02:00 |
0015-curl-7.76.1-tests-openssh.patch
|
Related: CVE-2022-27782 - make upstream tests work with openssh-8.7p1
|
2022-05-11 15:06:48 +02:00 |
0016-curl-7.76.1-CVE-2022-32208.patch
|
Resolves: CVE-2022-32208 - fix FTP-KRB bad message verification
|
2022-06-29 14:53:14 +02:00 |
0017-curl-7.76.1-CVE-2022-32206.patch
|
Resolves: CVE-2022-32206 - fix HTTP compression denial of service
|
2022-06-29 14:53:47 +02:00 |
0019-curl-7.76.1-CVE-2022-32207.patch
|
Resolves: CVE-2022-32207 - fix unpreserved file permissions
|
2022-06-29 15:47:31 +02:00 |
0020-curl-7.76.1-openldap-rebase.patch
|
Related: CVE-2022-32207 - fix build failure caused by openldap rebase
|
2022-06-29 17:44:35 +02:00 |
0101-curl-7.32.0-multilib.patch
|
Merged update from upstream sources
|
2020-12-10 01:12:41 +01:00 |
0102-curl-7.36.0-debug.patch
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-14 23:25:29 +02:00 |
0105-curl-7.63.0-lib1560-valgrind.patch
|
Merged update from upstream sources
|
2021-02-06 15:23:58 +00:00 |
curl-7.76.1.tar.xz.asc
|
new upstream release - 7.76.1
|
2021-04-23 17:08:53 +02:00 |
curl.spec
|
Related: CVE-2022-32207 - fix build failure caused by openldap rebase
|
2022-06-29 17:44:35 +02:00 |
gating.yaml
|
Related: CVE-2022-27774 - update gating.yaml for RHEL-9
|
2022-04-28 13:36:24 +02:00 |
sources
|
new upstream release - 7.76.1
|
2021-04-23 17:08:53 +02:00 |