1
0
forked from rpms/curl
A utility for getting files from remote servers (FTP, HTTP, and others)
Go to file
Kamil Dudka 6333bbf495 Related: CVE-2022-32207 - fix build failure caused by openldap rebase
[...]
make[2]: Leaving directory '/builddir/build/BUILD/curl-7.76.1/build-full/lib'
../../lib/openldap.c:83:17: error: conflicting types for 'ldap_connect'; have 'CURLcode(struct Curl_easy *, _Bool *)'
   83 | static CURLcode ldap_connect(struct Curl_easy *data, bool *done);
      |                 ^~~~~~~~~~~~
In file included from ../../lib/openldap.c:39:
/usr/include/ldap.h:1555:1: note: previous declaration of 'ldap_connect' with type 'int(LDAP *)' {aka 'int(struct ldap *)'}
 1555 | ldap_connect( LDAP *ld );
      | ^~~~~~~~~~~~
2022-06-29 17:44:35 +02:00
tests RHEL 9.0.0 Alpha bootstrap 2020-10-14 23:25:29 +02:00
.gitignore RHEL 9.0.0 Alpha bootstrap 2020-10-14 23:25:29 +02:00
0001-curl-7.76.1-resource-leaks.patch Resolves: #1938699 - http2: fix resource leaks detected by Coverity 2021-05-03 20:49:06 +02:00
0002-curl-7.76.1-CVE-2021-22898.patch Resolves: CVE-2021-22898 - fix TELNET stack contents disclosure 2021-05-26 13:10:43 +02:00
0003-curl-7.76.1-CVE-2021-22901.patch Resolves: CVE-2021-22901 - fix TLS session caching disaster 2021-05-26 13:10:45 +02:00
0004-curl-7.76.1-ldaps-segv.patch Resolves: #1941925 - fix SIGSEGV upon disconnect of a ldaps:// transfer 2021-06-02 15:49:30 +02:00
0005-curl-7.76.1-CVE-2021-22924.patch Resolves: CVE-2021-22924 - fix bad connection reuse due to flawed path name checks 2021-07-22 09:30:43 +02:00
0006-curl-7.76.1-CVE-2021-22925.patch Resolves: CVE-2021-22925 - fix TELNET stack contents disclosure again 2021-07-22 09:30:56 +02:00
0007-curl-7.76.1-CVE-2021-22945.patch Resolves: CVE-2021-22945 - fix use-after-free and double-free in MQTT sending 2021-09-17 10:35:29 +02:00
0008-curl-7.76.1-CVE-2021-22946.patch Resolves: CVE-2021-22946 - fix protocol downgrade required TLS bypass 2021-09-17 10:35:38 +02:00
0009-curl-7.76.1-CVE-2021-22947.patch Resolves: CVE-2021-22947 - fix STARTTLS protocol injection via MITM 2021-09-17 10:35:40 +02:00
0010-curl-7.76.1-CVE-2022-22576.patch Resolves: CVE-2022-22576 - fix OAUTH2 bearer bypass in connection re-use 2022-04-28 13:34:45 +02:00
0011-curl-7.76.1-CVE-2022-27775.patch Resolves: CVE-2022-27775 - fix bad local IPv6 connection reuse 2022-04-28 13:35:10 +02:00
0012-curl-7.76.1-CVE-2022-27776.patch Resolves: CVE-2022-27776 - fix auth/cookie leak on redirect 2022-04-28 13:35:30 +02:00
0013-curl-7.76.1-CVE-2022-27774.patch Resolves: CVE-2022-27774 - fix leak of SRP credentials in redirects 2022-05-02 10:34:03 +02:00
0014-curl-7.76.1-CVE-2022-27782.patch Resolves: CVE-2022-27782 - fix too eager reuse of TLS and SSH connections 2022-05-11 14:13:31 +02:00
0015-curl-7.76.1-tests-openssh.patch Related: CVE-2022-27782 - make upstream tests work with openssh-8.7p1 2022-05-11 15:06:48 +02:00
0016-curl-7.76.1-CVE-2022-32208.patch Resolves: CVE-2022-32208 - fix FTP-KRB bad message verification 2022-06-29 14:53:14 +02:00
0017-curl-7.76.1-CVE-2022-32206.patch Resolves: CVE-2022-32206 - fix HTTP compression denial of service 2022-06-29 14:53:47 +02:00
0019-curl-7.76.1-CVE-2022-32207.patch Resolves: CVE-2022-32207 - fix unpreserved file permissions 2022-06-29 15:47:31 +02:00
0020-curl-7.76.1-openldap-rebase.patch Related: CVE-2022-32207 - fix build failure caused by openldap rebase 2022-06-29 17:44:35 +02:00
0101-curl-7.32.0-multilib.patch Merged update from upstream sources 2020-12-10 01:12:41 +01:00
0102-curl-7.36.0-debug.patch RHEL 9.0.0 Alpha bootstrap 2020-10-14 23:25:29 +02:00
0105-curl-7.63.0-lib1560-valgrind.patch Merged update from upstream sources 2021-02-06 15:23:58 +00:00
curl-7.76.1.tar.xz.asc new upstream release - 7.76.1 2021-04-23 17:08:53 +02:00
curl.spec Related: CVE-2022-32207 - fix build failure caused by openldap rebase 2022-06-29 17:44:35 +02:00
gating.yaml Related: CVE-2022-27774 - update gating.yaml for RHEL-9 2022-04-28 13:36:24 +02:00
sources new upstream release - 7.76.1 2021-04-23 17:08:53 +02:00