.fmf
|
tests: migrate to tmt tests from Fedora upstream
|
2022-08-10 14:39:48 +02:00 |
tests
|
tests: migrate to tmt tests from Fedora upstream
|
2022-08-10 14:39:48 +02:00 |
.gitignore
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-14 23:25:29 +02:00 |
0001-curl-7.76.1-resource-leaks.patch
|
Resolves: #1938699 - http2: fix resource leaks detected by Coverity
|
2021-05-03 20:49:06 +02:00 |
0002-curl-7.76.1-CVE-2021-22898.patch
|
Resolves: CVE-2021-22898 - fix TELNET stack contents disclosure
|
2021-05-26 13:10:43 +02:00 |
0003-curl-7.76.1-CVE-2021-22901.patch
|
Resolves: CVE-2021-22901 - fix TLS session caching disaster
|
2021-05-26 13:10:45 +02:00 |
0004-curl-7.76.1-ldaps-segv.patch
|
Resolves: #1941925 - fix SIGSEGV upon disconnect of a ldaps:// transfer
|
2021-06-02 15:49:30 +02:00 |
0005-curl-7.76.1-CVE-2021-22924.patch
|
Resolves: CVE-2021-22924 - fix bad connection reuse due to flawed path name checks
|
2021-07-22 09:30:43 +02:00 |
0006-curl-7.76.1-CVE-2021-22925.patch
|
Resolves: CVE-2021-22925 - fix TELNET stack contents disclosure again
|
2021-07-22 09:30:56 +02:00 |
0007-curl-7.76.1-CVE-2021-22945.patch
|
Resolves: CVE-2021-22945 - fix use-after-free and double-free in MQTT sending
|
2021-09-17 10:35:29 +02:00 |
0008-curl-7.76.1-CVE-2021-22946.patch
|
Resolves: CVE-2021-22946 - fix protocol downgrade required TLS bypass
|
2021-09-17 10:35:38 +02:00 |
0009-curl-7.76.1-CVE-2021-22947.patch
|
Resolves: CVE-2021-22947 - fix STARTTLS protocol injection via MITM
|
2021-09-17 10:35:40 +02:00 |
0010-curl-7.76.1-CVE-2022-22576.patch
|
Resolves: CVE-2022-22576 - fix OAUTH2 bearer bypass in connection re-use
|
2022-04-28 13:34:45 +02:00 |
0011-curl-7.76.1-CVE-2022-27775.patch
|
Resolves: CVE-2022-27775 - fix bad local IPv6 connection reuse
|
2022-04-28 13:35:10 +02:00 |
0012-curl-7.76.1-CVE-2022-27776.patch
|
Resolves: CVE-2022-27776 - fix auth/cookie leak on redirect
|
2022-04-28 13:35:30 +02:00 |
0013-curl-7.76.1-CVE-2022-27774.patch
|
Resolves: CVE-2022-27774 - fix leak of SRP credentials in redirects
|
2022-05-02 10:34:03 +02:00 |
0014-curl-7.76.1-CVE-2022-27782.patch
|
Resolves: CVE-2022-27782 - fix too eager reuse of TLS and SSH connections
|
2022-05-11 14:13:31 +02:00 |
0015-curl-7.76.1-tests-openssh.patch
|
Related: CVE-2022-27782 - make upstream tests work with openssh-8.7p1
|
2022-05-11 15:06:48 +02:00 |
0016-curl-7.76.1-CVE-2022-32208.patch
|
Resolves: CVE-2022-32208 - fix FTP-KRB bad message verification
|
2022-06-29 14:53:14 +02:00 |
0017-curl-7.76.1-CVE-2022-32206.patch
|
Resolves: CVE-2022-32206 - fix HTTP compression denial of service
|
2022-06-29 14:53:47 +02:00 |
0019-curl-7.76.1-CVE-2022-32207.patch
|
Resolves: CVE-2022-32207 - fix unpreserved file permissions
|
2022-06-29 15:47:31 +02:00 |
0020-curl-7.76.1-openldap-rebase.patch
|
Related: CVE-2022-32207 - fix build failure caused by openldap rebase
|
2022-06-29 17:44:35 +02:00 |
0021-curl-7.76.1-CVE-2022-35252.patch
|
Resolves: CVE-2022-35252 - control code in cookie denial of service
|
2022-09-20 13:56:11 +02:00 |
0022-curl-7.76.1-CVE-2022-32221.patch
|
Resolves: CVE-2022-32221 - fix POST following PUT confusion
|
2022-10-27 10:14:52 +02:00 |
0023-curl-7.76.1-CVE-2022-43552.patch
|
Resolves: CVE-2022-43552 - smb/telnet: fix use-after-free when HTTP proxy denies tunnel
|
2022-12-21 16:11:04 +01:00 |
0024-curl-7.76.1-CVE-2023-23916.patch
|
Resolves: CVE-2023-23916 - fix HTTP multi-header compression denial of service
|
2023-02-16 13:38:22 +01:00 |
0025-curl-7.76.1-CVE-2023-27533.patch
|
Resolves: CVE-2023-27533 - fix TELNET option IAC injection
|
2023-03-24 15:26:51 +01:00 |
0026-curl-7.76.1-CVE-2023-27534.patch
|
Resolves: CVE-2023-27534 - fix SFTP path ~ resolving discrepancy
|
2023-03-24 15:34:12 +01:00 |
0027-curl-7.76.1-CVE-2023-27535.patch
|
Resolves: CVE-2023-27535 - adapt the fix for RHEL 9 curl
|
2023-04-12 16:52:10 +02:00 |
0028-curl-7.76.1-CVE-2023-27536.patch
|
Resolves: CVE-2023-27535 - adapt the fix for RHEL 9 curl
|
2023-04-12 16:52:10 +02:00 |
0029-curl-7.76.1-CVE-2023-27538.patch
|
Resolves: CVE-2023-27535 - adapt the fix for RHEL 9 curl
|
2023-04-12 16:52:10 +02:00 |
0030-curl-7.76.1-CVE-2023-28322.patch
|
Resolves: CVE-2023-28322 - unify the upload/method handling
|
2023-06-12 00:07:07 +02:00 |
0031-curl-7.76.1-CVE-2023-28321.patch
|
Resolves: CVE-2023-28321 - fix host name wildcard checking
|
2023-06-27 19:42:23 +02:00 |
0032-curl-7.76.1-password-when-keyboard-interactive-fails.patch
|
When keyboard-interactive auth fails; try password
|
2023-09-14 21:27:58 +02:00 |
0033-curl-7.76.1-CVE-2023-38545.patch
|
Return error if hostname too long for remote resolve
|
2023-10-10 18:35:37 +02:00 |
0034-curl-7.76.1-CVE-2023-38546.patch
|
Fix cookie injection with none file
|
2023-11-24 10:28:40 +01:00 |
0035-curl-7.76.1-64K-sftp.patch
|
Cap SFTP packet size sent
|
2023-11-28 11:17:05 +01:00 |
0036-curl-7.76.1-CVE-2023-46218.patch
|
Lowercase the domain names before PSL checks
|
2023-12-09 18:06:41 +01:00 |
0037-curl-7.76.1-ignore-unexpected-eof.patch
|
Unconditionally set OpenSSL option SSL_OP_IGNORE_UNEXPECTED_EOF
|
2024-07-02 22:01:27 +02:00 |
0038-curl-7.76.1-CVE-2024-2398.patch
|
http2: push headers better cleanup
|
2024-08-22 12:48:23 +02:00 |
0101-curl-7.32.0-multilib.patch
|
Merged update from upstream sources
|
2020-12-10 01:12:41 +01:00 |
0102-curl-7.36.0-debug.patch
|
RHEL 9.0.0 Alpha bootstrap
|
2020-10-14 23:25:29 +02:00 |
0105-curl-7.63.0-lib1560-valgrind.patch
|
Resolves: CVE-2022-32221 - fix POST following PUT confusion
|
2022-10-27 10:14:52 +02:00 |
ci.fmf
|
tests: migrate to tmt tests from Fedora upstream
|
2022-08-10 14:39:48 +02:00 |
curl-7.76.1.tar.xz.asc
|
new upstream release - 7.76.1
|
2021-04-23 17:08:53 +02:00 |
curl.spec
|
http2: push headers better cleanup
|
2024-08-22 12:48:23 +02:00 |
gating.yaml
|
Related: CVE-2022-27774 - update gating.yaml for RHEL-9
|
2022-04-28 13:36:24 +02:00 |
rpminspect.yaml
|
Related: CVE-2022-32207 - rpminspect.yaml: attempt to silence rpminspect
|
2022-07-01 17:51:15 +02:00 |
sources
|
new upstream release - 7.76.1
|
2021-04-23 17:08:53 +02:00 |