Name: | curl |
---|---|
Version: | 7.29.0 |
Release: | 59.0.3.el7_9.1 |
Architecture: | aarch64 |
Group: | Applications/Internet |
Size: | 585484 |
License: | MIT |
RPM: | curl-7.29.0-59.0.3.el7_9.1.aarch64.rpm |
Source RPM: | curl-7.29.0-59.0.3.el7_9.1.src.rpm |
Build Date: | Mon May 10 2021 |
Build Host: | ca-buildarm01.us.oracle.com |
Vendor: | Oracle America |
URL: | http://curl.haxx.se/ |
Summary: | A utility for getting files from remote servers (FTP, HTTP, and others) |
Description: | curl is a command line tool for transferring data with URL syntax, supporting FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP form based upload, proxies, cookies, user+password authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer resume, proxy tunneling and a busload of other useful tricks. |
- load CA certificates even with --insecure [Orabug: 32836997]
- Fix TFTP small blocksize heap buffer overflow (https://curl.haxx.se/docs/CVE-2019-5482.html)[CVE-2019-5482][Orabug: 30568724] - Security Fixes [OraBug: 28939992] - CVE-2016-8615 cookie injection for other servers (https://curl.haxx.se/docs/CVE-2016-8615.html) - CVE-2016-8616 case insensitive password comparison (https://curl.haxx.se/docs/CVE-2016-8616.html) - CVE-2016-8617 OOB write via unchecked multiplication (https://curl.haxx.se/docs/CVE-2016-8617.html) - CVE-2016-8618 double-free in curl_maprintf (https://curl.haxx.se/docs/CVE-2016-8618.html) - CVE-2016-8619 double-free in krb5 code (https://curl.haxx.se/docs/CVE-2016-8619.html) - CVE-2016-8621 curl_getdate read out of bounds (https://curl.haxx.se/docs/CVE-2016-8621.html) - CVE-2016-8622 URL unescape heap overflow via integer truncation (https://curl.haxx.se/docs/CVE-2016-8622.html) - CVE-2016-8623 Use-after-free via shared cookies (https://curl.haxx.se/docs/CVE-2016-8623.html) - CVE-2016-8624 invalid URL parsing with # (https://curl.haxx.se/docs/CVE-2016-8624.html) - Drop 1001-tftp-Alloc-maximum-blksize-and-use-default-unless-OA.patch
- avoid overwriting a local file with -J (CVE-2020-8177)
- http: free protocol-specific struct in setup_connection callback (#1836773)
- fix heap buffer overflow in function tftp_receive_packet() (CVE-2019-5482)
- allow curl to POST from a char device (#1769307)
- fix auth failure with duplicated WWW-Authenticate header (#1754736)
- fix TFTP receive buffer overflow (CVE-2019-5436)
- make `curl --tlsv1` backward compatible (#1672639)
- backport the --tls-max option of curl and TLS 1.3 ciphers (#1672639)