-
Fri Aug 26 2016 Kamil Dudka <kdudka@redhat.com> 7.29.0-35
- fix incorrect use of a previously loaded certificate from file
(related to CVE-2016-5420)
-
Wed Aug 17 2016 Kamil Dudka <kdudka@redhat.com> 7.29.0-34
- acknowledge the --no-sessionid/CURLOPT_SSL_SESSIONID_CACHE option
(required by the fix for CVE-2016-5419)
-
Thu Aug 11 2016 Kamil Dudka <kdudka@redhat.com> 7.29.0-33
- fix re-using connections with wrong client cert (CVE-2016-5420)
- fix TLS session resumption client cert bypass (CVE-2016-5419)
-
Mon Jun 20 2016 Kamil Dudka <kdudka@redhat.com> 7.29.0-32
- configure: improve detection of GCC's -fvisibility= flag
-
Mon Jun 20 2016 Kamil Dudka <kdudka@redhat.com> 7.29.0-31
- prevent curl_multi_wait() from missing an event (#1347904)
-
Tue Feb 16 2016 Kamil Dudka <kdudka@redhat.com> 7.29.0-30
- curl.1: --disable-{eprt,epsv} are ignored for IPv6 hosts (#1305974)
-
Fri Jan 15 2016 Kamil Dudka <kdudka@redhat.com> 7.29.0-29
- SSH: make CURLOPT_SSH_PUBLIC_KEYFILE treat "" as NULL (#1275769)
-
Mon Nov 02 2015 Kamil Dudka <kdudka@redhat.com> 7.29.0-28
- prevent NSS from incorrectly re-using a session (#1269855)
- call PR_Cleanup() in the upstream test-suite if NSPR is used (#1243324)
- disable unreliable upstream test-case 2032 (#1241168)
-
Tue Oct 27 2015 Kamil Dudka <kdudka@redhat.com> 7.29.0-27
- SSH: do not require public key file for user authentication (#1275769)
-
Tue Sep 08 2015 Kamil Dudka <kdudka@redhat.com> 7.29.0-26
- implement 'curl --unix-socket' and CURLOPT_UNIX_SOCKET_PATH (#1263318)
- improve parsing of URL-encoded user name and password (#1260178)
- prevent test46 from failing due to expired cookie (#1258834)