Name: | libcurl |
---|---|
Version: | 7.29.0 |
Release: | 59.0.1.el7 |
Architecture: | i686 |
Group: | Development/Libraries |
Size: | 433408 |
License: | MIT |
RPM: | libcurl-7.29.0-59.0.1.el7.i686.rpm |
Source RPM: | curl-7.29.0-59.0.1.el7.src.rpm |
Build Date: | Thu Oct 01 2020 |
Build Host: | jenkins-172-17-0-2-12b27883-eefe-46f1-997c-d21ca9f6b896.appad3iad.osdevelopmeniad.oraclevcn.com |
Vendor: | Oracle America |
URL: | http://curl.haxx.se/ |
Summary: | A library for getting files from web servers |
Description: | libcurl is a free and easy-to-use client-side URL transfer library, supporting FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3 and RTSP. libcurl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP form based upload, proxies, cookies, user+password authentication (Basic, Digest, NTLM, Negotiate, Kerberos4), file transfer resume, http proxy tunneling and more. |
- Fix TFTP small blocksize heap buffer overflow (https://curl.haxx.se/docs/CVE-2019-5482.html)[CVE-2019-5482][Orabug: 30568724] - Security Fixes [OraBug: 28939992] - CVE-2016-8615 cookie injection for other servers (https://curl.haxx.se/docs/CVE-2016-8615.html) - CVE-2016-8616 case insensitive password comparison (https://curl.haxx.se/docs/CVE-2016-8616.html) - CVE-2016-8617 OOB write via unchecked multiplication (https://curl.haxx.se/docs/CVE-2016-8617.html) - CVE-2016-8618 double-free in curl_maprintf (https://curl.haxx.se/docs/CVE-2016-8618.html) - CVE-2016-8619 double-free in krb5 code (https://curl.haxx.se/docs/CVE-2016-8619.html) - CVE-2016-8621 curl_getdate read out of bounds (https://curl.haxx.se/docs/CVE-2016-8621.html) - CVE-2016-8622 URL unescape heap overflow via integer truncation (https://curl.haxx.se/docs/CVE-2016-8622.html) - CVE-2016-8623 Use-after-free via shared cookies (https://curl.haxx.se/docs/CVE-2016-8623.html) - CVE-2016-8624 invalid URL parsing with # (https://curl.haxx.se/docs/CVE-2016-8624.html) - Drop 1001-tftp-Alloc-maximum-blksize-and-use-default-unless-OA.patch
- http: free protocol-specific struct in setup_connection callback (#1836773)
- fix heap buffer overflow in function tftp_receive_packet() (CVE-2019-5482)
- allow curl to POST from a char device (#1769307)
- fix auth failure with duplicated WWW-Authenticate header (#1754736)
- fix TFTP receive buffer overflow (CVE-2019-5436)
- make `curl --tlsv1` backward compatible (#1672639)
- backport the --tls-max option of curl and TLS 1.3 ciphers (#1672639)
- prevent curl --rate-limit from hanging on file URLs (#1281969) - fix NTLM password overflow via integer overflow (CVE-2018-14618) - fix bad arithmetic when outputting warnings to stderr (CVE-2018-16842) - backport options to force TLS 1.3 in curl and libcurl (#1672639) - prevent curl --rate-limit from crashing on https URLs (#1683292)
- require a new enough version of nss-pem to avoid regression in yum (#1610998)