Name: | curl |
---|---|
Version: | 7.76.1 |
Release: | 19.el9_1.1 |
Architecture: | x86_64 |
Group: | Unspecified |
Size: | 684529 |
License: | MIT |
RPM: | curl-7.76.1-19.el9_1.1.x86_64.rpm |
Source RPM: | curl-7.76.1-19.el9_1.1.src.rpm |
Build Date: | Mon Jan 23 2023 |
Build Host: | build-ol9-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | https://curl.se/ |
Summary: | A utility for getting files from remote servers (FTP, HTTP, and others) |
Description: | curl is a command line tool for transferring data with URL syntax, supporting FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP form based upload, proxies, cookies, user+password authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer resume, proxy tunneling and a busload of other useful tricks. |
- fix POST following PUT confusion (CVE-2022-32221)
- fix unpreserved file permissions (CVE-2022-32207) - fix HTTP compression denial of service (CVE-2022-32206) - fix FTP-KRB bad message verification (CVE-2022-32208)
- fix too eager reuse of TLS and SSH connections (CVE-2022-27782)
- fix leak of SRP credentials in redirects (CVE-2022-27774)
- add missing tests to Makefile
- fix credential leak on redirect (CVE-2022-27774) - fix auth/cookie leak on redirect (CVE-2022-27776) - fix bad local IPv6 connection reuse (CVE-2022-27775) - fix OAUTH2 bearer bypass in connection re-use (CVE-2022-22576)
- re-disable HSTS in libcurl as an experimental feature (#2005874)
- disable more protocols and features in libcurl-minimal (#2005874)
- fix STARTTLS protocol injection via MITM (CVE-2021-22947) - fix protocol downgrade required TLS bypass (CVE-2021-22946) - fix use-after-free and double-free in MQTT sending (CVE-2021-22945)
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Related: rhbz#1991688