Name: | libcurl |
---|---|
Version: | 7.76.1 |
Release: | 14.el9_0.4 |
Architecture: | x86_64 |
Group: | Unspecified |
Size: | 664638 |
License: | MIT |
RPM: | libcurl-7.76.1-14.el9_0.4.x86_64.rpm |
Source RPM: | curl-7.76.1-14.el9_0.4.src.rpm |
Build Date: | Wed Jun 29 2022 |
Build Host: | build-ol9-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | https://curl.se/ |
Summary: | A library for getting files from web servers |
Description: | libcurl is a free and easy-to-use client-side URL transfer library, supporting FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3 and RTSP. libcurl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP form based upload, proxies, cookies, user+password authentication (Basic, Digest, NTLM, Negotiate, Kerberos4), file transfer resume, http proxy tunneling and more. |
- fix too eager reuse of TLS and SSH connections (CVE-2022-27782)
- fix leak of SRP credentials in redirects (CVE-2022-27774)
- add missing tests to Makefile
- fix credential leak on redirect (CVE-2022-27774) - fix auth/cookie leak on redirect (CVE-2022-27776) - fix OAUTH2 bearer bypass in connection re-use (CVE-2022-22576)
- re-disable HSTS in libcurl as an experimental feature (#2005874)
- disable more protocols and features in libcurl-minimal (#2005874)
- fix STARTTLS protocol injection via MITM (CVE-2021-22947) - fix protocol downgrade required TLS bypass (CVE-2021-22946) - fix use-after-free and double-free in MQTT sending (CVE-2021-22945)
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Related: rhbz#1991688
- Rebuild to pick up OpenSSL 3.0 Beta ABI (#1984097)
- make explicit dependency on openssl work with alpha/beta builds of openssl