Commit Graph

342 Commits

Author SHA1 Message Date
Kamil Dudka
13ec13d953 Resolves: CVE-2016-7167 - reject negative string lengths in curl_easy_[un]escape() 2016-09-14 12:27:31 +02:00
Kamil Dudka
36b153054a work around race condition in PK11_FindSlotByName()
Bug: https://bugzilla.mozilla.org/1297397
2016-08-26 15:55:55 +02:00
Kamil Dudka
bb64ce4e2e Related: CVE-2016-5420 - fix incorrect use of a previously loaded certificate from file 2016-08-26 15:54:16 +02:00
Kamil Dudka
ca9e2d56b2 Resolves: CVE-2016-5420 - fix re-using connections with wrong client cert 2016-08-03 17:11:45 +02:00
Kamil Dudka
1c9b12b033 Resolves: CVE-2016-5419 - fix TLS session resumption client cert bypass 2016-08-03 17:11:35 +02:00
Kamil Dudka
a91699a8d3 Resolves: CVE-2016-5421 - fix use of connection struct after free 2016-08-03 17:11:24 +02:00
Kamil Dudka
8e287ada5e Resolves: #1340757 - fix SIGSEGV of the curl tool
... while parsing URL with too many globs
2016-06-03 13:37:37 +02:00
Kamil Dudka
88c54d8197 tests/sshserver.pl: use RSA instead of DSA for host auth
DSA is no longer supported by OpenSSH 7.0, which causes all SCP/SFTP
test cases to be skipped.  Using RSA for host authentication works with
both old and new versions of OpenSSH.

Reported-by: Karlson2k

Closes #676

Upstream-commit: effa575fc7f028ee71fda16209d3d81af336b730
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
2016-02-25 13:04:57 +01:00
Kamil Dudka
0c9fbb7ebe Resolve: #1311907 - cookie: fix bug in export if any-domain cookie is present 2016-02-25 11:21:22 +01:00
Kamil Dudka
c70c78b593 Resolves: CVE-2016-0755 - match credentials when re-using a proxy connection 2016-01-27 12:29:44 +01:00
Kamil Dudka
e955dd2f2b Resolves: #1104597 - prevent NSS from incorrectly re-using a session 2015-09-18 18:29:08 +02:00
Kamil Dudka
45d6457526 prevent test46 from failing due to expired cookie 2015-08-27 16:10:28 +02:00
Kamil Dudka
d6de9efc29 better explain the conditional BR on valgrind 2015-08-27 16:07:15 +02:00
Kamil Dudka
0b066134ee Resolves: #1248389 - prevent dnf from crashing when using both FTP and HTTP 2015-07-30 15:43:53 +02:00
Kamil Dudka
b7c5c6ea4b test1801: completely disable the test-case
Bug: https://github.com/bagder/curl/commit/21e82bd6#commitcomment-12226582
2015-07-30 15:43:13 +02:00
Kamil Dudka
5dc5cd8084 build support for the HTTP/2 protocol 2015-07-30 15:43:10 +02:00
Kamil Dudka
712c550596 new upstream release - 7.43.0 (fixes CVE-2015-3236 and CVE-2015-3237) 2015-06-17 16:25:33 +02:00
Dennis Gilmore
a21f0d7f44 - Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild 2015-06-17 03:33:56 +00:00
Kamil Dudka
88ed685bb7 Resolves: #1228363 - curl-config --libs now works on x86_64
... without libcurl-devel.x86_64
2015-06-05 13:23:20 +02:00
Kamil Dudka
d60ef0c155 new upstream release - 7.42.1 (fixes CVE-2015-3153) 2015-04-29 09:51:18 +02:00
Kamil Dudka
1307476790 do not run flaky test-cases in %check 2015-04-22 15:45:07 +02:00
Kamil Dudka
54e48b0348 Resolves: #1195771 - implement public key pinning for NSS backend 2015-04-22 15:01:09 +02:00
Kamil Dudka
167643f9ce new upstream release - 7.42.0
Fixes CVE-2015-3143, CVE-2015-3144, CVE-2015-3145, and CVE-2015-3148.
2015-04-22 12:40:08 +02:00
Kamil Dudka
094e8186a4 drop 0106-curl-7.36.0-libssh2-valgrind.patch
... which is already included upstream since curl-7_35_0-269-g02bba0c
2015-02-25 14:00:41 +01:00
Kamil Dudka
e286d38a5f include extern-scan.pl to make test1135 succeed
Upstream-commit: 1514b718e3e5ea08acd1816464809de49a211f38
2015-02-25 12:23:44 +01:00
Kamil Dudka
012235acc8 new upstream release - 7.41.0 2015-02-25 10:39:43 +01:00
Kamil Dudka
8357e0ea3e Resolves: #1187531 - fix a spurious connect failure on dual-stacked hosts 2015-02-23 13:46:07 +01:00
Till Maas
75e18c5969 Rebuilt for Fedora 23 Change
https://fedoraproject.org/wiki/Changes/Harden_all_packages_with_position-independent_code
2015-02-21 21:22:45 +01:00
Kamil Dudka
352eca18a1 add BR for python to enable tests 1900 - 1903 2015-01-08 12:44:54 +01:00
Kamil Dudka
29b64c7221 new upstream release - 7.40.0 (fixes CVE-2014-8150) 2015-01-08 11:28:17 +01:00
Kamil Dudka
5cb97168a8 new upstream release - 7.39.0 (fixes CVE-2014-3707) 2014-11-05 10:58:01 +01:00
Kamil Dudka
724cf4a6d4 fix a connection failure when FTPS handle is reused 2014-10-21 12:18:12 +02:00
Kamil Dudka
0d94c479b6 new upstream release - 7.38.0 (fixes CVE-2014-3613 and CVE-2014-3620) 2014-09-10 15:35:01 +02:00
Peter Robinson
acdb7eec10 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild 2014-08-16 01:56:30 +00:00
Rex Dieter
6ee86949ea include arch'd Requires/Provides 2014-08-13 08:15:17 -05:00
Kamil Dudka
8490cd97fe Resolves: #1118751 - fix endless loop with GSSAPI proxy auth 2014-07-16 18:17:54 +02:00
Kamil Dudka
d996cc7137 new upstream release - 7.37.1 2014-07-16 17:53:43 +02:00
Tom Callaway
2aebfc699c fix license handling 2014-07-11 17:11:42 -04:00
Kamil Dudka
ff02afad2f various SSL-related fixes (mainly crash on connection failure) 2014-07-04 16:27:42 +02:00
Dennis Gilmore
0a86866820 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild 2014-06-07 01:30:59 -05:00
Kamil Dudka
69703f0045 new upstream release - 7.37.0 2014-05-21 10:42:01 +02:00
Kamil Dudka
8b3cb24b84 Resolves: #1093348 - auth failure on duplicated 'WWW-Authenticate: Negotiate' header 2014-05-09 23:43:40 +02:00
Kamil Dudka
0f6b1efb14 nss: implement non-blocking SSL handshake 2014-04-25 17:36:51 +02:00
Kamil Dudka
3f180252f8 extend URL parser to support IPv6 zone identifiers (#680996) 2014-04-02 15:25:45 +02:00
Kamil Dudka
e4d3e72cd6 adapt tests 815 and 816 such that they work with the fix for CVE-2014-0138 2014-03-26 23:43:07 +01:00
Kamil Dudka
4bddb2814c new upstream release - 7.36.0 (fixes CVE-2014-0138) 2014-03-26 08:55:38 +01:00
Paul Howarth
e9708b37b5 add all perl build requirements for the test suite, in a portable way 2014-03-17 18:33:11 +00:00
Kamil Dudka
381114ce83 add BR for perl-Digest-MD5, which is required by the test-suite 2014-03-17 15:32:33 +01:00
Kamil Dudka
1128c2bd9a Resolves: #1072273 - avoid spurious failure of test1086 on s390(x) koji builders 2014-03-05 15:17:57 +01:00
Kamil Dudka
dee4c8342e Resolves: #1068967 - refresh expired cookie in test172 from upstream test-suite 2014-02-25 12:50:11 +01:00