tests
|
Add CI tests using the standard test interface
|
2017-09-26 15:46:24 +00:00 |
.gitignore
|
new upstream release - 7.55.0
|
2017-08-09 10:52:10 +02:00 |
0001-curl-7.61.1-test320-gnutls.patch
|
test320: update expected output for gnutls-3.6.4
|
2018-10-05 13:41:48 +02:00 |
0002-curl-7.61.1-tlsv1.0-man.patch
|
update the documentation of --tlsv1.0 in curl(1) man page
|
2018-10-11 16:16:18 +02:00 |
0003-curl-7.61.1-TLS-1.3-PHA.patch
|
enable TLS 1.3 post-handshake auth in OpenSSL
|
2018-10-11 16:16:32 +02:00 |
0004-curl-7.61.1-CVE-2018-16842.patch
|
Resolves: CVE-2018-16842 - fix bad arethmetic when outputting warnings to stderr
|
2018-11-01 09:50:46 +01:00 |
0005-curl-7.61.1-CVE-2018-16840.patch
|
Resolves: CVE-2018-16840 - fix use-after-free in handle close
|
2018-11-01 09:59:22 +01:00 |
0006-curl-7.61.1-CVE-2018-16839.patch
|
Resolves: CVE-2018-16839 - SASL password overflow via integer overflow
|
2018-11-01 10:07:35 +01:00 |
0007-curl-7.63.0-JO-preserve-local-file.patch
|
Resolves: #1658574 - curl -J: do not append to the destination file
|
2018-12-19 13:51:52 +01:00 |
0008-curl-7.61.1-CVE-2018-20483.patch
|
Resolves: CVE-2018-20483 - xattr: strip credentials from any URL that is stored
|
2019-01-21 12:22:27 +01:00 |
0009-curl-7.61.1-CVE-2018-16890.patch
|
Resolves: CVE-2018-16890 - fix NTLM type-2 out-of-bounds buffer read
|
2019-02-06 13:30:10 +01:00 |
0010-curl-7.61.1-CVE-2019-3822.patch
|
Resolves: CVE-2019-3822 - fix NTLMv2 type-3 header stack buffer overflow
|
2019-02-06 13:30:24 +01:00 |
0011-curl-7.61.1-CVE-2019-3823.patch
|
Resolves: CVE-2019-3823 - fix SMTP end-of-response out-of-bounds read
|
2019-02-06 13:30:41 +01:00 |
0013-curl-7.61.1-zsh-completion.patch
|
make zsh completion work again
|
2019-02-11 13:41:22 +01:00 |
0014-curl-7.61.1-libssh-socket.patch
|
Resolves: #1669156 - do not let libssh create a new socket for SCP/SFTP
|
2019-02-18 18:42:01 +01:00 |
0016-curl-7.64.0-CVE-2019-5435.patch
|
Resolves: CVE-2019-5435 - fix integer overflows in curl_url_set()
|
2019-05-22 14:21:02 +02:00 |
0017-curl-7.64.0-CVE-2019-5436.patch
|
Resolves: CVE-2019-5436 - TFTP receive buffer overflow
|
2019-05-22 14:21:49 +02:00 |
0018-curl-7.65.3-CVE-2019-5482.patch
|
Resolves: CVE-2019-5482 - fix heap buffer overflow in function tftp_receive_packet()
|
2019-09-12 16:22:48 +02:00 |
0019-curl-7.65.3-CVE-2019-5481.patch
|
Resolves: CVE-2019-5481 - double free due to subsequent call of realloc()
|
2019-09-12 16:30:21 +02:00 |
0101-curl-7.32.0-multilib.patch
|
new upstream release - 7.58.0
|
2018-01-24 11:55:14 +01:00 |
0102-curl-7.36.0-debug.patch
|
new upstream release - 7.61.1
|
2018-09-05 10:03:29 +02:00 |
0103-curl-7.59.0-python3.patch
|
new upstream release - 7.61.1
|
2018-09-05 10:03:29 +02:00 |
0104-curl-7.19.7-localhost6.patch
|
mass rename of patches
|
2010-06-16 13:36:47 +00:00 |
curl-7.61.1.tar.xz.asc
|
new upstream release - 7.61.1
|
2018-09-05 10:03:29 +02:00 |
curl.spec
|
Resolves: CVE-2019-5481 - double free due to subsequent call of realloc()
|
2019-09-12 16:30:21 +02:00 |
sources
|
new upstream release - 7.61.1
|
2018-09-05 10:03:29 +02:00 |