Name: | rh-dotnet31-libcurl |
---|---|
Version: | 7.61.1 |
Release: | 11.el7 |
Architecture: | x86_64 |
Group: | Unspecified |
Size: | 546072 |
License: | MIT |
RPM: | rh-dotnet31-libcurl-7.61.1-11.el7.x86_64.rpm |
Source RPM: | rh-dotnet31-curl-7.61.1-11.el7.src.rpm |
Build Date: | Wed Dec 04 2019 |
Build Host: | x86-ol7-builder-02.us.oracle.com |
Vendor: | Oracle America |
URL: | https://curl.haxx.se/ |
Summary: | A library for getting files from web servers |
Description: | libcurl is a free and easy-to-use client-side URL transfer library, supporting FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3 and RTSP. libcurl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP form based upload, proxies, cookies, user+password authentication (Basic, Digest, NTLM, Negotiate, Kerberos4), file transfer resume, http proxy tunneling and more. |
- Update for .NET Core 3.1 - Resolves: RHBZ#1767056
- Fix path to ca bundle - Resolves: RHBZ#1768029
- Migrate more tests to python 3 and fix syntax errors during test - Resolves: RHBZ#1746116
- Initial build for rh-dotnet30 - SCL'ize package - Remove -minimal package - Fix dependencies to work on RHEL 7 - Resolves: RHBZ#1746116
- rebuild with updated annobin to prevent Execshield RPMDiff check from failing
- fix SMTP end-of-response out-of-bounds read (CVE-2019-3823) - fix NTLMv2 type-3 header stack buffer overflow (CVE-2019-3822) - fix NTLM type-2 out-of-bounds buffer read (CVE-2018-16890) - xattr: strip credentials from any URL that is stored (CVE-2018-20483)
- do not let libssh create a new socket for SCP/SFTP (#1669156)
- curl -J: do not append to the destination file (#1660827)
- make the patch for CVE-2018-16842 apply properly (CVE-2018-16842)
- SASL password overflow via integer overflow (CVE-2018-16839) - fix use-after-free in handle close (CVE-2018-16840) - fix bad arethmetic when outputting warnings to stderr (CVE-2018-16842)