Name: | rh-dotnet31-curl |
---|---|
Version: | 7.61.1 |
Release: | 11.el7 |
Architecture: | x86_64 |
Group: | Unspecified |
Size: | 667630 |
License: | MIT |
RPM: | rh-dotnet31-curl-7.61.1-11.el7.x86_64.rpm |
Source RPM: | rh-dotnet31-curl-7.61.1-11.el7.src.rpm |
Build Date: | Wed Dec 04 2019 |
Build Host: | x86-ol7-builder-02.us.oracle.com |
Vendor: | Oracle America |
URL: | https://curl.haxx.se/ |
Summary: | A utility for getting files from remote servers (FTP, HTTP, and others) |
Description: | curl is a command line tool for transferring data with URL syntax, supporting FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3 and RTSP. curl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP form based upload, proxies, cookies, user+password authentication (Basic, Digest, NTLM, Negotiate, kerberos...), file transfer resume, proxy tunneling and a busload of other useful tricks. |
- Update for .NET Core 3.1 - Resolves: RHBZ#1767056
- Fix path to ca bundle - Resolves: RHBZ#1768029
- Migrate more tests to python 3 and fix syntax errors during test - Resolves: RHBZ#1746116
- Initial build for rh-dotnet30 - SCL'ize package - Remove -minimal package - Fix dependencies to work on RHEL 7 - Resolves: RHBZ#1746116
- rebuild with updated annobin to prevent Execshield RPMDiff check from failing
- fix SMTP end-of-response out-of-bounds read (CVE-2019-3823) - fix NTLMv2 type-3 header stack buffer overflow (CVE-2019-3822) - fix NTLM type-2 out-of-bounds buffer read (CVE-2018-16890) - xattr: strip credentials from any URL that is stored (CVE-2018-20483)
- do not let libssh create a new socket for SCP/SFTP (#1669156)
- curl -J: do not append to the destination file (#1660827)
- make the patch for CVE-2018-16842 apply properly (CVE-2018-16842)
- SASL password overflow via integer overflow (CVE-2018-16839) - fix use-after-free in handle close (CVE-2018-16840) - fix bad arethmetic when outputting warnings to stderr (CVE-2018-16842)