Package: curl / 7.74.0-1.3+deb11u13
Metadata
| Package | Version | Patches format |
|---|---|---|
| curl | 7.74.0-1.3+deb11u13 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| 04_workaround_as_needed_bug.patch | (download) |
ltmain.sh |
14 14 + 0 - 0 ! |
work around libtool --as-needed reordering bug |
| 06_always disable valgrind.patch | (download) |
tests/Makefile.am |
2 1 + 1 - 0 ! |
always disable valgrind tests |
| 07_do not disable debug symbols.patch | (download) |
m4/curl-compilers.m4 |
11 0 + 11 - 0 ! |
do not disable debug symbols without --enable-debug |
| 08_enable zsh.patch | (download) |
Makefile.am |
4 2 + 2 - 0 ! |
enable zsh completion generation |
| 11_omit directories from config.patch | (download) |
curl-config.in |
15 3 + 12 - 0 ! |
in order to (partially) multi-arch-ify curl-config, remove all mention of @includedir@ and @libdir@ from the script. On Debian, the actual header and library directories are architecture-dependent, but will always be in the C compiler's default search path, so -I and -L options are not necessary (and may be harmful in multi-arch environments.) |
| 12_use python3 in tests.patch | (download) |
tests/data/test1451 |
2 1 + 1 - 0 ! |
use python3 executable in tests |
| 13_fix man formatting.patch | (download) |
docs/libcurl/curl_getdate.3 |
5 2 + 3 - 0 ! |
[patch] curl/docs/libcurl/*: fix some formatting of man pages To: Fix some fomatting issues in man pages. Details: From "mandoc -Tlint": mandoc: curl_getdate.3:64:2: WARNING: skipping paragraph macro: PP empty mandoc: curl_global_init_mem.3:56:2: ERROR: skipping end of block that is not open: RE mandoc: curl_unescape.3:48:5: ERROR: skipping all arguments: br curl_easy_escape "(3)," curl_easy_unescape "(3)," curl_free "(3)," RFC 2396 mandoc: curl_unescape.3:48:2: WARNING: skipping paragraph macro: br after SH mandoc: curl_url_cleanup.3:29:2: STYLE: fill mode already enabled, skipping: fi mandoc: curl_url_dup.3:29:2: STYLE: fill mode already enabled, skipping: fi mandoc: curl_url_set.3:32:2: STYLE: fill mode already enabled, skipping: fi From "test-groff -b -mandoc -T utf8 -rF0 -t -w w -z": [ "test-groff" is a developmental version of "groff" ] troff: <curl_getdate.3>:108: warning: trailing space troff: <curl_getdate.3>:109: warning: trailing space Signed-off-by: Bjarni Ingi Gislason <bjarniig@rhi.hi.is> |
| 14_transfer strip credentials from the auto referer hea.patch | (download) |
lib/transfer.c |
25 23 + 2 - 0 ! |
transfer: strip credentials from the auto-referer header field |
| 15_vtls add isproxy argument to Curl_ssl_get addsession.patch | (download) |
lib/vtls/bearssl.c |
11 8 + 3 - 0 ! |
vtls: add 'isproxy' argument to curl_ssl_get/addsessionid() |
| fix regression microseconds instead of seconds.patch | (download) |
src/tool_writeout.c |
22 15 + 7 - 0 ! |
[patch] =?utf-8?q?too=c4=ba=5fwriteout:=20fix=20the=20-w=20time?= =?UTF-8?q?=20output=20units?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Fix regression from commit fc813f80e1bcac (#6248) that changed the unit to microseconds instead of seconds with fractions Reported-by: Fixes #6321 Closes #6322 |
| CVE 2021 22898.patch | (download) |
lib/telnet.c |
17 11 + 6 - 0 ! |
cve-2021-22898 Bug-Debian: https://bugs.debian.org/989228 |
| CVE 2021 22945.patch | (download) |
lib/mqtt.c |
4 4 + 0 - 0 ! |
cve-2021-22945 |
| CVE 2021 22946.patch | (download) |
lib/ftp.c |
9 6 + 3 - 0 ! |
cve-2021-22946 |
| CVE 2021 22947.patch | (download) |
lib/ftp.c |
3 3 + 0 - 0 ! |
cve-2021-22947 |
| CVE 2021 22924.patch | (download) |
lib/url.c |
9 6 + 3 - 0 ! |
cve-2021-22924 Bug-Debian: https://bugs.debian.org/991492 |
| CVE 2022 22576.patch | (download) |
lib/strcase.c |
10 10 + 0 - 0 ! |
cve-2022-22576 Bug-Debian: https://bugs.debian.org/1010295 |
| CVE 2022 27775.patch | (download) |
lib/conncache.c |
9 7 + 2 - 0 ! |
cve-2022-27775 Bug-Debian: https://bugs.debian.org/1010253 |
| CVE 2022 27776.patch | (download) |
lib/http.c |
34 22 + 12 - 0 ! |
cve-2022-27776 Bug-Debian: https://bugs.debian.org/1010252 |
| CVE 2022 27781.patch | (download) |
lib/vtls/nss.c |
8 8 + 0 - 0 ! |
cve-2022-27781 |
| CVE 2022 27782_part1.patch | (download) |
lib/setopt.c |
28 16 + 12 - 0 ! |
cve-2022-27782_part1 |
| CVE 2022 27782_part2.patch | (download) |
lib/url.c |
11 11 + 0 - 0 ! |
cve-2022-27782_part2 |
| CVE 2022 32205.patch | (download) |
lib/cookie.c |
14 12 + 2 - 0 ! |
cve-2022-32205 |
| CVE 2022 32206.patch | (download) |
lib/content_encoding.c |
9 9 + 0 - 0 ! |
cve-2022-32206 |
| CVE 2022 32207.patch | (download) |
CMakeLists.txt |
1 1 + 0 - 0 ! |
cve-2022-32207 |
| CVE 2022 32208.patch | (download) |
lib/krb5.c |
18 11 + 7 - 0 ! |
cve-2022-32208 |
| CVE 2022 27774_1_of_4.patch | (download) |
lib/connect.c |
1 1 + 0 - 0 ! |
[patch] connect: store "conn_remote_port" in the info struct To make it available after the connection ended. |
| CVE 2022 27774_2_of_4.patch | (download) |
lib/transfer.c |
48 47 + 1 - 0 ! |
[patch] transfer: redirects to other protocols or ports clear auth ... unless explicitly permitted. Bug: https://curl.se/docs/CVE-2022-27774.html Reported-by: Harry Sintonen Closes #8748 |
| CVE 2022 27774_3_of_4.patch | (download) |
tests/data/Makefile.inc |
1 1 + 0 - 0 ! |
[patch] tests: verify the fix for cve-2022-27774 - Test 973 redirects from HTTP to FTP, clear auth |
| CVE 2022 27774_4_of_4.patch | (download) |
lib/http.c |
10 5 + 5 - 0 ! |
[patch] openssl: don't leak the srp credentials in redirects either Follow-up to 620ea21410030 Reported-by: Harry Sintonen Closes #8751 |
| cookie reject cookies with control bytes.patch | (download) |
lib/cookie.c |
29 29 + 0 - 0 ! |
cookie: reject cookies with "control bytes" |
| test8 verify that ctrl byte cookies are ignored.patch | (download) |
tests/data/test8 |
32 31 + 1 - 0 ! |
test8: verify that "ctrl-byte cookies" are ignored |
| CVE 2022 32221.patch | (download) |
lib/setopt.c |
1 1 + 0 - 0 ! |
setopt: when post is set, reset the 'upload' field (cve-2022-32221) |
| CVE 2022 43552.patch | (download) |
lib/smb.c |
14 2 + 12 - 0 ! |
smb/telnet: do not free the protocol struct in *_done() (cve-2022-43552) |
| CVE 2023 23916.patch | (download) |
lib/content_encoding.c |
7 3 + 4 - 0 ! |
[patch] content_encoding: do not reset stage counter for each header |
| CVE 2023 27533.patch | (download) |
lib/telnet.c |
16 16 + 0 - 0 ! |
[patch] telnet: only accept option arguments in ascii To avoid embedded telnet negotiation commands etc. Reported-by: Harry Sintonen Closes #10728 Backported to Debian by Samuel Henrique <samueloph@debian.org> |
| CVE 2023 27534.patch | (download) |
lib/curl_path.c |
70 35 + 35 - 0 ! |
[patch] curl_path: create the new path with dynbuf Closes #10729 Backported to Debian by Samuel Henrique <samueloph@debian.org> |
| CVE 2023 27538.patch | (download) |
lib/url.c |
2 1 + 1 - 0 ! |
[patch] url: fix the ssh connection reuse check Reported-by: Harry Sintonen Closes #10735 Backported to Debian by Samuel Henrique <samueloph@debian.org> |
| add_Curl_timestrcmp.patch | (download) |
lib/strcase.c |
22 22 + 0 - 0 ! |
backport curl_timestrcmp in lib/strcase.(c|h) This patch was backported by Samuel Henrique <samueloph@debian.org> and it only has the changes required to backport other patches, so we are not converting the whole codebase to make use of the new function (yet). |
| CVE 2023 27535.patch | (download) |
lib/ftp.c |
28 26 + 2 - 0 ! |
[patch] ftp: add more conditions for connection reuse Reported-by: Harry Sintonen Closes #10730 Backported to Debian by Samuel Henrique <samueloph@debian.org> |
| CVE 2023 27536.patch | (download) |
lib/url.c |
6 6 + 0 - 0 ! |
[patch] url: only reuse connections with same gss delegation Reported-by: Harry Sintonen Closes #10731 Backported to Debian by Samuel Henrique <samueloph@debian.org> |
| CVE 2023 28321.patch | (download) |
lib/hostcheck.c |
76 37 + 39 - 0 ! |
[patch] resolves: cve-2023-28321 - fix host name wildcard checking |
| CVE 2023 28322.patch | (download) |
lib/curl_rtmp.c |
4 2 + 2 - 0 ! |
[patch] lib: unify the upload/method handling By making sure we set state.upload based on the set.method value and not independently as set.upload, we reduce confusion and mixup risks, both internally and externally. Closes #11017 |
| CVE 2023 38545.patch | (download) |
lib/socks.c |
10 5 + 5 - 0 ! |
[patch] socks: return error if hostname too long for remote resolve Prior to this change the state machine attempted to change the remote resolve to a local resolve if the hostname was longer than 255 characters. Unfortunately that did not work as intended and caused a security issue. Name resolvers cannot resolve hostnames longer than 255 characters. Bug: https://curl.se/docs/CVE-2023-38545.html Backported by: Samuel Henrique <samueloph@debian.org> |
| CVE 2023 38546.patch | (download) |
lib/cookie.c |
13 1 + 12 - 0 ! |
[patch] cookie: remove unnecessary struct fields Plus: reduce the hash table size from 256 to 63. It seems unlikely to |
| CVE 2023 46218.patch | (download) |
lib/cookie.c |
24 16 + 8 - 0 ! |
[patch] cookie: lowercase the domain names before psl checks Reported-by: Harry Sintonen Closes #12387 Backported by: Samuel Henrique <samueloph@debian.org>: * Update signature of function "bad_domain" * Refresh patch context |
| CVE 2024 2398.patch | (download) |
lib/http2.c |
31 14 + 17 - 0 ! |
[patch] http2: push headers better cleanup
- provide common cleanup method for push headers
Closes #13054
Backported by: Guilherme Puida Moreira <guilherme@puida.xyz>:
* Changed h2_stream_ctx to HTTP in free_push_headers.
* Dropped unnaplicable hunk in push_promise, since it changed some code
that does not yet exist.
|
| CVE 2024 7264 0.patch | (download) |
lib/x509asn1.c |
23 14 + 9 - 0 ! |
x509asn1: clean up gtime2str Co-authored-by: Stefan Eissing Reported-by: Dov Murik Closes #14307 Backported to Debian by Carlos Henrique Lima Melara <charles@debian.org>. Changes: - In this version, GTime2str doesn't return CURLcode, so change that to NULL. |
| CVE 2024 7264 1.patch | (download) |
lib/x509asn1.c |
31 23 + 8 - 0 ! |
x509asn1: unittests and fixes for gtime2str Fix issues in GTime2str() and add unit test cases to verify correct behaviour. Follow-up to 3c914bc6801 Closes #14316 Backported to Debian by Carlos Henrique Lima Melara <charles@debian.org>. Changes: - In this version, GTime2str doesn't return CURLcode, so change that to NULL. - Also change test helper function to match the correct type and pass the correct arguments. In this version, GTime2str doesn't take struct dynbuf *. It's aimed to not FTBFS if someone build the package with --enable-debug. |
| 90_gnutls.patch | (download) |
docs/examples/Makefile.am |
4 2 + 2 - 0 ! |
build with gnutls. |
| 99_nss.patch | (download) |
docs/examples/Makefile.am |
4 2 + 2 - 0 ! |
build with nss. |
