sherlock2010
|
be63e5cab4
|
multi: check that the multi handle is valid in curl_multi_assign
|
2024-11-30 09:24:02 +00:00 |
|
yangl777
|
2e051d6a46
|
fix CVE-2024-9681
|
2024-11-11 11:21:24 +00:00 |
|
sherlock2010
|
b4efa74dd0
|
url: allow DoH transfers to override max connection limit
|
2024-09-20 10:58:26 +00:00 |
|
sherlock2010
|
3b1fe68ba0
|
fix CVE-2024-8096
|
2024-09-12 03:44:43 +00:00 |
|
sherlock2010
|
7fed7d5994
|
revert modify licence from curl to MIT
|
2024-09-05 10:48:37 +00:00 |
|
zhangxianjun
|
59359aaca0
|
modify licence from curl to MIT
|
2024-08-15 16:03:56 +08:00 |
|
yinyongkang
|
b44a18e988
|
fix CVE-2024-7264
(cherry picked from commit 2bafd8c6066d248c55bbd82219a52d0464ec71f5)
|
2024-08-13 10:12:28 +08:00 |
|
sherlock2010
|
4a9714eac4
|
backport some patches from community
(cherry picked from commit 1fed2e6238f25d78d28764e00c3b7220ca356f49)
|
2024-06-24 19:51:03 +08:00 |
|
sherlock2010
|
f5677240c8
|
add version require of nghttp2 for libcurl
|
2024-06-12 06:42:53 +00:00 |
|
baiguo
|
116887b33e
|
tool_cb_rea: limit rate unpause for -T . uploads
|
2024-05-22 16:21:30 +08:00 |
|
sherlock2010
|
fd4e24d409
|
fix CVE-2024-2004 CVE-2024-2398
(cherry picked from commit dd68bf8b01e10e49326060bc794f42650d05d82d)
|
2024-04-01 19:50:56 +08:00 |
|
sherlock2010
|
1d3fb9efea
|
update curl to 8.4.0
|
2024-01-09 11:17:48 +00:00 |
|
sherlock2010
|
bf26c4ec67
|
backport some patches from community
|
2023-12-28 06:57:28 +00:00 |
|
sherlock2010
|
cdf073516b
|
fix CVE-2023-46218 CVE-2023-46219
|
2023-12-08 03:45:08 +00:00 |
|
sherlock2010
|
899d5f2e47
|
fix CVE-2023-38545 CVE-2023-38546
|
2023-10-12 13:57:45 +08:00 |
|
eaglegai
|
34089cf56a
|
fix CVE-2023-38039
|
2023-09-14 14:44:10 +08:00 |
|
yangl777
|
f907a3210a
|
backport some patches from community
|
2023-09-06 14:30:24 +08:00 |
|
sherlock2010
|
36f3729c77
|
fix CVE-2023-32001
|
2023-07-20 11:35:21 +00:00 |
|
eaglegai
|
75ee662eef
|
update curl to 8.1.2
|
2023-07-15 02:23:17 +00:00 |
|
sherlock2010
|
65420bab7e
|
disable valgrind in tests
|
2023-06-10 07:54:19 +00:00 |
|
xingwei
|
6c7e0eb383
|
fix CVE-2023-28320,CVE-2023-28321,CVE-2023-28322
|
2023-06-08 12:01:30 +00:00 |
|
zengwefeng
|
01bf9a900e
|
fix CVE-2023-27533 CVE-2023-27534 CVE-2023-27535 CVE-2023-27536 CVE-2023-27537 CVE-2023-27538
|
2023-03-23 11:59:01 +08:00 |
|
xinghe
|
1cafb2b800
|
upgrade to 7.88.1
|
2023-03-02 06:52:08 +00:00 |
|
xinghe
|
e58a7a7369
|
fix CVE-2023-23914 CVE-2023-23915 CVE-2023-23916
|
2023-02-18 04:39:23 +00:00 |
|
sherlock2010
|
98d9092bd9
|
fix CVE-2022-43551 CVE-2022-43552
|
2022-12-22 08:08:34 +00:00 |
|
xinghe
|
7d8b090f08
|
upgrade to 7.86.0
|
2022-11-16 11:05:28 +00:00 |
|
yangl777
|
fed54f300d
|
fix CVE-2022-32221 CVE-2022-42915 CVE-2022-42916
(cherry picked from commit 629c69990093152e329f66f6b50c82dbc7a58ee3)
|
2022-10-28 15:21:07 +08:00 |
|
yangl777
|
b1696e3cc9
|
Move autoreconf to build
|
2022-10-27 12:05:28 +00:00 |
|
sherlock2010
|
c8827bfadd
|
CVE-2022-35252
(cherry picked from commit ae367a79d76928d7dd3d9b24df1ee5a07afa8d80)
|
2022-09-01 16:53:40 +08:00 |
|
eaglegai
|
01a8ae14ad
|
rebuild release to 7.79.1-9
(cherry picked from commit 4c4ac1f8a92e9ca19010cef509cdbb0303d6e5c6)
|
2022-07-28 16:12:06 +08:00 |
|
eaglegai
|
870bec2639
|
fix build error
|
2022-07-25 08:38:45 +00:00 |
|
eaglegai
|
49c5948e85
|
fix CVE-2022-32207 better
|
2022-07-05 14:40:13 +08:00 |
|
eaglegai
|
b18dd1b34c
|
fix CVE-2022-32205 CVE-2022-32206 CVE-2022-32207 CVE-2022-32208
|
2022-06-29 11:23:21 +08:00 |
|
eaglegai
|
0e666937fb
|
fix CVE-2022-27781 CVE-2022-27782
|
2022-05-17 16:59:16 +08:00 |
|
yangl777
|
6792ef0dad
|
fix skip testsuite
|
2022-05-14 15:22:36 +08:00 |
|
eaglegai
|
ff67bee66d
|
fix CVE-2022-22576 CVE-2022-27774 CVE-2022-27775 CVE-2022-27776
|
2022-05-10 10:32:19 +08:00 |
|
robertxw
|
02d2ad7c98
|
enable check in spec
|
2022-04-25 10:51:52 +08:00 |
|
gaoxingwang
|
7a24167669
|
update to 7.79.1
|
2022-01-20 21:49:28 +08:00 |
|
yangl777
|
8d50362ed6
|
fix CVE-2021-22945 CVE-2021-22946 CVE-2021-22947
|
2021-09-29 11:23:20 +08:00 |
|
eaglegai
|
2530794d42
|
fix CVE-2021-22925 CVE-2021-22926
|
2021-08-13 10:13:53 +08:00 |
|
eaglegai
|
1e1a6740cd
|
update curl to 7.77.0
|
2021-07-08 11:02:05 +08:00 |
|
eaglegai
|
dd002d235f
|
fix CVE-2021-22897 CVE-2021-22898
|
2021-06-08 14:33:33 +08:00 |
|
eaglegai
|
e5e1a7358c
|
fix CVE-2021-22890
|
2021-04-20 10:19:34 +08:00 |
|
xielhxie
|
b9e8f11e55
|
fix CVE-2021-22876
|
2021-04-09 15:23:30 +08:00 |
|
wangxp006
|
a9024a2d93
|
fix CVE-2020-8285
|
2021-01-26 20:01:16 +08:00 |
|
xielh
|
12c957ce79
|
fix CVE-2020-8286
|
2021-01-19 19:07:43 +08:00 |
|
haochenstar
|
446f6fee75
|
fix CVE-2020-8284
|
2021-01-18 11:28:16 +08:00 |
|
eaglegai
|
3a58247366
|
fix downgrade error
|
2021-01-05 11:31:01 +08:00 |
|
bitcoffee
|
2bff8bbd85
|
fix cve-2020-8231
|
2020-12-28 17:26:01 +08:00 |
|
compile_success
|
ca7adb079c
|
update curl to 7.71.1
|
2020-07-24 17:25:53 +08:00 |
|