Name curl
Version 7.69.1
Summary Command line tool and library for client-side URL transfers
Description It uses URL syntax to transfer data to and from servers. curl is a widely used because of its ability to be flexible and complete complex tasks. For example, you can use curl for things like user authentication, HTTP post, SSL connections, proxy support, FTP uploads, and more!
Section console/network
License MIT
Homepage http://curl.haxx.se/
Bug tracker http://curl.haxx.se/mail/list.cgi?list=curl-tracker
Recipe file recipes-support/curl/curl_7.69.1.bb
Layer openembedded-core (dunfell branch)
Inherits
  • autotools
  • binconfig
  • multilib_header
  • multilib_script
  • pkgconfig
  • siteconfig
  • siteinfo
  • update-alternatives
Dependencies
  • autoconf-native
  • automake-native
  • gnu-config-native
  • gnutls
  • libidn2
  • libtool-cross
  • libtool-native
  • pkgconfig-native
  • virtual/i686-oe-linux-compilerlibs
  • virtual/i686-oe-linux-gcc
  • virtual/libc
  • virtual/update-alternatives
  • zlib
  • c-ares
  • brotli
  • gnutls
  • krb5
  • libidn2
  • libssh2
  • mbedtls
  • nghttp2
  • nss
  • rtmpdump
  • openssl
  • zlib
PACKAGECONFIG options
  • ares
  • brotli
  • builtinmanual
  • dict
  • gnutls
  • gopher
  • imap
  • ipv6
  • krb5
  • ldap
  • ldaps
  • libidn
  • libssh2
  • mbedtls
  • nghttp2
  • nss
  • pop3
  • proxy
  • rtmpdump
  • rtsp
  • smb
  • smtp
  • ssl
  • telnet
  • tftp
  • threaded-resolver
  • verbose
  • zlib

Sources

https://curl.haxx.se/download/curl-7.69.1.tar.bz2

Patches

Patch Status
curl/0001-replace-krb5-config-with-pkg-config.patch Pending
curl/CVE-2020-8169.patch Backport
curl/CVE-2020-8177.patch Backport
curl/CVE-2020-8231.patch Backport [import from fedora https://koji.fedoraproject.org/koji/fileinfo?rpmID=24270817&filename=0004-curl-7.69.1-CVE-2020-8231.patch ]
curl/CVE-2020-8284.patch Backport [https://github.com/curl/curl/commit/ec9cc725d598ac]
curl/CVE-2020-8285.patch Backport [import from fedora https://koji.fedoraproject.org/koji/fileinfo?rpmID=24270817&filename=0006-curl-7.69.1-CVE-2020-8285.patch]
curl/CVE-2020-8286.patch Backport [import from fedora https://koji.fedoraproject.org/koji/fileinfo?rpmID=24270817&filename=0007-curl-7.71.1-CVE-2020-8286.patch ]
curl/CVE-2021-22876.patch Backport
curl/CVE-2021-22890.patch Backport
curl/CVE-2021-22898.patch Backport
curl/CVE-2021-22924.patch Backport from Ubuntu curl_7.68.0-1ubuntu2.6
curl/CVE-2021-22925.patch Backport from Ubuntu curl_7.68.0-1ubuntu2.6
curl/CVE-2021-22946-pre1.patch Backport from 7.68.0-1ubuntu2.7
curl/CVE-2021-22946.patch Backport from 7.68.0-1ubuntu2.7
curl/CVE-2021-22947.patch Backport from 7.68.0-1ubuntu2.7
curl/CVE-2022-27776.patch Backport [https://github.com/curl/curl/commit/6e659993952aa5f90f48864be84a1bbb047fc258.patch]
curl/CVE-2022-27775.patch Backport [https://github.com/curl/curl/commit/058f98dc3fe595f21dc26a5b9b1699e519ba5705.patch]
curl/CVE-2022-22576.patch Backport [https://github.com/curl/curl/commit/852aa5ad351ea53e5f01d2f44b5b4370c2bf5425.patch]
curl/CVE-2022-27774-1.patch Backport [https://github.com/curl/curl/commit/08b8ef4e726ba10f45081ecda5b3cea788d3c839]
curl/CVE-2022-27774-2.patch Backport [https://github.com/curl/curl/commit/620ea21410030a9977396b4661806bc187231b79]
curl/CVE-2022-27774-3.patch Backport [https://github.com/curl/curl/commit/139a54ed0a172adaaf1a78d6f4fff50b2c3f9e08]
curl/CVE-2022-27774-4.patch Backport [https://github.com/curl/curl/commit/093531556203decd92d92bccd431edbe5561781c]
curl/CVE-2022-27781.patch Backport [https://github.com/curl/curl/commit/5c7da89d404bf59c8dd82a001119a16d18365917]
curl/CVE-2022-27782-1.patch Backport [https://github.com/curl/curl/commit/f18af4f874cecab82a9797e8c7541e0990c7a64c]
curl/CVE-2022-27782-2.patch Backport [https://github.com/curl/curl/commit/1645e9b44505abd5cbaf65da5282c3f33b5924a5]
curl/CVE-2022-32206.patch Backport [https://github.com/curl/curl/commit/3a09fbb7f264c67c43]
curl/CVE-2022-32207.patch Backport [https://github.com/curl/curl/commit/20f9dd6bae50b]
curl/CVE-2022-32208.patch Backport [https://github.com/curl/curl/commit/6ecdf5136b52af7]
curl/CVE-2022-35252.patch Backport [https://github.com/curl/curl/commit/8dfc93e573ca740544a2d79ebb]
curl/CVE-2022-32221.patch Backport [https://github.com/curl/curl/commit/a64e3e59938abd7d6]
curl/CVE-2022-35260.patch Backport
curl/CVE-2022-43552.patch Backport [https://github.com/curl/curl/commit/4f20188ac644afe174be6005ef4f6ffba232b8b2]
curl/CVE-2023-23916.patch Backport [https://github.com/curl/curl/commit/119fb187192a9ea13dc90d9d20c215fc82799ab9]
curl/CVE-2023-27534-pre1.patch Backport from [https://github.com/curl/curl/commit/6c51adeb71da076c5c40a45e339e06bb4394a86b]
curl/CVE-2023-27534.patch Backport from [https://github.com/curl/curl/commit/4e2b52b5f7a3bf50a0f1494155717b02cc1df6d6]
curl/CVE-2023-27538.patch Backport [https://github.com/curl/curl/commit/af369db4d3833272b8ed443f7fcc2e757a0872eb]
curl/CVE-2023-27533.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/curl/tree/debian/patches/CVE-2023-27533.patch?h=ubuntu/focal-security
curl/CVE-2023-27535-pre1.patch Backport from [https://github.com/curl/curl/commit/ed5095ed94281989e103c72e032200b83be37878 & https://github.com/curl/curl/commit/f18af4f874cecab82a9797e8c7541e0990c7a64c]
curl/CVE-2023-27535.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/curl/tree/debian/patches/CVE-2023-27535.patch?h=ubuntu/focal-security
curl/CVE-2023-27536.patch Backport [https://github.com/curl/curl/commit/cb49e67303dbafbab1cebf4086e3ec15b7d56ee5]
curl/CVE-2023-28320.patch Backport [https://github.com/curl/curl/commit/13718030ad4b3209a7583b4f27f683cd3a6fa5f2]
curl/CVE-2023-28320-fol1.patch Backport [https://github.com/curl/curl/commit/f446258f0269a62289cca0210157cb8558d0edc3]
curl/CVE-2023-32001.patch Backport [https://github.com/curl/curl/commit/0c667188e0c6cda615a036b8a2b4125f2c404dde]
curl/CVE-2023-38545.patch Backport [fb4415d8aee6c1045be932a34fe6107c2f5ed147]
curl/CVE-2023-38546.patch Backport [61275672b46d9abb32857404]
curl/CVE-2023-28321.patch Backport [import from ubuntu curl_7.68.0-1ubuntu2.20 with
curl/CVE-2023-28322.patch Backport [ import patch from ubuntu curl_7.68.0-1ubuntu2.20
curl/CVE-2023-46218.patch Backport [ import from ubuntu http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_7.68.0-1ubuntu2.21.debian.tar.xz upstream https://github.com/curl/curl/commit/2b0994c29a721c91c57 ]
curl/CVE-2024-2398.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/curl/tree/debian/patches/CVE-2024-2398.patch?h=ubuntu/focal-security

bbappends

This recipe is appended by:

meta-mingw curl_%.bbappend
meta-webosose curl_%.bbappend
meta-mel curl_%.bbappend
meta-mentor-staging curl_%.bbappend
meta-lmp-base curl_%.bbappend
meta-toradex-demos curl_%.bbappend

Other branches

This recipe in other branches of openembedded-core:

Branch Recipe
master curl 8.10.1
scarthgap (Yocto Project 5.0) curl 8.7.1
nanbield (Yocto Project 4.3) curl 8.4.0
mickledore (Yocto Project 4.2) curl 8.0.1
langdale (Yocto Project 4.1) curl 7.85.0
kirkstone (Yocto Project 4.0) curl 7.82.0
honister (Yocto Project 3.4) curl 7.78.0
hardknott (Yocto Project 3.3) curl 7.75.0
gatesgarth (Yocto Project 3.2) curl 7.72.0
dunfell (Yocto Project 3.1) curl 7.69.1 (this recipe)
zeus (Yocto Project 3.0) curl 7.66.0
warrior (Yocto Project 2.7) curl 7.64.1
thud (Yocto Project 2.6) curl 7.61.0
sumo (Yocto Project 2.5) curl 7.61.0
rocko (Yocto Project 2.4) curl 7.58.0
pyro (Yocto Project 2.3) curl 7.53.1
morty (Yocto Project 2.2) curl 7.50.1
krogoth (Yocto Project 2.1) curl 7.47.1
jethro (Yocto Project 2.0) curl 7.44.0
fido (Yocto Project 1.8) curl 7.40.0
dizzy (Yocto Project 1.7) curl 7.37.1
daisy (Yocto Project 1.6) curl 7.35.0
dora (Yocto Project 1.5) curl 7.32.0
dylan (Yocto Project 1.4) curl 7.29.0
danny (Yocto Project 1.3) curl 7.26.0