libadns-devel-1.5.1-lp151.3.3.1<>,^6/=„5V)x ܞVэdu贏݃Ā<hwsQǙ\Uěo; \2ᒁcVӦ=CS=V9K!WHB:Ł8" EC.^- r.z A}*/ÙnjWuU."TUaQh~L4 飄%ѱ+GEvжG+Oh)ǯȱpq >~z+El (^Ul$<0W>;?d " f :kqx     $H`(8 9, : FGG\HdIlXpYx\]^bcdef"l$u4v<zRdhnClibadns-devel1.5.1lp151.3.3.1Libraries and header files to develop programs with libadns supportLibadns-devel includes the header file and static library to develop programs with libads support.^6lamb70QopenSUSE Leap 15.1openSUSEGPL-2.0+http://bugs.opensuse.orgDevelopment/Languages/C and C++http://www.chiark.greenend.org.uk/~ian/adns/ftp/linuxi586Q ^6^622e7da740ac5f4aed4b79d082fc6f6a8f5348d40303fa84023889c20ba47502flibadns.so.1rootrootrootrootadns-1.5.1-lp151.3.3.1.src.rpmlibadns-devellibadns-devel(x86-32)    glibc-devellibadns1rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.5.13.0.4-14.6.0-14.0-15.2-14.14.1^(@YXӸTPQ@QQINxNˎNˎKristyna Streitova aavindraa@gmail.comkstreitova@suse.commpluskal@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgmmeister@suse.comcoolo@suse.comjengelh@medozas.decrrodriguez@opensuse.org- add the following patches to fix multiple vulnerabilities [bsc#1172265] * adns-1.5.1-CVE-2017-9103.patch [CVE-2017-9103] * adns-1.5.1-CVE-2017-9104.patch [CVE-2017-9104] * adns-1.5.1-CVE-2017-9105.patch [CVE-2017-9105] * adns-1.5.1-CVE-2017-9106.patch [CVE-2017-9106] * adns-1.5.1-CVE-2017-9107.patch [CVE-2017-9107] * adns-1.5.1-CVE-2017-9108.patch [CVE-2017-9108] * adns-1.5.1-CVE-2017-9109.patch [CVE-2017-9109]- Update to 1.5.1 * Fix addr queries (including subqueries, ie including deferencing MX lookups etc.) not to crash when one of the address queries returns tempfail. Also, do not return a spurious pointer to the application when one of the address queries returns a permanent error (although, the application almost certainly won't use this pointer because the associated count is zero). * Portability fix for systems where socklen_t is bigger than int. * Fix for malicious optimisation of memcpy in test suite, which causes failure with gcc-4.1.9 -O3. * Fix TCP async connect handling. The bug is hidden on Linux and on most systems where the nameserver is on localhost. If it is not hidden, adns's TCP support is broken unless adns_if_noautosys is used. * adnsresfilter: Fix addrtextbuf buffer size. This is not actually a problem in real compiled code but should be corrected. * Properly include harness.h in adnstest.c in regress/. Suppresses a couple of compiler warnings (implicit declaration of Texit, etc.) - cleanup with spec-cleaner- cleanup with spec-cleaner - get rid of %{name} macro in the patch name - restart patch numbering- Remove obsolete patches * adns-ocloexec.patch * adns-1.4-ipv6.patch - Add gpg signature - Cleanup spec-file with spec-cleaner - Remove already disabled %check section, tests require working network setup - Update to 1.5.0 * This release provides full IPv6 support. Applications can request AAAA records (containing IPv6 addresses) as well as, or instead of, A records (containing IPv4 addresses). adns 1.5 can speak to nameservers over IPv6. * converting between addresses and address literals. These carry less baggage than getaddrinfo and getnameinfo. * bugfixes and other minor changes (see changelog for details)- remove debug statement in the spec file, leftover from previous change.- Build with large file support in 32 bit archs, autoconf stuff is fine, but C files included config.h after C library headers, therefore no prototypes for *64 functions found.- Added download url as source. Please see http://en.opensuse.org/SourceUrls- add autoconf as buildrequire to avoid implicit dependency- Remove redundant/unwanted tags/section (cf. specfile guidelines)- Use O_CLOEXEC in library code. - Change the visibility patch to not use the error prone version-script but rather GCC visibilitylamb70 15919489421.5.1-lp151.3.3.11.5.1-lp151.3.3.1adns.hlibadns.so/usr/include//usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:12885/openSUSE_Leap_15.1_Update/0119cd3954da5d3f6b4f09337c8b9403-adns.openSUSE_Leap_15.1_Updatedrpmxz5i586-suse-linuxC source, ASCII textJ`ǿSwO"utf-8e659801f9dc186d803a21682b46220d77d6079d1d5e63c1a76fcc5d3e5220059?P7zXZ !t/]"k%ʽdj1kII%ɋpovxV)c+pvy"8FId"5LKIYh.pB6T3`QB}]DRV1;_B:gGrR8?hpdC NAY#h́ԕz5R b|&PWqw:N&Z|O1>]kneg-5Lˆ.^DUx<'X[goRMjdyY+;u Gձ7q.tŪL":c=V|ZYb)sـTCkt9xmjTqtЍ;=ΨZI;_<g\\Ʒ: }PpJbk=Sꦯ]wK c, تЏ"Oon4v~SsB'Jݩbð}4(Jnz;鯫QByǨkSMgin ޷BbB)}0Ƨ,<_<'dv 0y;j{uuc~I RCD!:F4f45҉&^j0F!pΜkbSAe2%W:F .@=Blԗ5S#ڌjH ŨM 8Y%*+V87)EZЈ =; +Rcy-{ qBړr>S @ ( 0Ρv.ȶ YZ