libcurl4-32bit-7.37.0-51.1<>,\ /=„ 0) ֗E #KG8  >-Xv=[NY~/l6B1Jw%7 ^ b5A!g2?1J#}{o@̟SpNwHҝO"r d\F}iu]j M94'<0;:8B'%Tp˓9mzύ}Z/mA\~@\?FJST+Uli |X`1|k'%B֔Y閞>=o?od  > -3:LT X \ d  (8 W9|W:CW>lBlGlHlIlXlYlZm[m\m]m^m6bm@cmdnenfnlnunvnwo@xoHyoPClibcurl4-32bit7.37.051.1Version 4 of cURL shared libraryThe cURL shared library version 4 for accessing data using different network protocols.\ build75 \openSUSE Leap 42.3openSUSEBSD-3-Clause AND MIThttp://bugs.opensuse.orgProductivity/Networking/Web/Utilitieshttp://curl.haxx.se/linuxx86_64/sbin/ldconfig \\ \ e51b6c22d1ab17560fb23eded0ddcc74libcurl.so.4.3.0rootrootrootrootcurl-7.37.0-51.1.src.rpmcurl-32bitlibcurl.so.4libcurl4-32bitlibcurl4-32bit(x86-32)@@@@@@@@@@@@@@@@@@@@@@@@@   /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.15)libc.so.6(GLIBC_2.16)libc.so.6(GLIBC_2.17)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libcrypto.so.1.0.0libgssapi_krb5.so.2libgssapi_krb5.so.2(gssapi_krb5_2_MIT)libidn.so.11libidn.so.11(LIBIDN_1.0)liblber-2.4.so.2libldap-2.4.so.2libpthread.so.0libpthread.so.0(GLIBC_2.0)libpthread.so.0(GLIBC_2.1)libpthread.so.0(GLIBC_2.2)libssh2.so.1libssl.so.1.0.0libz.so.1rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)3.0.4-14.0-14.4.6-14.11.2\P\@\P@@\P@@\N[@[^["@["@Z?Z2@Zw@Zw@Zw@Ze@Z@Z@YYYYdYm@X@X@XI@W@W@W@W+5V@V@U4@Tи@T@T=@S@SZN@SE6@S!R@RR@Qo@Q4Qg@Q @Q@PP@PpPXP%OOPO2cO*zO@NNN@N@NwNNu@Ns:@NI @N7@NMWMWMMJ@L|LGK@K@KыKKKv@K^@KKJ@J@J@II@Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez pmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comvcizek@suse.compjanouch@suse.depjanouch@suse.depjanouch@suse.dealarrosa@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comkukuk@suse.devcizek@suse.comvcizek@suse.comcrrodriguez@opensuse.orgcoolo@suse.comvcizek@suse.comvcizek@suse.comcrrodriguez@opensuse.orgvcizek@suse.comsbrabec@suse.czsbrabec@suse.czcrrodriguez@opensuse.orggber@opensuse.orgcrrodriguez@opensuse.orgdnh@opensuse.orgjengelh@inai.decrrodriguez@opensuse.orgcrrodriguez@opensuse.orgdmueller@suse.demmarek@suse.czcrrodriguez@opensuse.orgjengelh@medozas.deidoenmez@suse.deopensuse@dstoecker.dedimstar@opensuse.orgjengelh@medozas.dejengelh@medozas.decrrodriguez@opensuse.orgcoolo@novell.compth@suse.decrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcristian.rodriguez@opensuse.orglnussel@suse.decrrodriguez@opensuse.orgcoolo@novell.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgdimstar@opensuse.orgmmarek@suse.czmeissner@suse.demmarek@suse.czmmarek@suse.czmmarek@suse.czmmarek@suse.czmmarek@suse.cz- Security fix [bsc#1135170, CVE-2019-5436] * A heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server * Added curl-CVE-2019-5436.patch- Security fix [bsc#1112758, bsc#1131886, CVE-2018-16839] * SASL password overflow via integer overflow * Added patch curl-CVE-2018-16839.patch- Security fix [bsc#1123378, CVE-2019-3823] * SMTP end-of-response out-of-bounds read * Added patch curl-CVE-2019-3823.patch- Security fix [bsc#1123377, CVE-2019-3822] * NTLMv2 type-3 header stack buffer overflow * Added patch curl-CVE-2019-3822.patch- Security fix [bsc#1123371, CVE-2018-16890] * NTLM type-2 out-of-bounds buffer read * Added patch curl-CVE-2018-16890.patch- Security fix [bsc#1113660, CVE-2018-16842] * Fixed Out-of-bounds Read in tool_msgs.c * Added curl-7.37.0-CVE-2018-16842.patch- Security fix [bsc#1112758, CVE-2018-16840] * use-after-free in handle close * Added curl-CVE-2018-16840.patch- Security Fix [bsc#1106019, CVE-2018-14618] * NTLM password overflow via integer overflow * Added curl-7.37.0-CVE-2018-14618.patch- Fixed erroneous debug message when paired with OpenSSL * Added curl-openssl-skip-trace-outputs.patch [bsc#1089533]- Security Fix [bsc#1092098, CVE-2018-1000301] * RTSP bad headers buffer over-read * Added curl-CVE-2018-1000301.patch- If the DEFAULT_SUSE cipher list is not available use HIGH. * Added curl-HIGH-cipher-fallback.patch [bsc#1086825]- Security Fix [bsc#1084532, CVE-2018-1000122] * readwrite: RTSP RTP buffer over-read * Added curl-7.37.0-CVE-2018-1000122.patch * Modified curl-disable_failing_tests.patch- Security Fix [bsc#1084524, CVE-2018-1000121] * openldap: check ldap_get_attribute_ber() results for NULL * LDAP NULL pointer dereference * Added curl-7.37.0-CVE-2018-1000121.patch- Security Fix [bsc#1084521, CVE-2018-1000120] * FTP: reject path components with control codes * FTP path trickery leads to NIL byte out of bounds write * Added curl-7.37.0-CVE-2018-1000120.patch- Security fix [bsc#1077001, CVE-2018-1000007] * HTTP authentication leak in redirects * Added patch curl-7.37.0-CVE-2018-1000007.patch- Security fix [bsc#1069222, CVE-2017-8817] * Read out of bounds flaw in the FTP wildcard function. * Added patch curl-7.37.0-CVE-2017-8817.patch- Security fix [bsc#1069226, CVE-2017-8816] * Buffer overrun flaw in the NTLM authentication code. * Added patch curl-7.37.0-CVE-2017-8816.patch- Security fix [bsc#1063824, CVE-2017-1000257] * IMAP FETCH response out of bounds read * Added patch curl-CVE-2017-1000257.patch- Disabled test1086 that fails on ppc64le * Refreshed patch curl-disable_failing_tests.patch- Fixed error "error:1408F10B:SSL routines" when connecting to ftps via proxy [bsc#1060653] * Added patch curl-7.37.0-connect-ftps-via-proxy.patch- Security fix [bsc#1061876, CVE-2017-1000254] * FTP PWD response parser out of bounds read * Added patch curl-7.37-CVE-2017-1000254.patch- Project curl Security Advisory, August 9th 2017 https://curl.haxx.se/docs/adv_20170809B.html - Security fix [bsc#1051644, CVE-2017-1000100] * TFTP sends more than buffer size * Added patch curl-7.37.0-CVE-2017-1000100.patch - Security fix [bsc#1051643, CVE-2017-1000101] * URL globbing out of bounds read * Added patch curl-CVE-2017-1000101.patch- Project curl Security Advisory, April 3, 2017 https://curl.haxx.se/docs/adv_20170403.html * CVE-2017-7407: --write-out out of buffer read (bsc#1032309) - Bug bsc#1027712 switch to new client side cipher suite default * Updated default cipher suite from "DEFAULT" to "SUSE_DEFAULT" * Updates previous patch curl-DEFAULT_CIPHER_SELECTION.patch - Added patches: * curl-7.37-CVE-2017-7407.patch * curl-DEFAULT_SUSE_SELECTION.patch- Project curl Security Advisory, December 21, 2016 https://curl.haxx.se/docs/adv_20161221A.html * CVE-2016-9586: curl: libcurl printf floating point buffer overflow (bsc#1015332) * Added patch curl-7.37-CVE-2016-9586.patch- Project cURL Security Advisory, November 2, 2016 https://curl.haxx.se/docs/adv_20161102K.html * CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646) * CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645) * CVE-2016-8622: URL unescape heap overflow via integer truncation (bsc#1005643) * CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642) * CVE-2016-8620: glob parser write/read out of bounds (bsc#1005640) * CVE-2016-8619: double-free in krb5 code (bsc#1005638) * CVE-2016-8618: double-free in curl_maprintf (bsc#1005637) * CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635) * CVE-2016-8616: case insensitive password comparison (bsc#1005634) * CVE-2016-8615: cookie injection for other servers (bsc#1005633) * CVE-2016-7167: escape and unescape integer overflows (bsc#998760) - added patches: * curl-CVE-2016-7167.patch * curl-CVE-2016-8615.patch * curl-CVE-2016-8616.patch * curl-CVE-2016-8617.patch * curl-CVE-2016-8618.patch * curl-CVE-2016-8619.patch * curl-CVE-2016-8620.patch * curl-CVE-2016-8621.patch * curl-CVE-2016-8622.patch * curl-CVE-2016-8623.patch * curl-CVE-2016-8624.patch- Update curl-CVE-2016-5420.patch to fix incorrect reuse of client certificates with NSS (bsc#997420 CVE-2016-7141)- Add curl-bsc991746.patch (bsc#991746) fixing a performance regression with FTP- Add curl-CVE-2016-5419.patch (bsc#991389 CVE-2016-5419) - Add curl-CVE-2016-5420.patch (bsc#991390 CVE-2016-5420) - Add curl-CVE-2016-5421.patch (bsc#991391 CVE-2016-5421)- Add fix-return-status-in-Curl_is_connected.patch . Fixes some error handling in Curl_is_connected by backporting some code from upstream. - Add 0001-Fix-invalid-Network-is-unreachable-errors.patch. Fixes "Network is unreachable" errors in valid situations when ipv6 is not available but ipv4 is working fine. This also fixes the same error from happening in applications using libcurl4 (like zypper). (bsc#915846)- fix CVE-2016-0755 (bsc#962983) * libcurl NTLM credentials not-checked for proxy connection re-use * http://curl.haxx.se/docs/adv_20160127A.html * add curl-CVE-2016-0755.patch- unexpire cookie in test 46 (bsc#962996) * add 0001-test46-update-cookie-expire-time.patch - fix a typo in curl-secure-getenv.patch (bsc#936676) - run the testsuite during build (bsc#934333) * add curl-disable_failing_tests.patch- security update: * CVE-2015-3143 (bnc#927556) - Re-using authenticated connection when unauthenticated * CVE-2015-3144 (bnc#927608) - host name out of boundary memory access * CVE-2015-3145 (bnc#927607) - cookie parser out of boundary memory access * CVE-2015-3148 (bnc#927746) - Negotiate not treated as connection-oriented * CVE-2015-3153 (bnc#928533) - sensitive HTTP server headers also sent to proxies * added patches: + curl-CVE-2015-3143.patch + curl-CVE-2015-3144.patch + curl-CVE-2015-3145.patch + curl-CVE-2015-3148.patch + curl-CVE-2015-3153.patch - fix baselibs.conf- allow md4 and md5 in fips mode (bnc#913209) * https://github.com/bagder/curl/pull/138 * added curl-allow_md4_and_md5_in_fips_mode.patch- fix for CVE-2014-8150 (bnc#911363) * request injection vulnerability * added curl-CVE-2014-8150.patch - fix for CVE-2014-3707 (bnc#901924) * duphandle read out of bounds * added curl-CVE-2014-3707.patch- add fixes for two security vulnerabilities * CVE-2014-3613 (bnc#894575) and CVE-2014-3620 (bnc#895991) * cookie leaks for ip addresses as domains and TLDs * added patches: curl-CVE-2014-3613.patch curl-CVE-2014-3620.patch- update to 7.37.0 This release includes many bugfixes and the following changes: * URL parser: IPv6 zone identifiers are now supported * CURLOPT_PROXYHEADER: set headers for proxy-only * CURLOPT_HEADEROPT: added * curl: add --proxy-header * sasl: Added support for DIGEST-MD5 via Windows SSPI * sasl: Added DIGEST-MD5 qop-option validation in native challange handling * imap: Expanded mailbox SEARCH support to use URL query strings [7] * imap: Extended FETCH support to include PARTIAL URL specifier [7] * nss: implement non-blocking SSL handshake * build: Reworked Visual Studio project files * poll: enable poll on darwin13 * mk-ca-bundle: added -p * libtests: add a wait_ms() function - dropped patches: * curl-mkhelp.patch (upstream) * curl-test815.patch (upstream)- adjust default cipher list (bnc#874986) * curl-DEFAULT_CIPHER_SELECTION.patch- update to 7.36 * fixes CVE-2014-0138 (bnc#868627) and CVE-2014-0139 (bnc#868629) * NEW FEATURES: ntlm: Added support for NTLMv2 tool: Added support for URL specific options openssl: add ALPN support gtls: add ALPN support nss: add ALPN and NPN support added CURLOPT_EXPECT_100_TIMEOUT_MS tool: add --no-alpn and --no-npn added CURLOPT_SSL_ENABLE_NPN and CURLOPT_SSL_ENABLE_ALPN http2: build with current nghttp2 version openssl: info message with SSL version used * dropped curl-test172_cookie_expiration.patch (upstream) * added patches to make it build: - curl-mkhelp.patch - curl-test815.patch- Disable BuildRequires for openssh, only needed for test suite, but the test suite isn't able to start sshd anyways. Solves the problem that openssh checkins triggers a nearly full rebuild, too.- update to 7.35.0 * security fix: CVE-2014-0015: re-use of wrong HTTP NTLM connection (bnc#858673) * changes: imap/pop3/smtp: Added support for SASL authentication downgrades imap/pop3/smtp: Extended the login options to support multiple auth mechanisms TheArtOfHttpScripting: major update, converted layout and more mprintf: Added support for I, I32 and I64 size specifiers makefile: Added support for VC7, VC11 and VC12 SSL: protocol version can be specified more precisely imap/pop3/smtp: Added graceful cancellation of SASL authentication Add "Happy Eyeballs" for IPv4/IPv6 dual connect attempts base64: Added validation of base64 input strings when decoding curl_easy_setopt: Added the ability to set the login options separately smtp: Added support for additional SMTP commands curl_easy_getinfo: Added CURLINFO_TLS_SESSION for accessing TLS internals nss: allow to use TLS > 1.0 if built against recent NSS SECURITY: added this document to describe our security processes parseconfig: warn if unquoted white spaces are detected * and many bugfixes - fix test failure because of an expired cookie (bnc#862144) * added curl-test172_cookie_expiration.patch - refresh libcurl-ocloexec.patch- update to 7.33.0 * fixes CVE-2013-4545 (bnc#849596) = curl: ssl cert checks unclear behaviour o test code for testing the event based API o CURLM_ADDED_ALREADY: new error code o test TFTP server: support "writedelay" within o krb4 support has been removed o imap/pop3/smtp: added basic SASL XOAUTH2 support o Pass password to OpenSSL engine by user interface o c-ares: Add support for various DNS binding options o cookies: add expiration o curl: added --oauth2-bearer option- curl 7.32.0 * curl: allow timeouts to accept decimal values * CURLOPT_XFERINFOFUNCTION: introducing a new progress callback * SIGPIPE: ignored while inside the library * OpenSSL: check for read errors * configure: automake 1.14 compatibility tweak * curl_multi_wait: set revents for extra fds * global dns cache: didn't work (regression) * mk-ca-bundle.1: don't install on make install- avoid cycle between curl and krb5 by using krb5-mini-devel- update to 7.31.0 * includes fix for CVE-2013-2174 (bnc#824517) * SECURITY VULNERABILITY: curl_easy_unescape() may parse data beyond the end of the input buffer [26] * Changes: darwinssl: add TLS session resumption darwinssl: add TLS crypto authentication imap/pop3/smtp: Added support for ;auth= in the URL imap/pop3/smtp: Added support for ;auth= to CURLOPT_USERPWD usercertinmem.c: add example showing user cert in memory url: Added smtp and pop3 hostnames to the protocol detection list imap/pop3/smtp: Added support for enabling the SASL initial response curl -E: allow to use ':' in certificate nicknames- update to 7.30.0 includes security fixes for CVE-2013-0249 and CVE-2013-1944 (bugs bnc#814655 and bnc#802411 respectively) (dropped curl-CVE-2013-0249.patch) - Changes: imap: Changed response tag generation to be completely unique imap: Added support for SASL-IR extension imap: Added support for the list command imap: Added support for the append command imap: Added custom request parsing imap: Added support to the fetch command for UID and SECTION properties imap: Added parsing and verification of the UIDVALIDITY mailbox attribute imap/pop3/smtp: Added support for the STARTTLS capability checksrc: ban use of sprintf, vsprintf, strcat, strncat and gets curl_global_init() now accepts the CURL_GLOBAL_ACK_EINTR flag Added CURLMOPT_MAX_HOST_CONNECTIONS, CURLMOPT_MAX_TOTAL_CONNECTIONS for new multi interface connection handling Added CURLMOPT_MAX_PIPELINE_LENGTH, CURLMOPT_CONTENT_LENGTH_PENALTY_SIZE, CURLMOPT_CHUNK_LENGTH_PENALTY_SIZE, CURLMOPT_PIPELINING_SITE_BL and CURLMOPT_PIPELI NING_SERVER_BL for new pipelining control test: offer "automake" output and check for perl better always-multi: always use non-blocking internals imap: Added support for sasl digest-md5 authentication imap: Added support for sasl cram-md5 authentication imap: Added support for sasl ntlm authentication imap: Added support for sasl login authentication imap: Added support for sasl plain text authentication imap: Added support for login disabled server capability mk-ca-bundle: add -f, support passing to stdout and more writeout: -w now supports remote_ip/port and local_ip/port - refreshed patches- Add curl-secure-getenv.patch: Use secure_getenv if available. libcurl might be linked to a program where "secure execution" is required.- fixed CVE-2013-0249 (bnc#802411) - refreshed patches- Break build loop and make GPG signature verification optional.- Verify GPG signature.- Curl 7.28.1 * FTP: prevent the multi interface from blocking Obsoletes curl-ftp-prevent-the-multi-interface-from-blocking.patch * don't send '#' fragments when using proxy * OpenSSL: Disable SSL/TLS compression - avoid the "CRIME" attack * TFTP: handle resend * memory leak: CURLOPT_RESOLVE with multi interface * SSL: Several SSL-backend related fixes- added curl-ftp-prevent-the-multi-interface-from-blocking.patch in order to prevent the multi interface from blocking when using ftp and the remote end responds very slowly (sf#3579064)- Curl 7.27.0 * support metalinks * Add sasl authentication support * various bugfixes - Fix previous change, _GNU_SOURCE --> AC_USE_SYSTEM_EXTENSIONS- define _GNU_SOURCE for oS/SLES <= 11.4, as O_CLOEXEC is defined inside a ifdef __USE_GNU- Update to new upstream release 7.25.0 * Added CURLOPT_TCP_KEEPALIVE, CURLOPT_TCP_KEEPIDLE, CURLOPT_TCP_KEEPINTVL * use new library-side TCP_KEEPALIVE options * Added a new CURLOPT_MAIL_AUTH option * Added support for --mail-auth * (for more see the shipped CHANGES file)- Problem with the c-ares backend, workaround for [bnc#745534]- Update to version curl 7.24.0 - refresh patches to fix broken build- use the rpmoptflags unconditionally, don't do own compiler flag magic. Fixes debuginfo package built- Package /usr/share/aclocal to avoid build dependency on automake.- Use O_CLOEXEC in library code.- Remove redundant/unwanted tags/section (cf. specfile guidelines)- Use original source tarball- Update to version 7.23.1: + Empty headers can be sent in HTTP requests by terminating with a semicolon + SSL session sharing support added to curl_share_setopt() + Added support to MAIL FROM for the optional SIZE parameter + smtp: Added support for NTLM authentication + curl tool: code split into tool_*.[ch] files + lots of bugfixes- Update to version 7.22.0: + Added CURLOPT_GSSAPI_DELEGATION + Added support for NTLM delegation to Samba's winbind daemon helper ntlm_auth + Display notes from setup file in testcurl.pl + BSD-style lwIP TCP/IP stack experimental support on Windows + OpenSSL: Use SSL_MODE_RELEASE_BUFFERS if available + --delegation was added to set CURLOPT_GSSAPI_DELEGATION + nss: start with no database if the selected database is broken + telnet: allow programatic use on Windows + for a list of bugfixes, see http://curl.haxx.se/changes.html#7_22_0 - Drop curl-openssl-release-buffers.patch: fixed upstream. - Add curl-fix-m4.patch: Use 'x' in configure scripts. Fixes issues when configure is run with -Werror -Wall.- Remove redundant tags/sections from specfile - Use %_smp_mflags for parallel build- Add curl-devel to baselibs- Use SSL_MODE_RELEASE_BUFFERS if available, accepted in upstream as commit 3d919440c80333c496fb- remove support for old suse_versions- Update to 7.21.7: - Fix libcurl inappropriate GSSAPI delegation. Full details at http://curl.haxx.se/docs/adv_20110623.html - Some other minor fixes. - Use the lzma compressed tarball provided upstreams.- remove unintented LDFLAGS from the spec file- Update to 7.21.6 * curl-config: fix --version * use HTTPS properly after CONNECT * SFTP: close file before post quote operations- bnc#598574 has been fixed in upstream commit 8ab137b2bc9630ce20f4 already, so enable c-ares support again.- Support openSSL compiled without SSLv2 support - Update to version 7.21.4 * SMTP: add brackets for MAIL FROM * multi: connect fail => use next IP address * pubkey_show: allocate buffer to fit any-size result * Curl_do: avoid using stale conn pointer * tftpd test server: avoid buffer overflow report from glibc * OpenSSL get_cert_chain: support larger data sets * SCP/SFTP transfers: acknowledge speedcheck * connect problem: use UDP correctly * OpenSSL: improved error message on SSL_CTX_new failures * HTTP: memory leak on multiple Location: * curl.1: typo in -v description * CURLOPT_SOCKOPTFUNCTION: return proper error code --keepalive-time * file: add support for CURLOPT_TIMECONDITION * multi: fix CURLM_STATE_TOOFAST for multi_socket- Update to version 7.21.2 * curl -T: ignore file size of special files * Added GOPHER protocol support * Added mk-ca-bundle.vbs script * c-ares build now requires c-ares >= 1.6.0 * --remote-header-name security vulnerability fixed * multi: support the timeouts correctly, fixes known bug #62 * multi: use timeouts properly for MAX_RECV/SEND_SPEED * negotiation: Wrong proxy authorization * multi: avoid sending multiple complete messages * cmdline: make -F type= accept ;charset= * RESUME_FROM: clarify what ftp uploads do * http: handle trailer headers in all chunked responses * Curl_is_connected: use correct errno * progress: callback for POSTs less than MAX_INITIAL_POST_SIZE * Link curl and the test apps with -lrt explicitly when necessary * chunky parser: only rewind stream internally if needed * remote-header-name: don't output filename when NULL * Curl_timeleft: avoid returning "no timeout" by mistake * timeout: use the correct start value as offset * FTP: fix wrong timeout trigger * rtsp: avoid SIGSEGV on malformed header * LDAP: Support for tunnelling queries through HTTP proxy * curl_easy_duphandle: clone the c-ares handle correctly * support URL containing colon without trailing port number * parsedate: allow time specified without seconds * curl_easy_escape: don't escape "unreserved" characters * SFTP: avoid downloading negative sizes * Lots of GSS/KRB FTP fixes * TFTP: Work around tftpd-hpa upload bug * libcurl.m4: several fixes * HTTP: remove special case for 416 * globbing: fix crash on unballanced open brace- allowing switching to nss instead of openssl via bcond- disable c-ares support while bnc598574 is fixed.- buildrequire pkg-config to fix provides- Update to libcurl 7.20.1 * off-by-one in the chunked encoding trailer parser * CURLOPT_CERTINFO memory leak * threaded resolver double free when closing curl handle * url_multi_remove_handle() caused use after free * SSL possible double free when reusing curl handle * alarm()-based DNS timeout bug- enable libssh2 support unconditionally.- enable libcares support unconditionally.- Update to version 7.20.0: * support SSL_FILETYPE_ENGINE for client certificate * curl-config can now show the arguments used when building curl * non-blocking TFTP * send Expect: 100-continue for POSTs with unknown sizes * added support for IMAP(S), POP3(S), SMTP(S) and RTSP * added new curl_easy_setopt() options for SMTP and RTSP * added --mail-from and --mail-rcpt for SMTP * VMS build system enhancements * added support for the PRET ftp command * curl supports --ssl and --ssl-reqd * added -J/--remote-header-name for using server-provided filename with -O * enhanced asynchronous DNS lookups * symbol CURL_FORMAT_OFF_T is obsoleted * many bugfixes- updated to 7.19.7 * -T. is now for non-blocking uploading from stdin * SYST handling on FTP for OS/400 FTP server cases * libcurl refuses to read a single HTTP header longer than 100K * added the --crlfile option to curl * many bugfixes- add baselibs.conf as source- updated to 7.19.6 * CURLOPT_FTPPORT (and curl's -P/--ftpport) support port ranges * Added CURLOPT_SSH_KNOWNHOSTS, CURLOPT_SSH_KEYFUNCTION, CURLOPT_SSH_KEYDATA * CURLOPT_QUOTE, CURLOPT_POSTQUOTE and CURLOPT_PREQUOTE can be told to ignore error responses when used with FTP * fixed CVE-2009-2417 (matching certificates with embedded NUL bytes) * many other bugfixes- remove the Obsoletes: curl-ca-bundle, it breaks parallel installation of older libcurl packages (bnc#484044).- updated to 7.19.5 * libcurl now closes all dead connections whenever you attempt to open a new connection * libssh2's version number can now be figured out run-time instead of using the build-time fixed number * CURLOPT_SEEKFUNCTION may now return CURL_SEEKFUNC_CANTSEEK * curl can now upload with resume even when reading from a pipe * a build-time configured curl_socklen_t is now used instead of socklen_t - by default, don't abort if the testsuite fails.- don't run autoreconf -fi as it breaks on older distros and upstream uses recent autotools already.- updated to 7.19.4 * don't follow redirects to file:// and scp:// by default; add new curl_easy_setopt options CURLOPT_PROTOCOLS and CURLOPT_REDIR_PROTOCOLS to specify which protocols are allowed and which protocols are allowed to redirect to (bnc#475103, CVE-2009-0037) * Added CURLOPT_NOPROXY and the corresponding --noproxy * the OpenSSL-specific code disables TICKET (rfc5077) which is enabled by default in openssl 0.9.8j * Added CURLOPT_TFTP_BLKSIZE * Added CURLOPT_SOCKS5_GSSAPI_SERVICE and CURLOPT_SOCKS5_GSSAPI_NEC - with the corresponding curl options - -socks5-gssapi-service and --socks5-gssapi-nec * Improved IPv6 support when built with with c-ares >= 1.6.1 * Added CURLPROXY_HTTP_1_0 and --proxy1.0 * Added docs/libcurl/symbols-in-versions * Added CURLINFO_CONDITION_UNMET * Added support for Digest and NTLM authentication using GnuTLS * CURLOPT_FTP_CREATE_MISSING_DIRS can now be set to 2 to retry the CWD even when MKD fails * GnuTLS initing moved to curl_global_init() * CURLAUTH_DIGEST_IE bit added for CURLOPT_HTTPAUTH and CURLOPT_PROXYAUTH * pkg-config can now show supported_protocols and supported_features * Added CURLOPT_CERTINFO and CURLINFO_CERTINFO * Added CURLOPT_POSTREDIR * Better detect HTTP 1.0 servers and don't do HTTP 1.1 requests on them * configure --disable-proxy disables proxy support * Added CURLOPT_USERNAME and CURLOPT_PASSWORD * --interface now works with IPv6 connections on glibc systems * Added CURLOPT_PROXYUSERNAME and CURLOPT_PROXYPASSWORD/bin/shcurl-32bit7.37.07.37.0-51.17.37.0-51.1 7.37.0libcurl.so.4libcurl.so.4.3.0/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:10306/openSUSE_Leap_42.3_Update/dc92dd9dbe67ca5858b3957a64c8bc93-curl.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=7da24a1b8fc56a970d5716abec63076cc5635e3d, strippedPRRRRRRRR R R RRRRRRRRR R RRRRR?0]"k%wdH+5f-ON;ӴV~]iBѳU)AP+[~ZL'Y]-ԧ5De蛋b/h(~\Oύ["9R3p,xRPYq1NV8ӣ+,WBQܜLcϳ9Nc.9 x4XĮYbx<io]y H5[ Ik3齈gAf32.I3#n0߮C4В'>&WXtReW -#xHk=`7IKi7! `Gv!90K|#(?ؖ^2|҉xzMÉcB n\#KZa|[lyp􀢱5kK:Qu0yAIn8mBTC;ҪOKƞ-u{Vv `ū7VCᢞҏ7=FC'y췤7\nJ}7e>- jb:M2p;a([6K #rZ^O]!Z rjM]$1&#q_0ޞVځr1AQ/B%|KRfۻB=MOTXJ`s sɥW*b6uB3[s T.~n\7AM=')/NߙjEُ: vdBhUT{A^zH[rBz˥H!^~~3< Ƃ0;וqYR@Rg|7i;\Ɨ")&@4 & 1ߙ֑aӿ9I~ UJs[ͥt]6 T]+Ke ܳzࢯ+acğDz9eMb*XeY#peR7h{.庞Z(:Pj5?K}SEf{LB!1Ķ_6!5+$6ň] IT'؟A$v_Ǿۭ=UFst輲lׄl3ߠWbE}(iH¹F*l+%q[XC+IoBvP)B[,1,p0񗤻0,ϖyN"R@nCȳ v_@z5)Jz)ãXwM)-1bdAc3( l2?Q^Ѝ \%?aӏ~fkm­RtGp[tdz(HP6](T'D#8Zh֪1L9ݛqHXsAVKoqrz^ο#h>N\Ny'{8wc,)u:bT,n,?_!Gd*=xzDo͠ D*S .MVwG 5$16SA5IF[8G޷A75 us*UgUg@KSk5]VȨM#yen*h Y@iGHWQ|ֵljUG9UL"S&, %(qfd)iO(^^>}󺯰{R1ئ~` |7:jz82{D0R7ꠉ#PExq[TջҙɰVִFi "YNPmS&*U7e#r#,5 yizVZ5  P[3'xuBDKQ$DhԤ6'Y9%F 8Nq|ż޲/ '0_ a4뵰g]xRQ$  E}ebJL6hoj1ȵ2þF{-9@$Q/ 85omc1&}6 -?3=يsr9:sfBK+SoPm[bigJ{6[6)wf%\ O&jF|VaԕQij0$r]QdZefDp[TENOiq,=lpȴLՌF*)G-Qn(ޣ"ENTl!He0#X[ vP׫5Hyakuْټs^0 &gKdI#67k\_Pyb,v}XmJQfB%"[u^'Go9鬋,ҠIGܗQW%IQ 'Qy1^].j8p. ta D"0$2_RM\#u1:I!(ɱus.uO i"碌P~%፛ω7A?5dd0=I%)MkeV`H AM& kڏgRYeS .N9r$J w.DBT]Uiw;7lxnOyt:.`d4,Jֿ P8aD.v ;zvB$Yq$/$f%-b8ODGR_8f; (ӖGKBRXx5L {sa^_喥us罔%[UĸvLW+xͧYB+UƁw^s$٫1cs۠uv;r:PCK['k2*[Q3