-------------------------------------------------------------------
Mon Mar 13 20:32:26 UTC 2023 - Pedro Monreal <pmonreal@suse.com>

- Security fixes:
  * [bsc#1209209, CVE-2023-27533] TELNET option IAC injection
    Add curl-CVE-2023-27533-no-sscanf.patch curl-CVE-2023-27533.patch
  * [bsc#1209210, CVE-2023-27534] SFTP path ~ resolving discrepancy
    Add curl-CVE-2023-27534.patch curl-CVE-2023-27534-dynbuf.patch
  * [bsc#1209211, CVE-2023-27535] FTP too eager connection reuse
    Add curl-CVE-2023-27535.patch
  * [bsc#1209212, CVE-2023-27536] GSS delegation too eager connection re-use
    Add curl-CVE-2023-27536.patch
  * [bsc#1209214, CVE-2023-27538] SSH connection too eager reuse still
    Add curl-CVE-2023-27538.patch

-------------------------------------------------------------------
Mon Dec 12 10:55:34 UTC 2022 - Pedro Monreal <pmonreal@suse.com>

- Security Fix: [bsc#1206309, CVE-2022-43552]
  * HTTP Proxy deny use-after-free
  * Add curl-CVE-2022-43552.patch

-------------------------------------------------------------------
Mon Oct 17 15:18:18 UTC 2022 - Pedro Monreal <pmonreal@suse.com>

- Security Fix: [bsc#1204383, CVE-2022-32221]
  * POST following PUT confusion
  * Add curl-CVE-2022-32221.patch

-------------------------------------------------------------------
Mon Aug 22 07:58:10 UTC 2022 - Pedro Monreal <pmonreal@suse.com>

- Security fix: [bsc#1202593, CVE-2022-35252]
  * Control codes in cookie denial of service
  * Add curl-CVE-2022-35252.patch

-------------------------------------------------------------------
Mon Jun 27 15:16:35 UTC 2022 - David Anes <david.anes@suse.com>

- Security fix: [bsc#1200737, CVE-2022-32208]
  * FTP-KRB bad message verification
  * Add curl-CVE-2022-32208.patch

-------------------------------------------------------------------
Thu May  5 13:02:26 UTC 2022 - David Anes <david.anes@suse.com>

- Securiy fix: [bsc#1199223, CVE-2022-27781]
  * CERTINFO never-ending busy-loop
  * Add curl-CVE-2022-27781.patch

- Securiy fix: [bsc#1199224, CVE-2022-27782]
  * TLS and SSH connection too eager reuse
  * Add curl-CVE-2022-27782.patch

-------------------------------------------------------------------
Mon Apr 25 17:15:34 UTC 2022 - David Anes <david.anes@suse.com>

- Security fix: [bsc#1198766, CVE-2022-27776]
  * Auth/cookie leak on redirect
  * Add backported curl-CVE-2022-27776.patch
  * Add curl-CVE-2022-27776-strcasecompare.patch to provide missing
    functions from newer versions.

- Security fix: [bsc#1198614, CVE-2022-22576]
  * OAUTH2 bearer bypass in connection re-use
  * Add backported curl-CVE-2022-22576.patch

-------------------------------------------------------------------
Mon Sep 13 08:55:31 UTC 2021 - Pedro Monreal <pmonreal@suse.com>

- Security fix: [bsc#1190374, CVE-2021-22947]
  * STARTTLS protocol injection via MITM
  * Add curl-CVE-2021-22947.patch

-------------------------------------------------------------------
Mon Sep 13 08:19:07 UTC 2021 - Pedro Monreal <pmonreal@suse.com>

- Security fix: [bsc#1190373, CVE-2021-22946]
  * Protocol downgrade required TLS bypassed
  * Add curl-CVE-2021-22946.patch

-------------------------------------------------------------------
Tue Jul 13 16:56:23 UTC 2021 - Pedro Monreal <pmonreal@suse.com>

- Security fix: [bsc#1188220, CVE-2021-22925]
  * TELNET stack contents disclosure again
  * Add curl-CVE-2021-22925.patch

-------------------------------------------------------------------
Mon Jul 12 18:26:52 UTC 2021 - Pedro Monreal <pmonreal@suse.com>

- Security fix: [bsc#1188219, CVE-2021-22924]
  * Bad connection reuse due to flawed path name checks
  * Add curl-CVE-2021-22924.patch

-------------------------------------------------------------------
Mon Jul 12 18:21:13 UTC 2021 - Pedro Monreal <pmonreal@suse.com>

- Security fix: Disable the metalink feature:
  * Insufficiently Protected Credentials [bsc#1188218, CVE-2021-22923]
  * Wrong content via metalink not discarded [bsc#1188217, CVE-2021-22922]

-------------------------------------------------------------------
Mon May 17 09:05:35 UTC 2021 - Pedro Monreal <pmonreal@suse.com>

- Security fix: [bsc#1186114, CVE-2021-22898]
  * TELNET stack contents disclosure
- Add curl-CVE-2021-22898.patch

-------------------------------------------------------------------
Wed Mar 24 15:23:57 UTC 2021 - Pedro Monreal <pmonreal@suse.com>

- Security fix: [bsc#1183933, CVE-2021-22876]
  * The automatic referer leaks credentials
- Add curl-CVE-2021-22876-URL-API.patch curl-CVE-2021-22876.patch

-------------------------------------------------------------------
Wed Dec 16 16:42:20 UTC 2020 - Pedro Monreal <pmonreal@suse.com>

- Update curl-CVE-2020-8284.patch [bsc#1179398, CVE-2020-8284]

-------------------------------------------------------------------
Mon Dec  7 19:16:30 UTC 2020 - Peter Simons <psimons@suse.com>

- Apply "curl-CVE-2020-8284.patch" to enable --ftp-skip-pasv-ip by
  default. This change fixes a security issue where a malicious FTP
  server was able to use the `PASV` response to trick curl into
  connecting back to a given IP address and port, and this way
  potentially make curl extract information about services that are
  otherwise private and not disclosed, doing port scanning and
  service banner extractions. If curl operated on a URL provided by
  a user (which by all means is an unwise setup), a user was able
  to exploit that and pass in a URL to a malicious FTP server
  instance without needing any server breach to perform the attack.
  [CVE-2020-8284, bsc#1179398]

-------------------------------------------------------------------
Mon Dec  7 18:56:24 UTC 2020 - Pedro Monreal <pmonreal@suse.com>

- Security fix: [bsc#1179399, CVE-2020-8285]
  * FTP wildcard stack overflow: The wc_statemach() internal
    function has been rewritten to use an ordinary loop instead of
    the recursive approach.
- Add curl-CVE-2020-8285.patch

-------------------------------------------------------------------
Thu Aug 13 09:32:49 UTC 2020 - Pedro Monreal <pmonreal@suse.com>

- Security fix: [bsc#1175109, CVE-2020-8231]
  * An application that performs multiple requests with libcurl's
    multi API and sets the 'CURLOPT_CONNECT_ONLY' option, might in
    rare circumstances experience that when subsequently using the
    setup connect-only transfer, libcurl will pick and use the wrong
    connection and instead pick another one the application has
    created since then.
- Add curl-CVE-2020-8231.patch

-------------------------------------------------------------------
Wed Jun 17 08:43:40 UTC 2020 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>

- Security fix: [bsc#1173027, CVE-2020-8177]
  * curl can be tricked my a malicious server to overwrite a local
    file when using '-J' ('--remote-header-name') and '-i' ('--head')
    in the same command line.
- Add curl-CVE-2020-8177.patch

-------------------------------------------------------------------
Thu Sep  5 11:20:01 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>

- Security fix: [bsc#1149496,CVE-2019-5482]
  * TFTP small blocksize heap buffer overflow
  * Added curl-CVE-2019-5482.patch

-------------------------------------------------------------------
Thu May 16 17:39:49 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>

- Security fix [bsc#1135170, CVE-2019-5436]
  * A heap buffer overflow exists in tftp_receive_packet that
    receives data from a TFTP server
  * Added curl-CVE-2019-5436.patch

-------------------------------------------------------------------
Mon Oct 29 09:27:14 UTC 2018 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>

- Security fix [bsc#1113660, CVE-2018-16842]
  * Fixed Out-of-bounds Read in tool_msgs.c
  * Added curl-7.37.0-CVE-2018-16842.patch

-------------------------------------------------------------------
Wed Oct 24 09:20:23 UTC 2018 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>

- Security fix [bsc#1112758, CVE-2018-16840]
  * use-after-free in handle close
  * Added curl-CVE-2018-16840.patch

-------------------------------------------------------------------
Mon Sep  3 16:21:52 UTC 2018 - pmonrealgonzalez@suse.com

- Security Fix [bsc#1106019, CVE-2018-14618]
  * NTLM password overflow via integer overflow
  * Added curl-7.37.0-CVE-2018-14618.patch

-------------------------------------------------------------------
Mon May  7 08:58:06 UTC 2018 - pmonrealgonzalez@suse.com

- Security Fix [bsc#1092098, CVE-2018-1000301]
  * RTSP bad headers buffer over-read
  * Added curl-CVE-2018-1000301.patch

-------------------------------------------------------------------
Thu Apr 26 09:27:42 UTC 2018 - pmonrealgonzalez@suse.com

- Disable check on CURLOPT_SSL_VERIFYHOST for backward compatibility
  as it no longer supports 1 as value. [bsc#1090194]
- Added curl-fix-verifyhost.patch

-------------------------------------------------------------------
Tue Mar 27 12:42:22 UTC 2018 - pmonrealgonzalez@suse.com

- If the DEFAULT_SUSE cipher list is not available use HIGH.
  * Added curl-HIGH-cipher-fallback.patch [bsc#1086825]

-------------------------------------------------------------------
Tue Mar 13 14:10:50 UTC 2018 - vcizek@suse.com

- Require libopenssl that implements the DEFAULT_SUSE cipher list
  (bsc#1081056, bsc#1083463)

-------------------------------------------------------------------
Fri Mar  9 16:25:01 UTC 2018 - pmonrealgonzalez@suse.com

- Security Fix [bsc#1084532, CVE-2018-1000122]
  * readwrite: RTSP RTP buffer over-read
  * Added curl-7.37.0-CVE-2018-1000122.patch
  * Modified curl-disable_failing_tests.patch

-------------------------------------------------------------------
Fri Mar  9 16:24:36 UTC 2018 - pmonrealgonzalez@suse.com

- Security Fix [bsc#1084524, CVE-2018-1000121]
  * openldap: check ldap_get_attribute_ber() results for NULL
  * LDAP NULL pointer dereference
  * Added curl-7.37.0-CVE-2018-1000121.patch

-------------------------------------------------------------------
Fri Mar  9 16:23:46 UTC 2018 - pmonrealgonzalez@suse.com

- Security Fix [bsc#1084521, CVE-2018-1000120]
  * FTP: reject path components with control codes
  * FTP path trickery leads to NIL byte out of bounds write
  * Added curl-7.37.0-CVE-2018-1000120.patch

-------------------------------------------------------------------
Mon Mar  5 17:15:30 UTC 2018 - pmonrealgonzalez@suse.com

- Update to version 7.37.0 [fate#325339]
   * Dropped patches already fixed in 7.37.0
     - 0001-When-downloading-compressed-content-over-HTTP-and-th.patch
     - 0002-Jon-Nelson-found-a-regression-that-turned-out-to-be-.patch
     - 0003-Follow-up-fix-for-the-proxy-fix-I-did-for-Jon-Nelson.patch
     - 0004-Curl_input_negotiate-do-not-delegate-GSSAPI-credenti.patch
     - 0005-http_negociate-Be-consistent-in-gss_init_sec_context.patch
     - 0006-krb5-gssapi-Removed-a-memory-leak-in-krb5_auth.patch
     - 0007-Added-Curl_gss_init_sec_context.patch
     - 0008-gssapi.c-Simplified-the-function.patch
     - 0009-gssapi-rename-our-files-to-avoid-conflicts.patch
     - 0010-curl_gssapi-Guard-files-with-HAVE_GSSAPI.patch
     - 0011-Add-new-CURLOPT_GSSAPI_DELEGATION-option.patch
     - 0012-curl_gssapi-refine-the-handling-of-CURLOPT_GSSAPI_DE.patch
     - 0013-curl_gssapi-add-a-missing-include-of-sendf.h.patch
     - 0014-added-delegation.patch
     - 0015-docs-delegation.patch
     - 0016-OpenSSL-SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG-opti.patch
     - 0017-OpenSSL-don-t-disable-security-work-around.patch
     - 0018-CURLOPT_SSL_OPTIONS-added.patch
     - 0019-ssl-allow-beast-added.patch
     - 0020-nss-add-support-for-the-CURLSSLOPT_ALLOW_BEAST-optio.patch
     - 0021-HTTP-auth-fix-proxy-Negotiate-bug.patch
     - curl-CVE-2013-1944.patch
     - curl-tftp_large_file.patch
     - curl-CVE-2013-2174.patch
     - curl-CVE-2013-4545.patch
     - curl-CVE-2014-0015-NTLM_connection_reuse.patch
     - curl-fix-test172timestamp.patch
     - curl-CVE-2014-0138.patch
     - curl-CVE-2014-0139.patch
     - curl-dont_fail_with--insecure.patch
     - curl-allow_multiple_removes_in_multi_handle.patch
     - 0001-CURLOPT_PROXYHEADER-set-headers-for-proxy-only.patch
     - 0001-CURLOPT_HEADEROPT-added.patch
     - curl-tool-proxyheader.patch
     - 0001-PROXYHEADER-send-these-headers-in-normal-proxy-reque.patch
     - curl-chunked-encoding-with-content-length.patch
     - curl-check_ctrl_connection_on_transfer.patch
     - curl-enforce-tls12.patch
   * Refreshed patches:
     - dont-mess-with-rpmoptflags.diff
     - curl-CVE-2014-3613.patch
     - curl-CVE-2014-8150.patch
     - curl-CVE-2014-3707.patch
     - curl-CVE-2015-3143.patch
     - curl-CVE-2015-3148.patch
     - curl-CVE-2016-0755.patch
     - curl-CVE-2016-5419.patch
     - curl-CVE-2016-5420.patch
     - curl-CVE-2016-8615.patch
     - curl-CVE-2016-8617.patch
     - curl-CVE-2016-8618.patch
     - curl-CVE-2016-8621.patch
     - curl-CVE-2016-8623.patch
     - curl-CVE-2016-8624.patch
     - curl-CVE-2016-8619.patch
     - curl-CVE-2016-8616.patch
     - curl-CVE-2016-7167.patch
     - 0001-test46-update-cookie-expire-time.patch
   * Renamed and refreshed patches:
     - curl-7.19-CVE-2016-9586.patch to curl-7.37-CVE-2016-9586.patch
     - curl-7.19-CVE-2017-7407.patch to curl-7.37-CVE-2017-7407.patch
     - curl-7.37.0-CVE-2017-1000100.patch to curl-7.37.0-CVE-2017-1000100.patch
     - curl-7.19.7-CVE-2017-1000254.patch to curl-7.37-CVE-2017-1000254.patch
     - curl-7.19.7-CVE-2018-1000007.patch to curl-7.37.0-CVE-2018-1000007.patch
     - 0001-CURLOPT_HEADEROPT-default-to-separate.patch to
       curl-CVE-2015-3153.patch
   * New patches:
     - libcurl-ocloexec.patch
     - curl-secure-getenv.patch
     - curl-DEFAULT_CIPHER_SELECTION.patch
     - curl-CVE-2014-3620.patch
     - curl-allow_md4_and_md5_in_fips_mode.patch
     - curl-CVE-2015-3144.patch
     - curl-CVE-2015-3145.patch
     - curl-disable_failing_tests.patch
     - fix-return-status-in-Curl_is_connected.patch
     - 0001-Fix-invalid-Network-is-unreachable-errors.patch
     - curl-CVE-2016-5421.patch
     - curl-bsc991746.patch
     - curl-CVE-2016-8620.patch
     - curl-CVE-2016-8622.patch
     - curl-DEFAULT_SUSE_SELECTION.patch
     - curl-CVE-2017-1000101.patch
     - curl-7.37.0-connect-ftps-via-proxy.patch
     - curl-CVE-2017-1000257.patch
     - curl-7.37.0-CVE-2017-8816.patch
     - curl-7.37.0-CVE-2017-8817.patch

-------------------------------------------------------------------
Mon Jan 22 14:10:37 UTC 2018 - pmonrealgonzalez@suse.com

- Security fix [bsc#1077001, CVE-2018-1000007]
  * HTTP authentication leak in redirects
  * Added patch curl-7.19.7-CVE-2018-1000007.patch

-------------------------------------------------------------------
Fri Jan 12 15:56:40 UTC 2018 - pmonrealgonzalez@suse.com

- Set DEFAULT_SUSE as the default cipher list [bsc#1027712]
  * Added patch curl-DEFAULT_SUSE_SELECTION.patch

-------------------------------------------------------------------
Mon Oct  9 08:46:32 UTC 2017 - pmonrealgonzalez@suse.com

- Security fix [bsc#1061876, CVE-2017-1000254]
  * FTP PWD response parser out of bounds read
  * Added patch curl-7.19.7-CVE-2017-1000254.patch

-------------------------------------------------------------------
Tue Aug  1 14:35:02 UTC 2017 - pmonrealgonzalez@suse.com

- Project curl Security Advisory, August 9th 2017
  https://curl.haxx.se/docs/adv_20170809B.html
- Security fix [bsc#1051644, CVE-2017-1000100]
  * TFTP sends more than buffer size
  * Added patch curl-7.37.0-CVE-2017-1000100.patch

-------------------------------------------------------------------
Thu Apr  6 10:46:07 UTC 2017 - pmonrealgonzalez@suse.com

- Project curl Security Advisory, April 3, 2017
  https://curl.haxx.se/docs/adv_20170403.html
  * CVE-2017-7407: --write-out out of buffer read (bsc#1032309)
- Added patch:
  * curl-7.19-CVE-2017-7407.patch

-------------------------------------------------------------------
Mon Mar 20 18:55:15 UTC 2017 - pmonrealgonzalez@suse.com

- Project curl Security Advisory, December 21, 2016
  https://curl.haxx.se/docs/adv_20161221A.html
  * CVE-2016-9586: curl: libcurl printf floating point buffer
    overflow (bsc#1015332)
  * Added patch curl-7.19-CVE-2016-9586.patch      

-------------------------------------------------------------------
Tue Oct 25 10:56:33 UTC 2016 - vcizek@suse.com

- Project cURL Security Advisory, November 2, 2016
  https://curl.haxx.se/docs/adv_20161102K.html
  * CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
  * CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
  * CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
  * CVE-2016-8619: double-free in krb5 code (bsc#1005638)
  * CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
  * CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
  * CVE-2016-8616: case insensitive password comparison (bsc#1005634)
  * CVE-2016-8615: cookie injection for other servers (bsc#1005633)
  * CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
- added patches:
  * curl-CVE-2016-7167.patch
  * curl-CVE-2016-8615.patch
  * curl-CVE-2016-8616.patch
  * curl-CVE-2016-8617.patch
  * curl-CVE-2016-8618.patch
  * curl-CVE-2016-8619.patch
  * curl-CVE-2016-8620.patch
  * curl-CVE-2016-8621.patch
  * curl-CVE-2016-8622.patch
  * curl-CVE-2016-8623.patch
  * curl-CVE-2016-8624.patch

-------------------------------------------------------------------
Wed Sep  7 09:53:29 UTC 2016 - pjanouch@suse.de

- Update curl-CVE-2016-5420.patch to fix incorrect reuse of client
  certificates with NSS (bsc#997420 CVE-2016-7141 bsc#1015362)

-------------------------------------------------------------------
Thu Aug 18 15:10:47 UTC 2016 - meissner@suse.com

- relax requires from -openssl1 package to the first released
  curl package with alternatives support.

-------------------------------------------------------------------
Tue Aug  2 16:01:08 UTC 2016 - pjanouch@suse.de

- Add curl-CVE-2016-5419.patch (bsc#991389 CVE-2016-5419)
- Add curl-CVE-2016-5420.patch (bsc#991390 CVE-2016-5420)

-------------------------------------------------------------------
Tue Apr 26 15:07:57 UTC 2016 - meissner@suse.com

- curl-enforce-tls12.patch: allow enforcing tls 1.0, 1.1 or 1.2.
  also report TLSv1.x correctly during debugging. (bsc#977409)

-------------------------------------------------------------------
Sun Mar 13 17:37:28 UTC 2016 - meissner@suse.com

- build a curl enabled openssl1 binary, put in /usr/bin/curl.openssl1
- /usr/bin/curl renamed to /usr/bin/curl.openssl0
- use update-alternatives to switch between openssl0 and openssl1 
  variant.
- require libopenssl1_0_0 from libcurl4-openssl1
- FATE#320210 bsc#968726

-------------------------------------------------------------------
Thu Jan 21 13:16:29 UTC 2016 - vcizek@suse.com

- fix CVE-2016-0755 (bsc#962983)
  * libcurl NTLM credentials not-checked for proxy connection re-use
  * http://curl.haxx.se/docs/adv_20160127A.html
  * add curl-CVE-2016-0755.patch

-------------------------------------------------------------------
Thu Jan 21 10:33:12 UTC 2016 - vcizek@suse.com

- unexpire cookie in test 46 (bsc#962996)
  * add 0001-test46-update-cookie-expire-time.patch

-------------------------------------------------------------------
Thu Aug  6 07:52:27 UTC 2015 - vcizek@suse.com

- check for errors on the control connection during an FTP transfer
  (bsc#926511)
  * added curl-check_ctrl_connection_on_transfer.patch

-------------------------------------------------------------------
Wed May  6 09:03:54 UTC 2015 - vcizek@suse.com

- ignore Content-Length with chunk-encoded transfer (bnc#927174)
  * added curl-chunked-encoding-with-content-length.patch

-------------------------------------------------------------------
Mon Apr 20 11:36:51 UTC 2015 - vcizek@suse.com

- security update:
  * CVE-2015-3143 (bnc#927556)
    - Re-using authenticated connection when unauthenticated
  * CVE-2015-3148 (bnc#927746)
    - Negotiate not treated as connection-oriented
  * CVE-2015-3153 (bnc#928533)
    - sensitive HTTP server headers also sent to proxies
    - added new option CURLOPT_HEADEROPT
  * added patches:
    + curl-CVE-2015-3143.patch
    + curl-CVE-2015-3148.patch
    + 0001-CURLOPT_HEADEROPT-added.patch
    + 0001-CURLOPT_PROXYHEADER-set-headers-for-proxy-only.patch
    + 0001-PROXYHEADER-send-these-headers-in-normal-proxy-reque.patch
    + 0001-CURLOPT_HEADEROPT-default-to-separate.patch
    + curl-tool-proxyheader.patch
- fix baselibs.conf

-------------------------------------------------------------------
Thu Jan  8 09:48:31 UTC 2015 - vcizek@suse.com

- curl_multi_remove_handle: don't crash on multiple removes (bnc#897816)
  * added curl-allow_multiple_removes_in_multi_handle.patch

-------------------------------------------------------------------
Fri Jan  2 10:55:29 UTC 2015 - vcizek@suse.com

- fix for CVE-2014-8150 (bnc#911363)
  * request injection vulnerability
  * added curl-CVE-2014-8150.patch

- fix for CVE-2014-3707 (bnc#901924)
  * duphandle read out of bounds
  * added curl-CVE-2014-3707.patch

- add a default cipher list to avoid weak ciphers (bnc#885302)
  * curl-SUSE_default_cipherlist.patch

-------------------------------------------------------------------
Thu Oct 30 10:57:16 UTC 2014 - vcizek@suse.com

- fix for libcurl cookie leaks CVE-2014-3613 (bnc#894575)
  * added curl-CVE-2014-3613.patch

-------------------------------------------------------------------
Tue Apr 15 09:00:22 UTC 2014 - meissner@suse.com

- Enable ldaps support (as we already have ldap support enabled).

-------------------------------------------------------------------
Thu Apr 10 16:44:09 UTC 2014 - vcizek@suse.com

- don't fail on invalid certificates when called with --insecure
  * bnc#870444
  * added curl-dont_fail_with--insecure.patch

-------------------------------------------------------------------
Wed Apr  2 10:43:38 UTC 2014 - vcizek@suse.com

- fixes for two security vulnerabilities:
  * CVE-2014-138 (bnc#868627)
    - curl: wrong re-use of connections
    - added curl-CVE-2014-0138.patch
  * CVE-2014-139 (bnc#868629)
    - curl: IP address wildcard certificate validation
    - curl-CVE-2014-0139.patch

-------------------------------------------------------------------
Tue Apr  1 07:17:29 UTC 2014 - meissner@suse.com

- Build a libcurl4-openssl1 package against libopenssl1 for
  libssl.so.1 compatibility. 

  Build only the library package as "libcurl4-openssl1".

  bnc#861014 / bnc#864912 / FATE#316898

-------------------------------------------------------------------
Tue Feb  4 14:37:45 UTC 2014 - meissner@suse.com

- fixed timestamp of test172 to work after February 1st 2014.
  bnc#862144

-------------------------------------------------------------------
Tue Jan 14 12:33:28 UTC 2014 - vcizek@suse.com

- fix for CVE-2014-0015 (bnc#858673)
  * re-use of wrong HTTP NTLM connection in libcurl
  * added curl-CVE-2014-0015-NTLM_connection_reuse.patch

-------------------------------------------------------------------
Mon Dec  2 11:26:06 UTC 2013 - vcizek@suse.com

- fix CVE-2013-4545 (bnc#849596)
  = acknowledge VERIFYHOST without VERIFYPEER

-------------------------------------------------------------------
Thu Jun 13 10:06:23 UTC 2013 - vcizek@suse.com

- fix for CVE-2013-2174 (bnc#824517)

-------------------------------------------------------------------
Fri Apr 26 14:23:49 UTC 2013 - vcizek@suse.com

- wrap tftp sequence number, fixes large files transfer (bnc#810760)

-------------------------------------------------------------------
Fri Apr 12 11:01:51 UTC 2013 - vcizek@suse.com

- fixed CVE-2013-1944 (bnc#814655)

-------------------------------------------------------------------
Tue Nov 13 10:28:27 UTC 2012 - vcizek@suse.com

- if a proxy offers NTML and Negotiate authentication and libcurl
  is set to not use the Negotiate scheme then the request never
  returns when the proxy answers with HTTP 407
 (bnc#769247 or bnc#765342)

-------------------------------------------------------------------
Fri Apr  6 12:15:16 UTC 2012 - vcizek@suse.com

- backported option --ssl-allow-beast to allow not using previous
  workaround for a security flaw in the SSL3 and TLS1.0 protocols.
  It breaks some legacy apps (bnc#755908)

-------------------------------------------------------------------
Sun Jan 22 13:09:06 UTC 2012 - mmarek@suse.cz

- Disable SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG option when built
  against an older OpenSSL version (CVE-2010-4180).
- Don't enable SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS (bnc#742306,
  CVE-2011-3389).

-------------------------------------------------------------------
Wed Jan 18 13:49:56 CET 2012 - dmueller@suse.de

- use the rpmoptflags unconditionally, don't do own compiler flag
  magic. Fixes debuginfo package built

-------------------------------------------------------------------
Wed Oct 12 11:58:38 UTC 2011 - mmarek@suse.cz

- Added also the --delegation option to the curl tool
  (bnc#698796#c12).

-------------------------------------------------------------------
Thu Oct  6 12:30:49 UTC 2011 - mmarek@suse.cz

- Add CURLOPT_GSSAPI_DELEGATION libcurl option (bnc#698796#c12)
  plus a couple of minor fixes and cleanups.

-------------------------------------------------------------------
Fri Jul  1 10:11:26 UTC 2011 - mmarek@novell.com

- Curl_input_negotiate: do not delegate GSSAPI credentials
  (bnc#698796, CVE-2011-2192).

-------------------------------------------------------------------
Fri May  6 12:50:32 UTC 2011 - mmarek@novell.com

- Update to 7.19.7 (fate#310283)
  + many bugfixes
  + "Pragma: no-cache" no longer sent by default
  + CONNECT uses HTTP 1.1 by default
- Backported a fix for a regression in handling of
  '[protocol]_proxy' environment variables.

-------------------------------------------------------------------
Fri Aug 27 15:30:33 CEST 2010 - mmarek@suse.cz

- Set SSL_OP_NO_TICKET OpenSSL option (bnc#620857).
- Backport support for selecting ftp port range (bnc#628337).
- Fix build with newer autotools.

-------------------------------------------------------------------
Thu Mar 11 10:50:57 CET 2010 - mmarek@suse.cz

- Fixed libcurl data callback excessive length (bnc#569614,
  http://curl.haxx.se/docs/adv_20100209.html).

-------------------------------------------------------------------
Thu Aug  6 17:13:50 CEST 2009 - mmarek@suse.cz

- fixed verification of certificates with embeded NUL characters
  (CVE-2009-2417, bnc#527990).

-------------------------------------------------------------------
Fri Jun 19 14:22:17 CEST 2009 - mmarek@suse.cz

- curl-7.19.0-proxy-ftp-passwd.patch: fix ftp with user+password
  over proxy (bnc#486998).

-------------------------------------------------------------------
Tue Feb 17 11:37:29 CET 2009 - mmarek@suse.cz

- don't follow redirects to file:// by default; add new
  curl_easy_setopt options CURLOPT_PROTOCOLS and
  CURLOPT_REDIR_PROTOCOLS to specify which protocols are allowed
  and which protocols are allowed to redirect to (bnc#475103,
  CVE-2009-0037)

-------------------------------------------------------------------
Wed Dec 10 12:34:56 CET 2008 - olh@suse.de

- use Obsoletes: -XXbit only for ppc64 to help solver during distupgrade
  (bnc#437293)

-------------------------------------------------------------------
Thu Oct 30 12:34:56 CET 2008 - olh@suse.de

- obsolete old -XXbit packages (bnc#437293)

-------------------------------------------------------------------
Mon Sep 15 11:26:06 CEST 2008 - mmarek@suse.cz

- only buildrequire stunnel when built --with stunnel

-------------------------------------------------------------------
Thu Sep 11 09:20:08 CEST 2008 - mmarek@suse.cz

- test 279 no longer fails with runtests.pl -b <num>

-------------------------------------------------------------------
Tue Sep  2 14:23:51 CEST 2008 - mmarek@suse.cz

- updated to 7.19.0
  * curl_off_t gets its size/typedef somewhat differently than
    before. This _may_ cause an ABI change for you. See
    /usr/share/doc/packages/curl/README.curl_off_t for a full
    explanation. (Should not affect our package as it has LFS
    enabled)
  * Added CURLINFO_PRIMARY_IP
  * Added CURLOPT_CRLFILE and CURLE_SSL_CRL_BADFILE
  * Added CURLOPT_ISSUERCERT and CURLE_SSL_ISSUER_ERROR
  * curl's option parser for boolean options reworked
  * Added --remote-name-all
  * Added CURLINFO_APPCONNECT_TIME
  * Added test selection by key word in runtests.pl
  * the curl tool's -w option support the %{ssl_verify_result}
    variable
  * Added CURLOPT_ADDRESS_SCOPE and scope parsing of the URL
    according to RFC4007
  * Support --append on SFTP uploads (not with OpenSSH, though)
  * Added curlbuild.h and curlrules.h to the external library
    interface
  * lots of bugfixes

-------------------------------------------------------------------
Wed Jun  4 18:05:43 CEST 2008 - mmarek@suse.cz

- updated to 7.18.2
  * CURLFORM_STREAM was added
  * CURLOPT_NOBODY is now supported over SFTP
  * curl can now run on Symbian OS
  * curl -w redirect_url and CURLINFO_REDIRECT_URL
  * added curl_easy_send() and curl_easy_recv()
  * some bugfixes

-------------------------------------------------------------------
Sat May 17 19:22:10 CEST 2008 - coolo@suse.de

- fix renaming of xxbit packages

-------------------------------------------------------------------
Mon Apr 28 11:30:24 CEST 2008 - mmarek@suse.cz

- disable c-ares support again until bnc#381709 is fixed
- build with libssh2 support in the devel:libraries:c_c++ project

-------------------------------------------------------------------
Fri Apr 11 14:22:20 CEST 2008 - mmarek@suse.cz

- build with c-ares support
- fixed build for older dists

-------------------------------------------------------------------
Thu Apr 10 12:54:45 CEST 2008 - ro@suse.de

- added baselibs.conf file to build xxbit packages
  for multilib support

-------------------------------------------------------------------
Wed Apr  2 13:53:43 CEST 2008 - mmarek@suse.de

- obsolete curl-ca-bundle by the library package

-------------------------------------------------------------------
Mon Mar 31 10:16:30 CEST 2008 - mmarek@suse.cz

- updated to 7.18.1
  * minor fixes since last update

-------------------------------------------------------------------
Fri Mar 21 17:42:35 CET 2008 - mmarek@suse.cz

- updated to cvs snapshot 20080321
  * added support for HttpOnly cookies
  * we no longer distribute or install a ca cert bundle
  * SSLv2 is now disabled by default for SSL operations
  * the test509-style setting URL in callback is officially no
    longer supported
  * support a full chain of certificates in a given PKCS12
    certificate
  * resumed transfers work with SFTP
  * added type checking macros for curl_easy_setopt() and
    curl_easy_getinfo(), watch out for new warnings in code using
    libcurl (needs gcc-4.3 and currently only works in C mode)
  * curl_easy_setopt(), curl_easy_getinfo(), curl_share_setopt()
    and curl_multi_setopt() uses are now checked to use exactly
    three arguments


-------------------------------------------------------------------
Mon Mar 10 11:03:56 CET 2008 - mmarek@suse.cz

- clean up curl-config --libs output, thanks to Cristian Rodríguez
  for pointing it out

-------------------------------------------------------------------
Fri Mar  7 11:03:25 CET 2008 - mmarek@suse.cz

- build with gssapi support (thanks to Michael Calmer)

-------------------------------------------------------------------
Mon Feb 18 15:00:12 CET 2008 - mmarek@suse.cz

- removed Requires: openssl-certs - doesn't exist on older dists
  and is required by libopenssl otherwise
- allow to build the package even if the testsuite fails

-------------------------------------------------------------------
Fri Feb  8 10:21:10 CET 2008 - mmarek@suse.cz

- use /etc/ssl/certs instead of own curl-ca-bundle.crt
  * more up-to-date ca cert collection (bnc#334690)
  * allows for easier updates of ca certs

-------------------------------------------------------------------
Tue Jan 29 10:01:27 CET 2008 - mmarek@suse.cz

- updated to 7.18.0
  * --data-urlencode
  * CURLOPT_PROXY_TRANSFER_MODE
  * --no-keepalive - now curl does connections with keep-alive
    enabled by default
  * --socks4a added (proxy type CURLPROXY_SOCKS4A for libcurl)
  * --socks5-hostname added (CURLPROXY_SOCKS5_HOSTNAME for libcurl)
  * curl_easy_pause()
  * CURLOPT_SEEKFUNCTION and CURLOPT_SEEKDATA
  * --keepalive-time
  * curl --help output was re-ordered
  * bugfixes
- fixed test553 to work with different port number

-------------------------------------------------------------------
Thu Jan 10 16:21:34 CET 2008 - mmarek@suse.cz

- only print -lcurl in curl-config to reduce dependencies

-------------------------------------------------------------------
Tue Dec 11 17:59:57 CET 2007 - mmarek@suse.cz

- backported the CURLOPT_PROXY_TRANSFER_MODE patch [#306272#c26]

-------------------------------------------------------------------
Fri Nov 16 12:06:39 CET 2007 - mmarek@suse.cz

- fixed the testsuite on hosts that have no IPv6 support [#341994]
  curl-testsuite-safely-skip-http-ipv6.patch
  curl-testsuite-remember-broken-servers.patch
- added stunnel to BuildRequires to enable SSL tests

-------------------------------------------------------------------
Tue Oct 30 09:14:04 CET 2007 - mmarek@suse.cz

- updated to 7.17.1
  * automatically append ";type=<a|i>" when using HTTP proxies for
    FTP urls [#306272]
  * improved NSS support
  * added --proxy-negotiate
  * added --post301 and CURLOPT_POST301
  * builds with c-ares 1.5.0
  * added CURLOPT_SSH_HOST_PUBLIC_KEY_MD5 and --hostpubmd5
  * renamed CURLE_SSL_PEER_CERTIFICATE to
    CURLE_PEER_FAILED_VERIFICATION
  * added CURLOPT_OPENSOCKETFUNCTION and CURLOPT_OPENSOCKETDATA
  * CULROPT_COOKIELIST supports "FLUSH"
  * added CURLOPT_COPYPOSTFIELDS
  * added --static-libs to curl-config
  * many bugfixes, inc. fix for bug #332917

-------------------------------------------------------------------
Thu Oct 11 16:19:56 CEST 2007 - mszeredi@suse.de

- Add missing dependency (openldap2-devel) for libcurl-devel

-------------------------------------------------------------------
Mon Oct  8 17:28:01 CEST 2007 - mmarek@suse.cz

- updated to 7.17.0
  * curl_easy_setopt() now allocates strings passed to it
  * LDAP libraries are now linked "regularly" and not with dlopen
    (the strict-aliasing patch can go away)
  * HTTP transfers have the download size info "available" earlier
  * FTP transfers have the download size info "available" earlier
  * several error codes and options were marked as obsolete and
    subject to future removal (set CURL_NO_OLDIES to see if your
    application is using them)
  * some bugfixes (see /usr/share/doc/packages/curl/RELEASE-NOTES)
- added fixes for some post-7.17 bugs
- removed some less useful %%doc files

-------------------------------------------------------------------
Fri Sep 14 09:20:35 CEST 2007 - mmarek@suse.cz

- set transfer mode (binary/ascii) when retrieving ftp:// urls via
  an http proxy (curl-ftp-httpproxy.patch) [#306272]

-------------------------------------------------------------------
Wed Aug 29 12:25:59 CEST 2007 - mmarek@suse.cz

- s/openssl-devel/libopenssl-devel/ [#305815]

-------------------------------------------------------------------
Fri Aug  3 13:53:05 CEST 2007 - mmarek@suse.cz

- updated to 7.16.4
  * added CURLOPT_NEW_FILE_PERMS and CURLOPT_NEW_DIRECTORY_PERMS
  * improved hashing of sockets for the multi_socket API
  * ftp kerberos5 support added
  * some bugfixes (see /usr/share/doc/packages/curl/RELEASE-NOTES)
- fixed libcurl-devel Provides: [#293401]


-------------------------------------------------------------------
Mon Jul  9 10:35:48 CEST 2007 - mmarek@suse.cz

- updated to 7.16.3
  * many bugfixes
  * support for running multiple testsuites in paralell
- removed lfs patch leftover

-------------------------------------------------------------------
Mon Jun  4 10:16:40 CEST 2007 - mmarek@suse.cz

- install libcurl.m4 [#275462]

-------------------------------------------------------------------
Fri Jun  1 11:57:28 CEST 2007 - dmueller@suse.de

- fix obsoletes for alpha3 update
- fix ldconfig call

-------------------------------------------------------------------
Wed May 23 16:22:39 CEST 2007 - bk@suse.de

- updated to 7.16.2 (lots of fixes, fixes a segfault in git-http) 

-------------------------------------------------------------------
Fri May  4 14:55:41 CEST 2007 - mmarek@suse.cz

- also avoid non-versioned obsoletes

-------------------------------------------------------------------
Mon Apr 16 10:49:55 CEST 2007 - mmarek@suse.de

- avoid non-versioned provides
- removed old curl_ssl provides/obsoletes from 7.1 times

-------------------------------------------------------------------
Mon Apr  2 17:38:04 CEST 2007 - rguenther@suse.de

- split off libcurl4 and curl-ca-bundle packages, rename curl-devel
  to libcurl-devel

-------------------------------------------------------------------
Sat Mar 31 18:53:00 CEST 2007 - rguenther@suse.de

- add zlib-devel BuildRequires

-------------------------------------------------------------------
Fri Feb 16 16:07:34 CET 2007 - mmarek@suse.cz

- better patch for #246179

-------------------------------------------------------------------
Fri Feb 16 14:04:38 CET 2007 - mmarek@suse.cz

- fix CURLOPT_RANGE reset for ftp transfers
  [#246179] (ftp_range.patch)
- updated to 7.16.1 (other bugfixes)

-------------------------------------------------------------------
Fri Jan 26 09:55:19 CET 2007 - mmarek@suse.cz

- remove libcurl.a and libcurl.la (rationale: there are security
  updates of curl from time to time, so statically linking it is
  not acceptable)

-------------------------------------------------------------------
Thu Jan 25 15:36:29 CET 2007 - mmarek@suse.cz

- fixed strict aliasing warnings

-------------------------------------------------------------------
Tue Dec 19 14:59:34 CET 2006 - mmarek@suse.cz

- updated to 7.16.0
  * removed CURLOPT_SOURCE_* options and --3p* command line option
    (breaks python-curl atm)
  * for a complete list of changes, see
    /usr/share/doc/packages/curl/RELEASE-NOTES

-------------------------------------------------------------------
Tue Aug 15 11:23:58 CEST 2006 - mmarek@suse.cz

- configure with --enable-hidden-symbols to compile libcurl with
  -fvisibility=hidden, exporting only symbols from the API

-------------------------------------------------------------------
Tue Aug 15 10:41:28 CEST 2006 - mmarek@suse.cz

- updated to version 7.15.5
  * added --ftp-ssl-reqd
  * modified the prototype for the socket callback set with
    CURLMOPT_SOCKETFUNCTION
  * added curl_multi_assign()
  * added CURLOPT_FTP_ALTERNATIVE_TO_USER and --ftp-alternative-to-user
  * added a vcproj file for building libcurl
  * added curl_formget()
  * added CURLOPT_MAX_SEND_SPEED_LARGE and CURLOPT_MAX_RECV_SPEED_LARGE
  * Made -K on a file that couldn't be read cause a warning to be displayed
  * some bugfixes
- dropped epsv-firewall.patch which was intergrated in 7.15.2

-------------------------------------------------------------------
Sat Jul  1 21:28:06 CEST 2006 - cthiel@suse.de

- update to version 7.15.4, changes & fixes for this version:
  * NTLM2 session response support
  * CURLOPT_COOKIELIST set to "SESS" clears all session cookies
  * CURLINFO_LASTSOCKET returned sockets are now checked more before
    returned
  * curl-config got a --checkfor option to compare version numbers
  * line end conversions for FTP ASCII transfers
  * curl_multi_socket() API added (still mostly untested)
  * conversion callback options for EBCDIC <=> ASCII conversions
  * added CURLINFO_FTP_ENTRY_PATH
  * less blocking for the multi interface during (Open)SSL connect
    negotiation
  * builds fine on cygwin
  * md5-sess with Digest authentication
  * dict with letters such as space in a word
  * dict with url-encoded words in the URL
  * libcurl.m4 when default=yes but no libcurl was found
  * numerous bugs fixed in the TFTP code
  * possible memory leak when adding easy handles to multi stack
  * TFTP works in a more portable fashion (== on more platforms)
  * WSAGetLastError() is now used (better) on Windows
  * GnuTLS non-block case that could cause data trashing
  * deflate code survives lack of zlib header
  * CURLOPT_INTERFACE works with hostname
  * configure runs fine with ICC
  * closed control connection with FTP when easy handle was removed from
    multi
  * curl --trace crash when built with VS2005
  * SSL connect time-out
  * improved NTLM functionality
  * following redirects with more than one question mark in source URL
  * fixed debug build crash with -d
  * generates a fine AIX Toolbox RPM spec
  * treat FTP AUTH failures properly
  * TFTP transfers could trash data
  * -d + -G combo crash

-------------------------------------------------------------------
Wed Jun 14 17:36:10 CEST 2006 - mmarek@suse.cz

- fixed syntax error in configure

-------------------------------------------------------------------
Sun May 28 16:16:33 CEST 2006 - cthiel@suse.de

- update to version 7.15.3, changes & fixes for this version:
  * added docs for --ftp-method and CURLOPT_FTP_FILEMETHOD 
  * TFTP Packet Buffer Overflow Vulnerability (CVE-2006-1061)
  * properly detecting problems with sending the FTP command USER
  * wrong error message shown when certificate verification failed
  * multi-part formpost with multi interface crash
  * the CURLFTPSSL_CONTROL setting for CURLOPT_FTP_SSL is acknowledged
  * "SSL: couldn't set callback" is now treated as a less serious problem
  * Interix build fix
  * fixed curl "hang" when out of file handles at start
  * prevent FTP uploads to URLs with trailing slash 

- changes & fixes in 7.15.2
  * Support for SOCKS4 proxies (added --socks4)
  * CURLOPT_CONNECT_ONLY and CURLINFO_LASTSOCKET added
  * CURLOPT_LOCALPORT and CURLOPT_LOCALPORTRANGE (--local-port) added
  * Dropped support for the LPRT ftp command
  * Gopher is now officially abandoned as a protocol (lib)curl tries to
    support
  * curl_global_init() and curl_global_cleanup() are now using a refcount so
    that it is now legal to call them multiple times. See updated info for
    details
  * two bugs concerning using curl_multi_remove_handle() before the transfer
    was complete
  * multi-pass authentication and compressed content
  * minor format string mistake in the GSS/Negotiate code
  * cached DNS entries could remain in the cache too long
  * improved GnuTLS check in configure
  * re-used FTP connections when the second request didn't do a transfer
  * plain --limit-rate [num] means bytes
  * re-creating a dead connection is no longer counted internally as a
    followed redirect and thus prevents a weird error that would occur if a
    FTP connection died on an attempted re-use
  * Try PASV after failing to connect to the port the EPSV response
    contained
  * -P [IP] with non-local address with ipv6-enabled curl
  * -P [hostname] with ipv6-disabled curl
  * libcurl.m4 was updated
  * configure no longer warns if the current path contains a space
  * test suite kill race condition
  * FTP_SKIP_PASV_IP and FTP_USE_EPSV when doing FTP over HTTP proxy
  * Doing a second request with FTP on the same bath path, would make
    libcurl confuse what current working directory it had
  * FTP over HTTP proxy now sends the second CONNECT properly
  * numerous compiler warnings and build quirks for various compilers have
    been addressed
  * supports name and passwords up to 255 bytes long, embedded in URLs
  * the HTTP_ONLY define disables the TFTP support

- removed curl-7.15.1-CVE-2006-1061.patch, included upstream
- removed curl-7.15.1-aliasing.patch

-------------------------------------------------------------------
Tue Mar 14 12:35:53 CET 2006 - mmarek@suse.cz

- fix buffer overflow in TFTP code
  [#157874] (CVE-2006-1061.patch)

-------------------------------------------------------------------
Wed Feb 15 02:53:15 CET 2006 - ro@suse.de

- added libidn-devel to requires of devel package 

-------------------------------------------------------------------
Mon Feb 13 16:32:40 CET 2006 - mmarek@suse.cz

- build with libidn support
  [#150313]

-------------------------------------------------------------------
Fri Jan 27 01:07:37 CET 2006 - mls@suse.de

- converted neededforbuild to BuildRequires

-------------------------------------------------------------------
Mon Jan 23 17:20:59 CET 2006 - mmarek@suse.cz

- fallback to PASV if some firewall doesn't let an EPSV connection
  trough

-------------------------------------------------------------------
Thu Jan 12 15:45:18 CET 2006 - mmarek@suse.cz

- build with -fstack-protector
- add dependency on curl = %%{version} to curl-devel

-------------------------------------------------------------------
Tue Jan 10 15:24:29 CET 2006 - mmarek@suse.cz

- remove non-existent path /usr/ssl, which caused -L/usr/ssl/lib to
  appeared in curl-config output
- use make -j

-------------------------------------------------------------------
Tue Dec 13 13:23:13 CET 2005 - mmarek@suse.cz

- updated to 7.15.1, fixing previous vulnerabilities

-------------------------------------------------------------------
Thu Oct 13 16:00:00 CEST 2005 - mmarek@suse.cz

- fix stack buffer overflow in lib/http_ntlm.c [#128065]

-------------------------------------------------------------------
Mon Oct 10 14:20:12 CEST 2005 - mmarek@suse.cz

- updated to 7.14.1
- updated curl-7.14.1-aliasing.patch

-------------------------------------------------------------------
Mon Jun 20 16:38:34 CEST 2005 - anicka@suse.cz

- update to 7.14.0
- remove obsolete patch curl-ntlm.patch 

-------------------------------------------------------------------
Tue Apr 12 16:37:59 CEST 2005 - tcrhak@suse.cz

- packaged curl-ca-bundle.crt (bug #64301)

-------------------------------------------------------------------
Thu Feb 24 10:07:13 CET 2005 - meissner@suse.de

- enable make test. fixed test 241 to use ::1 directly.

-------------------------------------------------------------------
Tue Feb 22 10:46:21 CET 2005 - mcihar@suse.cz

- fix buffer overflow in NTLM (bug #65752)

-------------------------------------------------------------------
Tue Feb  8 18:36:38 CET 2005 - mcihar@suse.cz

- update to 7.13.0

-------------------------------------------------------------------
Wed Aug 11 11:31:07 CEST 2004 - tcrhak@suse.cz

- update to 7.12.0

-------------------------------------------------------------------
Wed Apr 28 19:57:41 CEST 2004 - tcrhak@suse.cz

- strict aliasing fix

-------------------------------------------------------------------
Tue Mar 16 17:31:01 CET 2004 - tcrhak@suse.cz

- fix for lfs for in transfer.c (bug #36040)

-------------------------------------------------------------------
Wed Feb 25 19:29:05 CET 2004 - tcrhak@suse.cz

- ignore leading slashes of url-path in URLs like
  ftp://user@name//url-path, i.e don't change to the
  root directory (RFC 1738, bug #34471)

-------------------------------------------------------------------
Tue Feb 10 17:39:28 CET 2004 - tcrhak@suse.cz

- update to version 7.11.0

-------------------------------------------------------------------
Sat Jan 10 16:13:21 CET 2004 - adrian@suse.de

- add %defattr and %run_ldconfig

-------------------------------------------------------------------
Wed Nov 05 16:20:21 CET 2003 - tcrhak@suse.cz

- added large file support, patch lfs [bug #32411]

-------------------------------------------------------------------
Thu Sep 04 17:48:46 CEST 2003 - tcrhak@suse.cz

- require zlib-devel, openssl-devel and glibc-devel in curl-devel [bug #29881]

-------------------------------------------------------------------
Fri Aug 08 09:39:30 CEST 2003 - tcrhak@suse.cz

- terminate array of directory components by NULL (bug #28351, patch dirs)

-------------------------------------------------------------------
Wed Jul 23 19:36:56 CEST 2003 - tcrhak@suse.cz

- update to version 7.10.5

-------------------------------------------------------------------
Tue Jun  3 01:24:42 CEST 2003 - ro@suse.de

- remove unpackaged files from buildroot

-------------------------------------------------------------------
Wed Nov 27 17:27:13 CET 2002 - tcrhak@suse.cz

- update to version 7.10.2
- moved curl-config.1.gz to the devel subpackage [bug #21966]

-------------------------------------------------------------------
Sat Jul 13 17:25:58 CEST 2002 - tcrhak@suse.cz

- update to version 7.9.8
- added automake

-------------------------------------------------------------------
Fri Jan 18 17:45:31 CET 2002 - tcrhak@suse.cz

- used macros %{_lib} and %{_libdir}
- update to 7.9.2

-------------------------------------------------------------------
Fri Oct 19 08:38:40 CEST 2001 - ro@suse.de

- do not pack shared library into both, main and devel package 

-------------------------------------------------------------------
Mon Oct  8 11:35:52 CEST 2001 - tcrhak@suse.cz

- update to version 7.9

-------------------------------------------------------------------
Fri Sep 21 11:46:09 CEST 2001 - adostal@suse.cz

- fix manual in man.patch 

-------------------------------------------------------------------
Tue Aug 21 16:10:10 CEST 2001 - adostal@suse.cz

- update to version 7.8.1 

-------------------------------------------------------------------
Wed Jul 18 10:21:13 CEST 2001 - adostal@suse.cz

- files devel fixed 

-------------------------------------------------------------------
Mon Jul  2 17:51:34 CEST 2001 - adostal@suse.cz

- update to version 7.8  

-------------------------------------------------------------------
Wed Jun 13 17:33:41 CEST 2001 - ro@suse.de

- fixed to compile with new autoconf 

-------------------------------------------------------------------
Mon Apr  9 14:39:03 CEST 2001 - cihlar@suse.cz

- update to version 7.7.1

-------------------------------------------------------------------
Tue Mar  6 10:03:05 CET 2001 - cihlar@suse.cz

- update to version 7.6.1

-------------------------------------------------------------------
Wed Jan  3 09:13:15 CET 2001 - cihlar@suse.cz

- fixed Provides and Obsoletes also for curl-devel

-------------------------------------------------------------------
Tue Dec 19 07:16:38 CET 2000 - cihlar@suse.cz

- fixed name
- added Obsoletes: curl_ssl

-------------------------------------------------------------------
Mon Dec 18 15:13:25 CET 2000 - cihlar@suse.cz

- changed to ssl support

-------------------------------------------------------------------
Thu Nov 16 14:25:18 CET 2000 - cihlar@suse.cz

- renamed curldev -> curl-devel
- update to version 7.4.2

-------------------------------------------------------------------
Tue Oct 17 09:16:16 CEST 2000 - cihlar@suse.cz

- update to version 7.4.1 - security bug fixed

-------------------------------------------------------------------
Wed Aug 30 09:34:32 CEST 2000 - cihlar@suse.cz

- package created

