Hello community,

here is the log from the commit of package curl for openSUSE:Factory checked in 
at 2012-11-22 16:11:56
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/curl (Old)
 and      /work/SRC/openSUSE:Factory/.curl.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "curl", Maintainer is "[email protected]"

Changes:
--------
--- /work/SRC/openSUSE:Factory/curl/curl.changes        2012-11-10 
16:55:42.000000000 +0100
+++ /work/SRC/openSUSE:Factory/.curl.new/curl.changes   2012-11-22 
16:11:59.000000000 +0100
@@ -1,0 +2,12 @@
+Tue Nov 20 23:43:24 UTC 2012 - [email protected]
+
+- Curl 7.28.1
+* FTP: prevent the multi interface from blocking Obsoletes
+  curl-ftp-prevent-the-multi-interface-from-blocking.patch
+* don't send '#' fragments when using proxy
+* OpenSSL: Disable SSL/TLS compression - avoid the "CRIME" attack
+* TFTP: handle resend
+* memory leak: CURLOPT_RESOLVE with multi interface
+* SSL: Several SSL-backend related fixes 
+
+-------------------------------------------------------------------

Old:
----
  curl-7.27.0.tar.lzma
  curl-7.27.0.tar.lzma.asc
  curl-ftp-prevent-the-multi-interface-from-blocking.patch

New:
----
  curl-7.28.1.tar.lzma
  curl-7.28.1.tar.lzma.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ curl.spec ++++++
--- /var/tmp/diff_new_pack.jc8md2/_old  2012-11-22 16:12:01.000000000 +0100
+++ /var/tmp/diff_new_pack.jc8md2/_new  2012-11-22 16:12:01.000000000 +0100
@@ -21,7 +21,7 @@
 %bcond_without testsuite
 
 Name:           curl
-Version:        7.27.0
+Version:        7.28.1
 Release:        0
 Summary:        A Tool for Transferring Data from URLs
 License:        BSD-3-Clause and MIT
@@ -32,8 +32,6 @@
 Source3:        baselibs.conf
 Patch:          libcurl-ocloexec.patch
 Patch1:         dont-mess-with-rpmoptflags.diff
-# PATCH-FIX-UPSTREAM curl-ftp-prevent-the-multi-interface-from-blocking.patch 
sf#3579064 [email protected] -- Prevent the multi interface from blocking when 
using ftp and the remote end responds very slowly (backported from upstream git)
-Patch2:         curl-ftp-prevent-the-multi-interface-from-blocking.patch
 BuildRequires:  libidn-devel
 BuildRequires:  libtool
 BuildRequires:  lzma
@@ -47,7 +45,6 @@
 BuildRequires:  mozilla-nss-devel
 %endif
 BuildRequires:  krb5-devel
-BuildRequires:  libcares-devel
 BuildRequires:  libssh2-devel
 BuildRequires:  openssh
 %if 0%{?_with_stunnel:1}
@@ -93,7 +90,6 @@
 %setup -q
 %patch
 %patch1
-%patch2 -p1
 
 %build
 autoreconf -fi

++++++ libcurl-ocloexec.patch ++++++
--- /var/tmp/diff_new_pack.jc8md2/_old  2012-11-22 16:12:01.000000000 +0100
+++ /var/tmp/diff_new_pack.jc8md2/_new  2012-11-22 16:12:01.000000000 +0100
@@ -38,33 +38,15 @@
    file->path = real_path;
  #endif
    file->freepath = real_path; /* free this when done */
-@@ -336,7 +336,7 @@ static CURLcode file_upload(struct conne
-      return CURLE_FILE_COULDNT_READ_FILE; /* fix: better error code */
- 
-   if(data->state.resume_from)
--    fp = fopen( file->path, "ab" );
-+    fp = fopen( file->path, "abe" );
-   else {
-     int fd;
- 
-@@ -344,7 +344,7 @@ static CURLcode file_upload(struct conne
-     fd = open(file->path, O_WRONLY|O_CREAT|O_TRUNC|O_BINARY,
-               conn->data->set.new_file_perms);
- #else
--    fd = open(file->path, O_WRONLY|O_CREAT|O_TRUNC,
-+    fd = open(file->path, O_WRONLY|O_CREAT|O_TRUNC|O_CLOEXEC,
-               conn->data->set.new_file_perms);
- #endif
-     if(fd < 0) {
-@@ -352,7 +352,7 @@ static CURLcode file_upload(struct conne
-       return CURLE_WRITE_ERROR;
-     }
-     close(fd);
--    fp = fopen(file->path, "wb");
-+    fp = fopen(file->path, "wbe");
-   }
+@@ -347,7 +347,7 @@ static CURLcode file_upload(struct conne
+   else
+     mode = MODE_DEFAULT|O_TRUNC;
  
-   if(!fp) {
+-  fd = open(file->path, mode, conn->data->set.new_file_perms);
++  fd = open(file->path, mode | O_CLOEXEC, conn->data->set.new_file_perms);
+   if(fd < 0) {
+     failf(data, "Can't open %s for writing", file->path);
+     return CURLE_WRITE_ERROR;
 --- lib/formdata.c.orig
 +++ lib/formdata.c
 @@ -1207,7 +1207,7 @@ CURLcode Curl_getformdata(struct Session
@@ -101,7 +83,7 @@
    if(-1 == ipv6_works) {
      /* probe to see if we have a working IPv6 stack */
 -    curl_socket_t s = socket(PF_INET6, SOCK_DGRAM, 0);
-+    curl_socket_t s = socket(PF_INET6, SOCK_DGRAM | O_CLOEXEC, 0);
++    curl_socket_t s = socket(PF_INET6, SOCK_DGRAM | SOCK_CLOEXEC, 0);
      if(s == CURL_SOCKET_BAD)
        /* an ipv6 address was requested but we can't get/use one */
        ipv6_works = 0;
@@ -129,7 +111,7 @@
      char *tok_buf;
 --- lib/ssluse.c.orig
 +++ lib/ssluse.c
-@@ -435,7 +435,7 @@ int cert_stuff(struct connectdata *conn,
+@@ -437,7 +437,7 @@ int cert_stuff(struct connectdata *conn,
        STACK_OF(X509) *ca = NULL;
        int i;
  
@@ -138,7 +120,7 @@
        if(!f) {
          failf(data, "could not open PKCS12 file '%s'", cert_file);
          return 0;
-@@ -2338,7 +2338,7 @@ static CURLcode servercert(struct connec
+@@ -2274,7 +2274,7 @@ static CURLcode servercert(struct connec
  
      /* e.g. match issuer name with provided issuer certificate */
      if(data->set.str[STRING_SSL_ISSUERCERT]) {
@@ -149,7 +131,7 @@
            failf(data, "SSL: Unable to open issuer cert (%s)",
 --- lib/connect.c.orig
 +++ lib/connect.c
-@@ -1236,7 +1236,7 @@ CURLcode Curl_socket(struct connectdata
+@@ -1238,7 +1238,7 @@ CURLcode Curl_socket(struct connectdata
                                      (struct curl_sockaddr *)addr);
    else
      /* opensocket callback not set, so simply create the socket now */

-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to