A Tool for Transferring Data from URLs

Edit Package curl.28982

Curl is a client to get documents and files from or send documents to a
server using any of the supported protocols (HTTP, HTTPS, FTP, FTPS,
TFTP, DICT, TELNET, LDAP, or FILE). The command is designed to work
without user interaction or any kind of interactivity.

Refresh
Refresh
Source Files
Filename Size Changed
0001-Fix-invalid-Network-is-unreachable-errors.patch 0000001235 1.21 KB
baselibs.conf 0000000188 188 Bytes
curl-7.37-CVE-2016-9586.patch 0000002336 2.28 KB
curl-7.37-CVE-2017-1000254.patch 0000004869 4.75 KB
curl-7.37-CVE-2017-7407.patch 0000004074 3.98 KB
curl-7.37.0-CVE-2017-1000100.patch 0000000995 995 Bytes
curl-7.37.0-CVE-2017-8816.patch 0000001391 1.36 KB
curl-7.37.0-CVE-2017-8817.patch 0000003289 3.21 KB
curl-7.37.0-CVE-2018-1000007.patch 0000008319 8.12 KB
curl-7.37.0-CVE-2018-1000120.patch 0000010584 10.3 KB
curl-7.37.0-CVE-2018-1000121.patch 0000001370 1.34 KB
curl-7.37.0-CVE-2018-1000122.patch 0000001281 1.25 KB
curl-7.37.0-CVE-2018-14618.patch 0000001899 1.85 KB
curl-7.37.0-CVE-2018-16842.patch 0000000833 833 Bytes
curl-7.37.0-connect-ftps-via-proxy.patch 0000005100 4.98 KB
curl-7.37.0.tar.lzma 0002323713 2.22 MB
curl-7.37.0.tar.lzma.asc 0000000181 181 Bytes
curl-CVE-2014-3613.patch 0000010060 9.82 KB
curl-CVE-2014-3620.patch 0000001945 1.9 KB
curl-CVE-2014-3707.patch 0000013925 13.6 KB
curl-CVE-2014-8150.patch 0000001125 1.1 KB
curl-CVE-2015-3143.patch 0000001123 1.1 KB
curl-CVE-2015-3144.patch 0000001256 1.23 KB
curl-CVE-2015-3145.patch 0000002074 2.03 KB
curl-CVE-2015-3148.patch 0000002908 2.84 KB
curl-CVE-2015-3153.patch 0000002854 2.79 KB
curl-CVE-2016-0755.patch 0000004618 4.51 KB
curl-CVE-2016-5419.patch 0000002776 2.71 KB
curl-CVE-2016-5420.patch 0000002532 2.47 KB
curl-CVE-2016-5421.patch 0000000945 945 Bytes
curl-CVE-2016-7167.patch 0000001628 1.59 KB
curl-CVE-2016-8615.patch 0000001791 1.75 KB
curl-CVE-2016-8616.patch 0000002104 2.05 KB
curl-CVE-2016-8617.patch 0000000822 822 Bytes
curl-CVE-2016-8618.patch 0000001248 1.22 KB
curl-CVE-2016-8619.patch 0000001149 1.12 KB
curl-CVE-2016-8620.patch 0000004211 4.11 KB
curl-CVE-2016-8621.patch 0000003607 3.52 KB
curl-CVE-2016-8622.patch 0000002768 2.7 KB
curl-CVE-2016-8623.patch 0000005517 5.39 KB
curl-CVE-2016-8624.patch 0000002052 2 KB
curl-CVE-2017-1000101.patch 0000002670 2.61 KB
curl-CVE-2017-1000257.patch 0000000951 951 Bytes
curl-CVE-2018-1000301.patch 0000001500 1.46 KB
curl-CVE-2018-16839.patch 0000001172 1.14 KB
curl-CVE-2018-16840.patch 0000001088 1.06 KB
curl-CVE-2018-16890.patch 0000001200 1.17 KB
curl-CVE-2019-3822.patch 0000001145 1.12 KB
curl-CVE-2019-3823.patch 0000001743 1.7 KB
curl-CVE-2019-5436.patch 0000000827 827 Bytes
curl-CVE-2019-5482.patch 0000001848 1.8 KB
curl-CVE-2020-8177.patch 0000001658 1.62 KB
curl-CVE-2020-8231.patch 0000004745 4.63 KB
curl-CVE-2020-8284.patch 0000006735 6.58 KB
curl-CVE-2020-8285.patch 0000008316 8.12 KB
curl-CVE-2021-22876-URL-API.patch 0000053401 52.1 KB
curl-CVE-2021-22876.patch 0000004452 4.35 KB
curl-CVE-2021-22898.patch 0000001031 1.01 KB
curl-CVE-2021-22924.patch 0000001674 1.63 KB
curl-CVE-2021-22925.patch 0000001700 1.66 KB
curl-CVE-2021-22946.patch 0000009236 9.02 KB
curl-CVE-2021-22947.patch 0000009144 8.93 KB
curl-CVE-2022-22576.patch 0000003417 3.34 KB
curl-CVE-2022-27776-strcasecompare.patch 0000002432 2.38 KB
curl-CVE-2022-27776.patch 0000004362 4.26 KB
curl-CVE-2022-27781.patch 0000001385 1.35 KB
curl-CVE-2022-27782.patch 0000008722 8.52 KB
curl-CVE-2022-32208.patch 0000002419 2.36 KB
curl-CVE-2022-32221.patch 0000000803 803 Bytes
curl-CVE-2022-35252.patch 0000001943 1.9 KB
curl-CVE-2022-43552.patch 0000000679 679 Bytes
curl-CVE-2023-27533-no-sscanf.patch 0000007491 7.32 KB
curl-CVE-2023-27533.patch 0000001516 1.48 KB
curl-CVE-2023-27534-dynbuf.patch 0000018271 17.8 KB
curl-CVE-2023-27534.patch 0000004288 4.19 KB
curl-CVE-2023-27535.patch 0000007584 7.41 KB
curl-CVE-2023-27536.patch 0000001660 1.62 KB
curl-CVE-2023-27538.patch 0000001408 1.38 KB
curl-CVE-2023-28320.patch 0000002606 2.54 KB
curl-CVE-2023-28321.patch 0000009260 9.04 KB
curl-CVE-2023-28322.patch 0000012947 12.6 KB
curl-DEFAULT_CIPHER_SELECTION.patch 0000000613 613 Bytes
curl-DEFAULT_SUSE_SELECTION.patch 0000000510 510 Bytes
curl-HIGH-cipher-fallback.patch 0000001135 1.11 KB
curl-allow_md4_and_md5_in_fips_mode.patch 0000002515 2.46 KB
curl-bsc991746.patch 0000001020 1020 Bytes
curl-disable_failing_tests.patch 0000000422 422 Bytes
curl-openssl-skip-trace-outputs.patch 0000003565 3.48 KB
curl-secure-getenv.patch 0000001258 1.23 KB
curl.changes 0000066601 65 KB
curl.keyring 0000001455 1.42 KB
curl.spec 0000015300 14.9 KB
dont-mess-with-rpmoptflags.diff 0000000539 539 Bytes
fix-return-status-in-Curl_is_connected.patch 0000003610 3.53 KB
libcurl-ocloexec.patch 0000005697 5.56 KB
Latest Revision
Ruediger Oertel's avatar Ruediger Oertel (oertel) committed (revision 1)
Release from SUSE:Maintenance:28982 / curl.SUSE_SLE-12_Update
Comments 0
openSUSE Build Service is sponsored by