curl - A Tool for Transferring Data from URLs

Distribution: openSUSE 13.2
Repository: openSUSE Update all
Package name: curl
Package version: 7.42.1
Package release: 19.1
Package architecture: x86_64
Package type: rpm
Installed size: 327.71 KB
Download size: 154.38 KB
Official Mirror:
Curl is a client to get documents and files from or send documents to a server using any of the supported protocols (HTTP, HTTPS, FTP, FTPS, TFTP, DICT, TELNET, LDAP, or FILE). The command is designed to work without user interaction or any kind of interactivity.



  • curl = 7.42.1-19.1
  • curl(x86-64) = 7.42.1-19.1


    Source package: curl-7.42.1-19.1.src.rpm

    Install Howto

    Install curl rpm package:

    # zypper install curl


    • /usr/bin/curl
    • /usr/share/doc/packages/curl/BUGS
    • /usr/share/doc/packages/curl/FAQ
    • /usr/share/doc/packages/curl/FEATURES
    • /usr/share/doc/packages/curl/MANUAL
    • /usr/share/doc/packages/curl/README
    • /usr/share/doc/packages/curl/README.curl_off_t
    • /usr/share/doc/packages/curl/RELEASE-NOTES
    • /usr/share/doc/packages/curl/RESOURCES
    • /usr/share/doc/packages/curl/TODO
    • /usr/share/doc/packages/curl/TheArtOfHttpScripting
    • /usr/share/man/man1/curl.1.gz


    2016-01-21 - - fix CVE-2016-0755 (bsc#962983) * libcurl NTLM credentials not-checked for proxy connection re-use * * add curl-CVE-2016-0755.patch

    2016-01-21 - - unexpire cookie in test 46 (bsc#962996) * add 0001-test46-update-cookie-expire-time.patch

    2015-06-17 - - Applying patch to fix CVE-2015-3237 (bsc#934502)

    2015-06-17 - - Applying patch to fix CVE-2015-3236 (bsc#934501)

    2015-06-11 - - enable metalink support (boo#851126)

    2015-04-29 - - update to 7.42.1 * fixes CVE-2015-3153 (bnc#928533) - sensitive HTTP server headers also sent to proxies - rename curl-devel to libcurl-devel in baselibs.conf

    2015-04-22 - - update to 7.42.0 * refresh libcurl-ocloexec.patch - fixes security vulnerabilities: * CVE-2015-3143 (bnc#927556) - Re-using authenticated connection when unauthenticated * CVE-2015-3144 (bnc#927608) - host name out of boundary memory access * CVE-2015-3145 (bnc#927607) - cookie parser out of boundary memory access * CVE-2015-3148 (bnc#927746) - Negotiate not treated as connection-oriented

    2015-01-08 - - update to 7.40.0: * fixes CVE-2014-8150 (bnc#911363) * fixes CVE-2014-3707 (bnc#901924) * Changes: http_digest: Added support for Windows SSPI based authentication version info: Added Kerberos V5 to the supported features Makefile: Added VC targets for WinIDN config-win32: Introduce build targets for VS2012+ SSL: Add PEM format support for public key pinning smtp: Added support for the conversion of Unix newlines during mail send smb: Added initial support for the SMB/CIFS protocol Added support for HTTP over unix domain sockets, via CURLOPT_UNIX_SOCKET_PATH and --unix-socket sasl: Added support for GSS-API based Kerberos V5 authentication - refresh patches

    2014-09-10 - - update to 7.38.0 * fixes CVE-2014-3613 (bnc#894575) and CVE-2014-3620 (bnc#895991) * cookie leaks with IP address as domain and TLDs respectively Changes: supports HTTP/2 draft-14 CURLE_HTTP2 is a new error code CURLAUTH_NEGOTIATE is a new auth define CURL_VERSION_GSSAPI is a new capability bit no longer use fbopenssl for anything schannel: use CryptGenRandom for random numbers axtls: define curlssl_random using axTLS's PRNG cyassl: use RNG_GenerateBlock to generate a good random number findprotocol: show unsupported protocol within quotes version: detect and show LibreSSL version: detect and show BoringSSL imap/pop3/smtp: Kerberos (SASL GSSAPI) authentication via Windows SSPI http2: requires nghttp2 0.6.0 or later Bugfixes: SECURITY ADVISORY: cookie leak with IP address as domain SECURITY ADVISORY: cookie leak for TLDs And many other fixes

    2014-08-28 - - curl 7.37.1: This release includes many bugfixes and the following changes: * bits.close: introduce connection close tracking * darwinssl: Add support for --cacert * polarssl: add ALPN support * docs: Added new option man pages