php5-xmlrpc-5.3.5-344.1<>,@Pp?D/=„[.(|$F"=.̾kc3k]E`o9`,{=fäPva+ V!ccuϳ1dta%kPPۅZ F#mD̦ igFhcy1mE.겇ɤA^+H!Pd.:yM6V/Wh z,ll,I ;%=z}ѥHbQMv2쪚J$eC_~\_Ћ">51W?1Gd  0 *08@ D H P   @ M (r8x=9l=: =F/tG/H/I/X/Y/\/]/^/b0c0d1e1 f1%l1'z17Cphp5-xmlrpc5.3.5344.1PHP5 Extension ModuleThis module adds XMLRPC-EPI support. Authors: -------- The PHP Group See http://www.php.net/credits.php for more detailsPbuild218openSUSE 11.4openSUSEPHP-3.01http://bugs.opensuse.orgDevelopment/Libraries/PHPhttp://www.php.netlinuxi586O8PP15056a2f6472bad3abd15a18cc2c83910e47bf4864d337b97da8b141f84c05c7rootrootrootrootphp5-5.3.5-344.1.src.rpmphp-xmlrpcxmlrpc.sophp5-xmlrpcphp5-xmlrpc(x86-32)  @@@@@@@@@ php5rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libpthread.so.0libpthread.so.0(GLIBC_2.0)rpmlib(PayloadIsLzma)5.3.54.0-13.0.4-14.4.6-14.8.0P1@O@OhOO\@OO}@OX@O1@O+@OO@NxN@NdN e@M@MgMc@MS@M.@M*M*M)@M%M PM\@M\@M L@L@L@LLY@LXLEL@KQ@K@K@KKK@KRKKK0KVJ1@JG@J#JJ/@J@J@JJQJ@J_@J;}JB@I@pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comchris@computersalat.depgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@novell.compgajdos@suse.czchris@computersalat.depgajdos@suse.czchris@computersalat.depgajdos@suse.czcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgro@suse.decristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcrrodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgdimstar@opensuse.orgvuntz@opensuse.orgaj@suse.dejengelh@medozas.decoolo@novell.comcrrodriguez@opensuse.orgcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.decrrodriguez@novell.comcrrodriguez@novell.comcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.decoolo@novell.comcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.de- security update: * CVE-2012-2688 [bnc#772580] * CVE-2012-3365 [bnc#772582] * oob-read-sql-dos [bnc#769785]- security update: * CVE-2012-2143 [bnc#766798]- security update: * CVE-2012-2386 [bnc#763814]- security update: * improved fix for CVE-2012-1823 (CVE-2012-2335, CVE-2012-2336) [bnc#761631]- fix for bnc#755907 (php#55019) * https://bugzilla.novell.com/show_bug.cgi?id=755907 * fixes for *Unicode Issues Bug #55019 https://bugs.php.net/bug.php?id=55019 * add php-5.3-php55019.patch- security update: * CVE-2012-1823, CVE-2012-2311 [bnc#760536]- security update: * CVE-2012-1172 [bnc#752030]- fixed regressions after fix for CVE-2012-0830 [bnc#749111]- security update: * CVE-2012-0807 [bnc#743308] * CVE-2012-0057 [bnc#741520] * CVE-2011-4153 [bnc#741859] * CVE-2012-0831 [bnc#746661]- security update CVE-2012-0830 and other memory leaks (fixes the fix of CVE-2011-4885) [bnc#744966]- security update: * CVE-2012-0781 [bnc#742273] * CVE-2012-0788 [bnc#742806] * memory corruption in parse_ini_string() [bnc#742806] * CVE-2012-0789 [bnc#742806]- security update: * CVE-2011-4885 [bnc#738221] -- added max_input_vars directive to prevent attacks based on hash collisions- amend README.SUSE to discourage using apache module with apache2-worker [bnc#728671]- security update: * CVE-2011-4566 [bnc#733590] * CVE-2011-3182 [bnc#713652] * CVE-2011-1466 [bnc#736169] * CVE-2011-1072 [bnc#735613]- security update: * CVE-2011-3267 [bnc#715640] * CVE-2011-3268 [bnc#715646] - allow uploading files bigger than 2GB for 64bit systems [bnc#709549] * 64-bit-post-large-files.patch- security update: * CVE-2011-2483 [bnc#701491] * CVE-2011-2202 [bnc#699711]- security updates: * CVE-2011-1470, CVE-2011-1471 [bnc#681214] * CVE-2011-1092 [bnc#677782] * CVE-2011-1464 [bnc#681194] * CVE-2011-1468 [bnc#681197] * CVE-2011-1467 [bnc#681195] * CVE-2011-0421 [bnc#681291] * CVE-2011-1469 [bnc#681210] * CVE-2011-1148 [bnc#679278] * CVE-2011-1938 [bnc#695689]- fix for macros.php o devel pkg must have Obsoletes/Provides: php-macros- security fixes * CVE-2011-0420 [bnc#672933] * CVE-2011-0708 [bnc#671710]- extend macros.php o __php, __phpize, __php_config, php_version o __pear, php_peardir, php_pearxmldir o php_pear_gen_filelist - add README.macros- security fix: * fopen_https_proxy_auth_fix.patch [bnc#656523]- export PHP_MYSQLND_ENABLED=yes to solve the mysqlnd problem when extensions are built shared. [bnc#661464]- Go back to libmysql as there is currently no way to build shared mysql extensions with mysqlnd. [bnc#661464]- Use mysqlnd driver, this is a newer PHP-native mysql extension, that does not require external libraries. Now you can use mysql, mariadb or drizzle without extra libs. fixes bnc #661464 and other old feature requests.- Update to version 5.3.5, Critical Update * Fixed bug #53632 (PHP hangs on numeric value 2.2250738585072011e-308). (CVE-2010-4645) Only 32 bit binaries affected, confirmed in factory i586.- revert unsuitable patch php-5.3.4-dlopen.patch- Add php-5.3.4-dlopen.patch from fedora,makes dlopen to use bind_now instead of lazy. - Compiler is now in C99 mode for both core and extensions.- fix format string bug in Phar extension I just found http://bugs.php.net/bug.php?id=53541 and the underlying issue, which is the lack of format attributes in several core prototypes.- Update to PHP 5.3.4 final * Fixed crash in zip extract method (possible CWE-170). * Paths with NULL in them (foo\0bar.txt) are now considered as invalid (CVE-2006-7243). * Fixed a possible double free in imap extension (Identified by Mateusz Kocielski). (CVE-2010-4150). * Fixed NULL pointer dereference in ZipArchive::getArchiveComment. (CVE-2010-3709). * Fixed possible flaw in open_basedir (CVE-2010-3436). * Fixed MOPS-2010-24, fix string validation. (CVE-2010-2950). * Fixed symbolic resolution support when the target is a DFS share. * Fixed bug #52929 (Segfault in filter_var with FILTER_VALIDATE_EMAIL with large amount of data) (CVE-2010-3710). * Key Bug Fixes in PHP 5.3.4 include: * Added stat support for zip stream. * Added follow_location (enabled by default) option for the http stream support. * Added a 3rd parameter to get_html_translation_table. It now takes a charset hint, like htmlentities et al. * Implemented FR #52348, added new constant ZEND_MULTIBYTE to detect zend multibyte at runtime. * Multiple improvements to the FPM SAPI. * Over 100 other bug fixes. - SUSE specific; * enable PTY support in proc_open (temporary)- xft-config is gone- Update to 5.3.3_svn201011020214 * Fix Performance issue, array_diff may take hours instead of seconds in some scenarios,regression appeared in version 5.2.5- Update to 5.3.3_svn20101027xx - Fix init script again.- update to 5.3.3_svn201010140300 - Fix php-fpm init script.- Update to an slightly newer PHP 5.3.3.x snap, fixes around 100 bugs including open_basedir problems. - add the fpm sapi to the package.- Clarify changelog this update fixed: * VUL-0: php5 new unserialize() flaw CVE-2010-2225 [bnc#616232] * VUL-0: php5: MOPS-2010-021: fnmatch() Stack Exhaustion Vulnerability [bnc#605097] * VUL-0: php5: MOPS-2010-017: preg_quote() Interruption Information Leak [bnc#605100] * VUL-0: php5: MOPS-2010-022 use after free [bnc#609763] * VUL-0: php5-phar: MOPS-2010-0{24,25,26,27,28} format string bugs [bnc#609766] * VUL-0: php5: MOPS-2010-0{32,33,34} use space interruption in iconv functions [bnc#609768] * VUL-0: php5: MOPS-2010-0{36,37,38,39,40} userspace interruptions [bnc#609769] * VUL-0: php5: MOPS-2010-0{36..46} userspace interruptions [bnc#609769] * VUL-0: php5: MOPS-2010-047/048 information leak [bnc#612555] * VUL-0: php5: MOPS-2010-049/50/51/52/53/54/55 memory corruption and/or info leak [bnc#612556] * VUL-0: PHP5: Session Data Injection Vulnerability [bnc#619483] * VUL-0: PHP5: multiple heap based buffer overflows [bnc#619486] * bugzilla numbers 619487,619489,619469,609766..- Update to PHP 5.3.3 RC3 - Massive lot of security fixes see list here http://www.php-security.org/category/vulnerabilities/index.html- possible fix for [bnc#610633]- use FD_CLOEXEC flag to avoid annoying races.- remove obsolete buildRequires- remove build date from binaries so they dont get republished every time - fix invalid path- add missing patch, refresh patches with -p0- Update to PHP 5.3.2, see NEWS for details- Add php5-autoconf-2.65.patch to fix build with autoconf 2.65; it's a backported combination of svn commits 291283, 291284 and 291332. - Workaround old php bug http://bugs.php.net/bug.php?id=21153 by replacing -ledit with -ledit -lncurses in the resulting configure scripts. This became apparent problem due to libedit being built with as-needed now. - Add php5-bug51224.patch to fix buffer overflows happening in strcpy. It;s a combination of upstream svn revs 284097 and 284099- Remove unneeded gtk-devel BuildRequires.- Remove obsolete build requires of orbit-devel.- avoid alignment crash on alignment-sensitive CPUs (bugs.php.net#46074)- update patch to fix build- Fixed wrong harcoded mysql socket [bnc#544516] - Fixed wrong default include_path- make php5-pear noarch in Factory- remove obsolete patches - apply ini patch - enable mhash compatibility in the hash extension and obsolete php5-mhash - add macros.php to the source list- PHP read_exif_data() only returns the first letter of UTF-16 strings [bnc#518300]- fix missing return values of suhosin extension- fix build on CODE10 products- fix horrible broken open_basedir functionality- update suhosin extension to version 0.9.29 - mysql extensions now use mysqlnd instead of libmysqlclient. - enable sqlite3 extension, part of the php5-sqlite package - enable enchant extension - enable fileinfo extension - enable intl extension- add suhosin patch and newer suhosin extension for compatibility reasons- Upgrade to PHP 5.3, see http://www.php.net/ChangeLog-5.php for the huge list of changes - remove dbase and ncurses extension- disable as-needed to fix build- update to PHP 5.2.10 * Fixed bug #48378 (exif_read_data() segfaults on certain corrupted .jpeg files) * Added "ignore_errors" option to http fopen wrapper. (David Zulke, Sara) * Fixed memory corruptions while reading properties of zip files. (Ilia) * Fixed memory leak in ob_get_clean/ob_get_flush. (Christian) * Fixed segfault on invalid session.save_path. (Hannes) * Fixed leaks in imap when a mail_criteria is used. (Pierre) * Changed default value of array_unique()'s optional sorting type parameter back to SORT_STRING to fix backwards compatibility breakage introduced in PHP 5.2.9. (Moriyoshi) * Fixed bug #47940 (memory leaks in imap_body). (Pierre, Jake Levitt) * Fixed bug #47903 ("@" operator does not work with string offsets). (Felipe) * Fixed bug #47644 (Valid integers are truncated with json_decode()). (Scott) * Fixed bug #47564 (unpacking unsigned long 32bit big endian returns wrong result). (Ilia) * Fixed bug #47365 (ip2long() may allow some invalid values on certain 64bit systems). * Over 100 bug fixes.- add temporary backport of openssl prng function- Update to version 5.2.9, security and bugfix release * VUL-0: php5: memory disclosure by imagerotate() [bnc#480850] * VUL-0: php5: mbstring.func_overload set in .htaccess becomes global [bnc#471419] * Fixed a segfault when malformed string is passed to json_decode() * Fixed explode() behavior with empty string to respect negative limit.build21 1343917231/11n5.3.5-344.15.3.5-344.1xmlrpc.inixmlrpc.so/etc/php5/conf.d//usr/lib/php5/extensions/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:Maintenance:741/openSUSE_11.4_Update/8f4baec1abf9a7b5588724639b021a16-php5.openSUSE_11.4_Updatedrpmlzma5i586-suse-linux V҈ޓ?]"k%nS:cpUҔH-=Pt W4r 6"eb_]h>wj(-RnzRz5x;u޻mk@;1i⠢5%mW]OcYIo_bp7z '!$ -) zX1™ʆ)Xٖ135bpIZ![7hx ;^K%&ZZv?|;l (inZ8)שߑ Ak͢D {AfT!Qr S:Яknֽa[k/2%FJ["FI#á_߶0:޶; q8Tό")RPg? `V \?/;7n͸ & ߓ&C*Zw^< :"PO[GOxSᧃj:}TXϐ.wk2zN^)3mo2vS0@a%q,CnEcD^#dzg: ,09f s ^[0sqQ|(p|5n̅C,nY,lWD Ơ 2/c벎#hR,- G$x -:6BŢ bImH\rE+7ߞl6 g͛ lkJÙgRv8vv]8N߹-PLL z'wwsCDOkΥϊ)qk;DJõ<e/SWs>Hhم~Lp<@U,dm42Vdޟ3\dfƿzqH,g)cCF Q!l$ȟ]dQ3c>S~r !nþQQؤrޏpEڈ>1r~c]Zaivap4зvJiH]Pdgudy `} :."?)o<#e'˄JW FcP'QNd'lGGyѯ07,Ld(}X8xH5O1V:{1A|doz>zwhEB$ſ.7RSE}-;oRG(.ڸд cFzr  j7({)cOU,祽W\uBP=4N6߶ Vod~="q$h&j=C!)y_|,ބKGԟZ%w-atm- tRWO!t1MHJ }/3cYIfP|,x{Gfx}_W[S4x ;av_8 ^#<Io+if>-`; )T?8ˆGO`%<:yFĈ d_ax_)r8)L†4W /,,ݦ8Bj:4l%e˪BE!Ac/Ct=? "uo2)m=k;*пgr>mG)R jc| p):^(hfS!e%NŶn/U] 5t יjAl9 ]=|#.Tn"QN27Ů EeَɘvLӅN9}v5 .O @qgd[L?ukh{Ma`~2wPD.FI߿G|܌}oʪ ÐNu{/nOMNO+.۱&z J0Fw)t!7X ֺ|FRyU=D4Uc2Sԇ`2`=]L-ûm>✕ϳ{ao4Mg5:!7pW"_\ X}ŗ!#rüGUވ,(p/̋6 @'s^tQqMc9gT0u*kqW)Ct$KV<Sƴ3ɨn.~M? ĩFoVgͭʴ&Ҙg?A5S=;Q\FоVJsߚo ]$ガ~p` B]noѹ) iJѬiFX̞~ Vp;T`k8Bvyߑjpx{2RPHuhX{?J+u 0K-'F4V2᱾sAՅcHXaZ:rI9EA=M"s됄JҢVz^݌Q5,gfbqyEH6JKQ͉^KFUȐ M9 {,aco2y6gKH&4%/_dhxChw ʉ(_9' gR.QYMzs X2d (I ŷ^ds8Rk5/zmu= ITF1>G[-;oes07|uﲺ|{)L zy1fڑtM?xy8[ɟḰ86Yg,:n/~jE1s9-Ƭ(lRT>%lZ~ âEaV i~Լ·PuJY#F{AWɸŶ_ 輐?&d^o\, ^"#B֝EEM3JftCK L9E