summaryrefslogtreecommitdiff
path: root/chat/bitlbee/patches/patch-ad
diff options
context:
space:
mode:
authortron <tron@pkgsrc.org>2008-09-02 11:58:48 +0000
committertron <tron@pkgsrc.org>2008-09-02 11:58:48 +0000
commit9765a6a25f37d3d0860f38768ef0942de8eb6e10 (patch)
treeedd90d72a53569d2bd5c9acc7dcc1b596bdb9604 /chat/bitlbee/patches/patch-ad
parentf4862909d8ee38c456435201b1e2b424202dc7e3 (diff)
downloadpkgsrc-9765a6a25f37d3d0860f38768ef0942de8eb6e10.tar.gz
Pullup ticket #2512 - requested by tonio
bitlbee: security update chat/bitlbee/Makefile 1.42-1.43 chat/bitlbee/distinfo 1.21-1.22 chat/bitlbee/patches/patch-aa delete chat/bitlbee/patches/patch-ab delete chat/bitlbee/patches/patch-ac delete chat/bitlbee/patches/patch-ad delete chat/bitlbee/patches/patch-ae delete --- Module Name: pkgsrc Committed By: tonio Date: Wed Jul 23 21:11:40 UTC 2008 Modified Files: pkgsrc/chat/bitlbee: Makefile distinfo Removed Files: pkgsrc/chat/bitlbee/patches: patch-aa patch-ab patch-ac patch-ad patch-ae Log Message: Update chat/bitlbee to 1.2.1 Version 1.2.1 (released 2008-06-24) hilights: * Mostly a lot of fixes for bugs found after the 1.2 release. * Daemon mode is now officially declared stable. - Fixed proxy support. - Fixed stalling issues while connecting to Jabber when using the OpenSSL module. - Fixed problem with GLib and ForkDaemon where processes didn't die when the client disconnects. - Fixed handling of "set charset none". (Which pretty much breaks the account completely in 1.2.) - You can now automatically identify yourself to BitlBee by setting a server password in your IRC client. - Compatible with all crazy kinds of line endings that clients can send. - Changed root nicknames are now saved. - Added ClientInterface setting to bind() outgoing connections to a specific network interface. - Support for receiving Jabber chatroom invitations. - Relaxed port restriction of the Jabber module: added ports 80 and 443. - Preserving case in Jabber resources of buddies, since these should officially be treated as case sensitive. - Fully stripping spaces from AIM screennames, this didn't happen completely which severly breaks the IRC protocol. - Removed all the yellow tape around daemon mode, it's pretty mature by now: testing.bitlbee.org serves all (~30) SSL users from one daemon mode process without any serious stability issues. - Fixed GLib <2.6 compatibility issue. - Misc. memory leak/crash fixes. --- Module Name: pkgsrc Committed By: tonio Date: Fri Aug 29 13:29:24 UTC 2008 Modified Files: pkgsrc/chat/bitlbee: Makefile distinfo Log Message: Update chat/bitlbee to 1.2.2 Fixes security issue http://secunia.com/advisories/31633/ Changelog: Version 1.2.2 (released 2008-08-26) hilights: * Fixed a security issue where it was possible to recreate/hijack already existing accounts. * Various stability improvements and minor feature enhancements.
Diffstat (limited to 'chat/bitlbee/patches/patch-ad')
-rw-r--r--chat/bitlbee/patches/patch-ad50
1 files changed, 0 insertions, 50 deletions
diff --git a/chat/bitlbee/patches/patch-ad b/chat/bitlbee/patches/patch-ad
deleted file mode 100644
index b4f1234420f..00000000000
--- a/chat/bitlbee/patches/patch-ad
+++ /dev/null
@@ -1,50 +0,0 @@
-$NetBSD: patch-ad,v 1.2 2008/04/20 09:31:05 tonio Exp $
-
-Fix stalling issue with OpenSSL and Jabber
-From http://bugs.bitlbee.org/bitlbee/changeset/devel%2C359
-
---- lib/ssl_openssl.c.orig Sat Jun 30 23:18:42 2007
-+++ lib/ssl_openssl.c
-@@ -61,16 +61,16 @@ void *ssl_connect( char *host, int port,
- struct scd *conn = g_new0( struct scd, 1 );
-
- conn->fd = proxy_connect( host, port, ssl_connected, conn );
-- conn->func = func;
-- conn->data = data;
-- conn->inpa = -1;
--
- if( conn->fd < 0 )
- {
- g_free( conn );
- return NULL;
- }
-
-+ conn->func = func;
-+ conn->data = data;
-+ conn->inpa = -1;
-+
- return conn;
- }
-
-@@ -228,6 +228,21 @@ int ssl_write( void *conn, const char *b
- }
-
- return st;
-+}
-+
-+/* Only OpenSSL *really* needs this (and well, maybe NSS). See for more info:
-+ http://www.gnu.org/software/gnutls/manual/gnutls.html#index-gnutls_005frecord_005fcheck_005fpending-209
-+ http://www.openssl.org/docs/ssl/SSL_pending.html
-+
-+ Required because OpenSSL empties the TCP buffer completely but doesn't
-+ necessarily give us all the unencrypted data.
-+
-+ Returns 0 if there's nothing left or if we don't have to care (GnuTLS),
-+ 1 if there's more data. */
-+int ssl_pending( void *conn )
-+{
-+ return ( ((struct scd*)conn) && ((struct scd*)conn)->established ) ?
-+ SSL_pending( ((struct scd*)conn)->ssl ) > 0 : 0;
- }
-
- void ssl_disconnect( void *conn_ )