diff options
author | tron <tron@pkgsrc.org> | 2008-09-02 11:58:48 +0000 |
---|---|---|
committer | tron <tron@pkgsrc.org> | 2008-09-02 11:58:48 +0000 |
commit | 9765a6a25f37d3d0860f38768ef0942de8eb6e10 (patch) | |
tree | edd90d72a53569d2bd5c9acc7dcc1b596bdb9604 /chat/bitlbee/patches/patch-ad | |
parent | f4862909d8ee38c456435201b1e2b424202dc7e3 (diff) | |
download | pkgsrc-9765a6a25f37d3d0860f38768ef0942de8eb6e10.tar.gz |
Pullup ticket #2512 - requested by tonio
bitlbee: security update
chat/bitlbee/Makefile 1.42-1.43
chat/bitlbee/distinfo 1.21-1.22
chat/bitlbee/patches/patch-aa delete
chat/bitlbee/patches/patch-ab delete
chat/bitlbee/patches/patch-ac delete
chat/bitlbee/patches/patch-ad delete
chat/bitlbee/patches/patch-ae delete
---
Module Name: pkgsrc
Committed By: tonio
Date: Wed Jul 23 21:11:40 UTC 2008
Modified Files:
pkgsrc/chat/bitlbee: Makefile distinfo
Removed Files:
pkgsrc/chat/bitlbee/patches: patch-aa patch-ab patch-ac patch-ad
patch-ae
Log Message:
Update chat/bitlbee to 1.2.1
Version 1.2.1 (released 2008-06-24) hilights:
* Mostly a lot of fixes for bugs found after the 1.2 release.
* Daemon mode is now officially declared stable.
- Fixed proxy support.
- Fixed stalling issues while connecting to Jabber when using the OpenSSL
module.
- Fixed problem with GLib and ForkDaemon where processes didn't die when
the client disconnects.
- Fixed handling of "set charset none". (Which pretty much breaks the account
completely in 1.2.)
- You can now automatically identify yourself to BitlBee by setting a server
password in your IRC client.
- Compatible with all crazy kinds of line endings that clients can send.
- Changed root nicknames are now saved.
- Added ClientInterface setting to bind() outgoing connections to a specific
network interface.
- Support for receiving Jabber chatroom invitations.
- Relaxed port restriction of the Jabber module: added ports 80 and 443.
- Preserving case in Jabber resources of buddies, since these should
officially be treated as case sensitive.
- Fully stripping spaces from AIM screennames, this didn't happen completely
which severly breaks the IRC protocol.
- Removed all the yellow tape around daemon mode, it's pretty mature by now:
testing.bitlbee.org serves all (~30) SSL users from one daemon mode
process without any serious stability issues.
- Fixed GLib <2.6 compatibility issue.
- Misc. memory leak/crash fixes.
---
Module Name: pkgsrc
Committed By: tonio
Date: Fri Aug 29 13:29:24 UTC 2008
Modified Files:
pkgsrc/chat/bitlbee: Makefile distinfo
Log Message:
Update chat/bitlbee to 1.2.2
Fixes security issue http://secunia.com/advisories/31633/
Changelog:
Version 1.2.2 (released 2008-08-26) hilights:
* Fixed a security issue where it was possible to recreate/hijack already
existing accounts.
* Various stability improvements and minor feature enhancements.
Diffstat (limited to 'chat/bitlbee/patches/patch-ad')
-rw-r--r-- | chat/bitlbee/patches/patch-ad | 50 |
1 files changed, 0 insertions, 50 deletions
diff --git a/chat/bitlbee/patches/patch-ad b/chat/bitlbee/patches/patch-ad deleted file mode 100644 index b4f1234420f..00000000000 --- a/chat/bitlbee/patches/patch-ad +++ /dev/null @@ -1,50 +0,0 @@ -$NetBSD: patch-ad,v 1.2 2008/04/20 09:31:05 tonio Exp $ - -Fix stalling issue with OpenSSL and Jabber -From http://bugs.bitlbee.org/bitlbee/changeset/devel%2C359 - ---- lib/ssl_openssl.c.orig Sat Jun 30 23:18:42 2007 -+++ lib/ssl_openssl.c -@@ -61,16 +61,16 @@ void *ssl_connect( char *host, int port, - struct scd *conn = g_new0( struct scd, 1 ); - - conn->fd = proxy_connect( host, port, ssl_connected, conn ); -- conn->func = func; -- conn->data = data; -- conn->inpa = -1; -- - if( conn->fd < 0 ) - { - g_free( conn ); - return NULL; - } - -+ conn->func = func; -+ conn->data = data; -+ conn->inpa = -1; -+ - return conn; - } - -@@ -228,6 +228,21 @@ int ssl_write( void *conn, const char *b - } - - return st; -+} -+ -+/* Only OpenSSL *really* needs this (and well, maybe NSS). See for more info: -+ http://www.gnu.org/software/gnutls/manual/gnutls.html#index-gnutls_005frecord_005fcheck_005fpending-209 -+ http://www.openssl.org/docs/ssl/SSL_pending.html -+ -+ Required because OpenSSL empties the TCP buffer completely but doesn't -+ necessarily give us all the unencrypted data. -+ -+ Returns 0 if there's nothing left or if we don't have to care (GnuTLS), -+ 1 if there's more data. */ -+int ssl_pending( void *conn ) -+{ -+ return ( ((struct scd*)conn) && ((struct scd*)conn)->established ) ? -+ SSL_pending( ((struct scd*)conn)->ssl ) > 0 : 0; - } - - void ssl_disconnect( void *conn_ ) |