pkgsrc/www/neon/patches/patch-ab
tron 50cd3be57f Update "neon" package to version 0.29. Changes since version 0.28.5:
* Interface changes:
  o none, API and ABI backwards-compatible with 0.28.x and 0.27.x
* New interfaces and features:
  o added NTLM auth support for Unix builds (Kai Sommerfeld,
    Daniel Stenberg)
  o ne_auth.h: added NE_AUTH_GSSAPI and NE_AUTH_NTLM auth protocol codes
  o added ne_acl3744.h, updated WebDAV ACL support (Henrik Holst)
  o added built-in SOCKS v4/v4a/v5 support: ne_socket.h:ne_sock_proxy(),
    and ne_session.h:ne_session_socks_proxy()
  o added support for system-default proxies: ne_session_system_proxy(),
    implemented using libproxy where available
  o ne_session.h: added NE_SESSFLAG_EXPECT100 session flag,
    SSL verification failure bits extended by NE_SSL_BADCHAIN and
    NE_SSL_REVOKED, better handling of failures within the cert chain
    (thanks to Ludwig Nussel)
  o ne_socket.h: ne_sock_writev() (Julien Reichel), ne_sock_set_error(),
    ne_iaddr_raw(), ne_iaddr_parse()
  o ne_string.h: ne_buffer_qappend(), ne_strnqdup()
* Deprecated interfaces:
  o ne_acl.h is obsoleted by ne_acl3744.h (but is still present)
  o obsolete feature "NE_FEATURE_SOCKS" now never marked present
* Other changes:
  o fix handling of "stale" flag in RFC2069-style Digest auth challenge
  o ne_free() implemented as a function on Win32 (thanks to Helge Hess)
  o symbol versioning used for new symbols, where supported
  o ensure SSL connections are closed cleanly with OpenSSL
  o fix build with OpenSSL 1.0 beta
  o updated Polish (pl) translation (Arfrever Frehtes Taifersar Arahesis)
* SECURITY (CVE-2009-2473): Fix "billion laughs" attack against expat;
  could allow a Denial of Service attack by a malicious server.
* SECURITY (CVE-2009-2474): Fix handling of an embedded NUL byte in a
  certificate subject name; could allow an undetected MITM attack against
  an SSL server if a trusted CA issues such a cert.

Tested by Daniel Horecki with SVN client.
2009-09-14 16:48:43 +00:00

53 lines
1.5 KiB
Text

$NetBSD: patch-ab,v 1.2 2009/09/14 16:48:44 tron Exp $
--- src/ne_socket.c.orig 2009-08-18 14:16:07.000000000 +0100
+++ src/ne_socket.c 2009-09-14 13:40:37.000000000 +0100
@@ -1192,6 +1192,9 @@
in6.sin6_port = htons(port);
/* fill in the _family field for AIX 4.3, which forgets to do so. */
in6.sin6_family = AF_INET6;
+#ifdef __NetBSD__
+ in6.sin6_len = sizeof in6;
+#endif
return bind(fd, (struct sockaddr *)&in6, sizeof in6);
} else
@@ -1210,6 +1213,9 @@
}
in.sin_port = htons(port);
in.sin_family = AF_INET;
+#ifdef __NetBSD__
+ in.sin_len = sizeof in;
+#endif
return bind(fd, (struct sockaddr *)&in, sizeof in);
}
@@ -1329,7 +1335,7 @@
ia = ne_calloc(sizeof *ia);
#ifdef USE_GETADDRINFO
- ia->ai_addr = ne_malloc(sizeof *ia);
+ ia->ai_addr = ne_malloc(len);
ia->ai_addrlen = len;
memcpy(ia->ai_addr, sad, len);
ia->ai_family = saun.sa.sa_family;
@@ -1365,6 +1371,9 @@
ia->ai_addr = (struct sockaddr *)in4;
ia->ai_addrlen = sizeof *in4;
in4->sin_family = AF_INET;
+#ifdef __NetBSD__
+ in4->sin_len = sizeof *in4;
+#endif
memcpy(&in4->sin_addr.s_addr, raw, sizeof in4->sin_addr.s_addr);
}
#ifdef AF_INET6
@@ -1374,6 +1383,9 @@
ia->ai_addr = (struct sockaddr *)in6;
ia->ai_addrlen = sizeof *in6;
in6->sin6_family = AF_INET6;
+#ifdef __NetBSD__
+ in6->sin6_len = sizeof *in6;
+#endif
memcpy(&in6->sin6_addr, raw, sizeof in6->sin6_addr.s6_addr);
}
#endif