head 1.2; access; symbols pkgsrc-2013Q2:1.2.0.2 pkgsrc-2013Q2-base:1.2; locks; strict; comment @# @; 1.2 date 2013.06.29.19.24.57; author spz; state dead; branches; next 1.1; commitid aYB0qkM2l0NNPxVw; 1.1 date 2013.06.29.12.08.50; author drochner; state Exp; branches; next ; commitid XMBKWlu2BEECqvVw; desc @@ 1.2 log @update of cURL to the current version. Upstream changelog: Changes: -------- darwinssl: add TLS session resumption darwinssl: add TLS crypto authentication imap/pop3/smtp: Added support for ;auth= in the URL imap/pop3/smtp: Added support for ;auth= to CURLOPT_USERPWD usercertinmem.c: add example showing user cert in memory url: Added smtp and pop3 hostnames to the protocol detection list imap/pop3/smtp: Added support for enabling the SASL initial response curl -E: allow to use ':' in certificate nicknames Bugfixes: --------- SECURITY VULNERABILITY: curl_easy_unescape() may parse data beyond the end of the input buffer [26] FTP: access files in root dir correctly configure: try pthread_create without -lpthread FTP: handle a 230 welcome response curl-config: don't output static libs when they are disabled CURL_CHECK_CA_BUNDLE: don't check for paths when cross-compiling Various documentation updates getinfo.c: reset timecond when clearing session-info variables FILE: prevent an artificial timeout event due to stale speed-check data ftp_state_pasv_resp: connect through proxy also when set by env sshserver: disable StrictHostKeyChecking ftpserver: Fixed imap logout confirmation data curl_easy_init: use less mallocs smtp: Fixed unknown percentage complete in progress bar smtp: Fixed sending of double CRLF caused by first in EOB bindlocal: move brace out of #ifdef winssl: Fixed invalid memory access during SSL shutdown OS X framework: fix invalid symbolic link OpenSSL: allow empty server certificate subject axtls: prevent memleaks on SSL handshake failures cookies: only consider full path matches Revert win32 MemoryTracking: wcsdup() _wcsdup() and _tcsdup() Curl_cookie_add: handle IPv6 hosts ossl_send: SSL_write() returning 0 is an error too ossl_recv: SSL_read() returning 0 is an error too Digest auth: escape user names with backslash or " in them curl_formadd.3: fixed wrong "end-marker" syntax libcurl-tutorial.3: fix incorrect backslash curl_multi_wait: reduce timeout if the multi handle wants to tests/Makefile: typo in the perlcheck target axtls: honor disabled VERIFYHOST OpenSSL: avoid double free in the PKCS12 certificate code multi_socket: reduce timeout inaccuracy margin digest: support auth-int for empty entity body axtls: now done non-blocking lib1900: use tutil_tvnow instead of gettimeofday curl_easy_perform: avoid busy-looping CURLOPT_COOKIELIST: take cookie share lock multi_socket: react on socket close immediately @ text @$NetBSD: patch-CVE-2013-2174,v 1.1 2013/06/29 12:08:50 drochner Exp $ see http://curl.haxx.se/docs/adv_20130622.html --- lib/escape.c.orig 2013-01-16 22:05:56.000000000 +0000 +++ lib/escape.c @@@@ -159,7 +159,8 @@@@ CURLcode Curl_urldecode(struct SessionHa while(--alloc > 0) { in = *string; - if(('%' == in) && ISXDIGIT(string[1]) && ISXDIGIT(string[2])) { + if(('%' == in) && (alloc > 2) && + ISXDIGIT(string[1]) && ISXDIGIT(string[2])) { /* this is two hexadecimal digits following a '%' */ char hexstr[3]; char *ptr; @ 1.1 log @add patch from upstream to fix possible buffer overflow in URL parser (CVE-2013-2174), bump PKGREV @ text @d1 1 a1 1 $NetBSD$ @