Openwrt/package/network/utils/curl/patches/300-fix-disable-crypto-auth.patch
Hauke Mehrtens 97b14fd700 curl: update curl to version 7.43.0
This brings curl to version 7.43.0 and contains fixes for the following
security vulnerabilities:

CVE-2015-3236: lingering HTTP credentials in connection re-use
http://curl.haxx.se/docs/adv_20150617A.html

CVE-2015-3237: SMB send off unrelated memory contents
http://curl.haxx.se/docs/adv_20150617B.html

The 100-check_long_long patch is not needed any more, because the
upstream autoconf script already checks for long long when cyassl is
selected.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>

SVN-Revision: 46169
2015-07-03 23:21:01 +00:00

26 lines
808 B
Diff

--- a/lib/curl_ntlm_msgs.c
+++ b/lib/curl_ntlm_msgs.c
@@ -569,7 +569,7 @@ CURLcode Curl_sasl_create_ntlm_type3_mes
else
#endif
-#if USE_NTRESPONSES && USE_NTLM2SESSION
+#if USE_NTRESPONSES && USE_NTLM2SESSION && !defined(CURL_DISABLE_CRYPTO_AUTH)
/* We don't support NTLM2 if we don't have USE_NTRESPONSES */
if(ntlm->flags & NTLMFLAG_NEGOTIATE_NTLM2_KEY) {
unsigned char ntbuffer[0x18];
--- a/lib/vtls/vtls.c
+++ b/lib/vtls/vtls.c
@@ -852,9 +852,9 @@ CURLcode Curl_ssl_md5sum(unsigned char *
unsigned char *md5sum, /* output */
size_t md5len)
{
-#ifdef curlssl_md5sum
+#if defined(curlssl_md5sum)
curlssl_md5sum(tmp, tmplen, md5sum, md5len);
-#else
+#elif !defined(CURL_DISABLE_CRYPTO_AUTH)
MD5_context *MD5pw;
(void) md5len;