head 1.2; access; symbols pkgsrc-2015Q4:1.1.0.26 pkgsrc-2015Q4-base:1.1 pkgsrc-2015Q3:1.1.0.24 pkgsrc-2015Q3-base:1.1 pkgsrc-2015Q2:1.1.0.22 pkgsrc-2015Q2-base:1.1 pkgsrc-2015Q1:1.1.0.20 pkgsrc-2015Q1-base:1.1 pkgsrc-2014Q4:1.1.0.18 pkgsrc-2014Q4-base:1.1 pkgsrc-2014Q3:1.1.0.16 pkgsrc-2014Q3-base:1.1 pkgsrc-2014Q2:1.1.0.14 pkgsrc-2014Q2-base:1.1 pkgsrc-2014Q1:1.1.0.12 pkgsrc-2014Q1-base:1.1 pkgsrc-2013Q4:1.1.0.10 pkgsrc-2013Q4-base:1.1 pkgsrc-2013Q3:1.1.0.8 pkgsrc-2013Q3-base:1.1 pkgsrc-2013Q2:1.1.0.6 pkgsrc-2013Q2-base:1.1 pkgsrc-2013Q1:1.1.0.4 pkgsrc-2013Q1-base:1.1 pkgsrc-2012Q4:1.1.0.2 pkgsrc-2012Q4-base:1.1; locks; strict; comment @# @; 1.2 date 2016.01.31.13.45.34; author nros; state dead; branches; next 1.1; commitid wrZJY7WL9kMhy5Ty; 1.1 date 2012.11.29.11.01.16; author drochner; state Exp; branches; next ; desc @@ 1.2 log @Remove unused patches in claws-mail-vcalendar. The patches were from upstream and are included in the version of claws-mail-vcalendar currently in pkgsrc. @ text @$NetBSD: patch-CVE-2012-5527_3,v 1.1 2012/11/29 11:01:16 drochner Exp $ --- src/vcal_meeting_gtk.c.orig 2011-10-30 21:24:29.000000000 +0000 +++ src/vcal_meeting_gtk.c @@@@ -1085,7 +1085,7 @@@@ static gboolean check_attendees_availabi if (!local_only) { remail = g_strdup(email); - g_free(email); + extract_address(remail); if (strrchr(remail, ' ')) user = g_strdup(strrchr(remail, ' ')+1); @@@@ -1125,17 +1125,22 @@@@ static gboolean check_attendees_availabi && strncmp(tmp, "ftp://", 6)) contents = file_read_to_str(tmp); else { + gchar *label = g_strdup_printf(_("Fetching planning for %s..."), email); if (!strncmp(tmp, "webcal://", 9)) { gchar *tmp2 = g_strdup_printf("http://%s", tmp+9); g_free(tmp); tmp = tmp2; } - contents = vcal_curl_read(tmp, FALSE, NULL); + contents = vcal_curl_read(tmp, label, FALSE, NULL); + g_free(label); } } else { contents = NULL; } + + g_free(email); g_free(tmp); + if (contents == NULL) { uncertain = TRUE; att_update_icon(meet, attendee, 2, _("Free/busy retrieval failed")); @ 1.1 log @don't display the URL when fetching calendars, it could contain credentials (CVE-2012-5527), patch from upstream bump PKGREV @ text @d1 1 a1 1 $NetBSD$ @