pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/openssh+gssapi Apply security patch for OpenS...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/3d6347fd9385
branches:  trunk
changeset: 461473:3d6347fd9385
user:      jwise <jwise%pkgsrc.org@localhost>
date:      Tue Sep 16 18:15:26 2003 +0000

description:
Apply security patch for OpenSSH-3.6.1p2 recently released by openssh team.

PKGREVISION bump, and BROKEN= removed.

While there, fix Solaris short pkg name.

diffstat:

 security/openssh+gssapi/Makefile         |   7 +++----
 security/openssh+gssapi/distinfo         |   3 ++-
 security/openssh+gssapi/patches/patch-ai |  28 ++++++++++++++++++++++++++++
 3 files changed, 33 insertions(+), 5 deletions(-)

diffs (67 lines):

diff -r 263d4d2f1946 -r 3d6347fd9385 security/openssh+gssapi/Makefile
--- a/security/openssh+gssapi/Makefile  Tue Sep 16 17:21:36 2003 +0000
+++ b/security/openssh+gssapi/Makefile  Tue Sep 16 18:15:26 2003 +0000
@@ -1,14 +1,13 @@
-# $NetBSD: Makefile,v 1.7 2003/09/16 14:05:47 jwise Exp $
+# $NetBSD: Makefile,v 1.8 2003/09/16 18:15:26 jwise Exp $
 
 # NOTE:  This package is modeled on ../openssh, but does not share
 # files with it as that package may update faster than the gssapi
 # patches do.
 
-BROKEN=                        OpenSSH 3.6.1p2 contains a buffer overflow, and updated version of patch is not yet available.
-
 DISTNAME=              openssh-3.6.1p2
 PKGNAME=               openssh+gssapi-3.6.1.2.20030430
-SVR4_PKGNAME=          ossh
+PKGREVISION=           1
+SVR4_PKGNAME=          osshgss
 CATEGORIES=            security
 MASTER_SITES=          ftp://ftp7.usa.openbsd.org/pub/os/OpenBSD/OpenSSH/portable/ \
                        ftp://ftp.stealth.net/pub/mirrors/ftp.openssh.com/pub/OpenBSD/OpenSSH/portable/ \
diff -r 263d4d2f1946 -r 3d6347fd9385 security/openssh+gssapi/distinfo
--- a/security/openssh+gssapi/distinfo  Tue Sep 16 17:21:36 2003 +0000
+++ b/security/openssh+gssapi/distinfo  Tue Sep 16 18:15:26 2003 +0000
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.1.1.1 2003/07/24 21:01:23 jwise Exp $
+$NetBSD: distinfo,v 1.2 2003/09/16 18:15:27 jwise Exp $
 
 SHA1 (openssh-3.6.1p2.tar.gz) = dafe5b6ee2c8ced12c2ee8961530b4e51c2f0bcf
 Size (openssh-3.6.1p2.tar.gz) = 879629 bytes
@@ -7,3 +7,4 @@
 SHA1 (patch-aa) = 20abe6938aba07ab7b6c7eab5d24a303f0cd2298
 SHA1 (patch-ab) = 1069fe256b7925fcf404781ef14e5c492f52c21e
 SHA1 (patch-ah) = 9913c868bde5d318915b1dee2c05dcf454a0f506
+SHA1 (patch-ai) = 863ddd5f85a8b436912605314cc2f7b8bfde5ec4
diff -r 263d4d2f1946 -r 3d6347fd9385 security/openssh+gssapi/patches/patch-ai
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/security/openssh+gssapi/patches/patch-ai  Tue Sep 16 18:15:26 2003 +0000
@@ -0,0 +1,28 @@
+--- buffer.c.orig      2003-09-16 13:45:48.000000000 -0400
++++ buffer.c   2003-09-16 13:50:49.000000000 -0400
+@@ -69,6 +69,7 @@
+ void *
+ buffer_append_space(Buffer *buffer, u_int len)
+ {
++      u_int newlen;
+       void *p;
+ 
+       if (len > 0x100000)
+@@ -98,11 +99,13 @@
+               goto restart;
+       }
+       /* Increase the size of the buffer and retry. */
+-      buffer->alloc += len + 32768;
+-      if (buffer->alloc > 0xa00000)
++
++      newlen = buffer->alloc + len + 32768;
++      if (newlen > 0xa00000)
+               fatal("buffer_append_space: alloc %u not supported",
+-                  buffer->alloc);
+-      buffer->buf = xrealloc(buffer->buf, buffer->alloc);
++                      newlen);
++      buffer->buf = xrealloc(buffer->buf, newlen);
++      buffer->alloc = newlen;
+       goto restart;
+       /* NOTREACHED */
+ }



Home | Main Index | Thread Index | Old Index