summaryrefslogtreecommitdiff
path: root/security/openssh+gssapi
diff options
context:
space:
mode:
authorjwise <jwise>2003-09-16 18:15:26 +0000
committerjwise <jwise>2003-09-16 18:15:26 +0000
commita8102603e7924077f0e9f9bf1cb713b2eb457f18 (patch)
treecf55f3ab6db1733793efdedec2f505dc4a9f950f /security/openssh+gssapi
parent8a1684cbef3d45535df08128ab4d48a63492bf47 (diff)
downloadpkgsrc-a8102603e7924077f0e9f9bf1cb713b2eb457f18.tar.gz
Apply security patch for OpenSSH-3.6.1p2 recently released by openssh team.
PKGREVISION bump, and BROKEN= removed. While there, fix Solaris short pkg name.
Diffstat (limited to 'security/openssh+gssapi')
-rw-r--r--security/openssh+gssapi/Makefile7
-rw-r--r--security/openssh+gssapi/distinfo3
-rw-r--r--security/openssh+gssapi/patches/patch-ai28
3 files changed, 33 insertions, 5 deletions
diff --git a/security/openssh+gssapi/Makefile b/security/openssh+gssapi/Makefile
index e2ad315aa7a..fbe7d7e1590 100644
--- a/security/openssh+gssapi/Makefile
+++ b/security/openssh+gssapi/Makefile
@@ -1,14 +1,13 @@
-# $NetBSD: Makefile,v 1.7 2003/09/16 14:05:47 jwise Exp $
+# $NetBSD: Makefile,v 1.8 2003/09/16 18:15:26 jwise Exp $
# NOTE: This package is modeled on ../openssh, but does not share
# files with it as that package may update faster than the gssapi
# patches do.
-BROKEN= OpenSSH 3.6.1p2 contains a buffer overflow, and updated version of patch is not yet available.
-
DISTNAME= openssh-3.6.1p2
PKGNAME= openssh+gssapi-3.6.1.2.20030430
-SVR4_PKGNAME= ossh
+PKGREVISION= 1
+SVR4_PKGNAME= osshgss
CATEGORIES= security
MASTER_SITES= ftp://ftp7.usa.openbsd.org/pub/os/OpenBSD/OpenSSH/portable/ \
ftp://ftp.stealth.net/pub/mirrors/ftp.openssh.com/pub/OpenBSD/OpenSSH/portable/ \
diff --git a/security/openssh+gssapi/distinfo b/security/openssh+gssapi/distinfo
index 897244dfa7b..0b17a65dce8 100644
--- a/security/openssh+gssapi/distinfo
+++ b/security/openssh+gssapi/distinfo
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.1.1.1 2003/07/24 21:01:23 jwise Exp $
+$NetBSD: distinfo,v 1.2 2003/09/16 18:15:27 jwise Exp $
SHA1 (openssh-3.6.1p2.tar.gz) = dafe5b6ee2c8ced12c2ee8961530b4e51c2f0bcf
Size (openssh-3.6.1p2.tar.gz) = 879629 bytes
@@ -7,3 +7,4 @@ Size (openssh-3.6.1p2-gssapi-20030430.diff) = 121077 bytes
SHA1 (patch-aa) = 20abe6938aba07ab7b6c7eab5d24a303f0cd2298
SHA1 (patch-ab) = 1069fe256b7925fcf404781ef14e5c492f52c21e
SHA1 (patch-ah) = 9913c868bde5d318915b1dee2c05dcf454a0f506
+SHA1 (patch-ai) = 863ddd5f85a8b436912605314cc2f7b8bfde5ec4
diff --git a/security/openssh+gssapi/patches/patch-ai b/security/openssh+gssapi/patches/patch-ai
new file mode 100644
index 00000000000..b1a87e07ffb
--- /dev/null
+++ b/security/openssh+gssapi/patches/patch-ai
@@ -0,0 +1,28 @@
+--- buffer.c.orig 2003-09-16 13:45:48.000000000 -0400
++++ buffer.c 2003-09-16 13:50:49.000000000 -0400
+@@ -69,6 +69,7 @@
+ void *
+ buffer_append_space(Buffer *buffer, u_int len)
+ {
++ u_int newlen;
+ void *p;
+
+ if (len > 0x100000)
+@@ -98,11 +99,13 @@
+ goto restart;
+ }
+ /* Increase the size of the buffer and retry. */
+- buffer->alloc += len + 32768;
+- if (buffer->alloc > 0xa00000)
++
++ newlen = buffer->alloc + len + 32768;
++ if (newlen > 0xa00000)
+ fatal("buffer_append_space: alloc %u not supported",
+- buffer->alloc);
+- buffer->buf = xrealloc(buffer->buf, buffer->alloc);
++ newlen);
++ buffer->buf = xrealloc(buffer->buf, newlen);
++ buffer->alloc = newlen;
+ goto restart;
+ /* NOTREACHED */
+ }