summaryrefslogtreecommitdiff
path: root/security/lsh/patches
AgeCommit message (Collapse)AuthorFilesLines
2013-03-03Fix inline use.joerg2-0/+67
2011-12-16-explicitely disable kerberos support to avoid PLIST fluctuationsdrochner2-0/+31
(seen in bulk build) -fix obvious typo in asm code (fixes i386 build) -don't install nettle library to avoid conflict with pkgsrc/nettle bump PKGREV
2010-03-13Updte lsh to 2.0.4.obache2-8/+8
While here, * set LICENSE=gnu-gpl-v2 * marked as user-destdir installation ready * switch to use system argp * add missing zlib buildlink News for the 2.0.4 release Fixed x11 forwarding bug in the lsh client. News for the 2.0.3 release At startup, lshd now tries to close any spurious open file descriptors. New test case for lshd fd leakage. lshd --daemonic --no-syslog now sets up a proper daemonic environment, except that log messages are still sent to stderr. Improved testing of this feature.
2007-04-01Upgrade lsh to version 2 (from lsh2) and remove lsh2.wiz8-104/+2
No disagreement on pkgsrc-users.
2007-02-22pull in some patches from lsh2 to make it compile with gcc4drochner4-0/+69
2006-04-05Backport fix for CVE-2006-0353 from lsh2:salo1-0/+20
"unix_random.c in lshd for lsh 2.0.1 leaks file descriptors related to the randomness generator, which allows local users to cause a denial of service by truncating the seed file, which prevents the server from starting, or obtain sensitive seed information that could be used to crack keys." http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0353
2005-04-30Move the freshly update lsh-2.0.1 into a separate pkg and leavedrochner1-0/+13
security/lsh at 1.4.3. lsh-2.0.1 has interoperability problems with openssh servers (always gets "Invalid server signature" errors). lsh-1.4.3 is not affected by CAN-2003-0826. Add a patch to address CAN-2005-0814 and bump PKGREVISION.
2004-01-12add a pkg for lsh-1.4.3, an alternative ssh2 client/serverdrochner2-0/+28