head 1.3; access; symbols pkgsrc-2026Q1:1.3.0.116 pkgsrc-2026Q1-base:1.3 pkgsrc-2025Q4:1.3.0.114 pkgsrc-2025Q4-base:1.3 pkgsrc-2025Q3:1.3.0.112 pkgsrc-2025Q3-base:1.3 pkgsrc-2025Q2:1.3.0.110 pkgsrc-2025Q2-base:1.3 pkgsrc-2025Q1:1.3.0.108 pkgsrc-2025Q1-base:1.3 pkgsrc-2024Q4:1.3.0.106 pkgsrc-2024Q4-base:1.3 pkgsrc-2024Q3:1.3.0.104 pkgsrc-2024Q3-base:1.3 pkgsrc-2024Q2:1.3.0.102 pkgsrc-2024Q2-base:1.3 pkgsrc-2024Q1:1.3.0.100 pkgsrc-2024Q1-base:1.3 pkgsrc-2023Q4:1.3.0.98 pkgsrc-2023Q4-base:1.3 pkgsrc-2023Q3:1.3.0.96 pkgsrc-2023Q3-base:1.3 pkgsrc-2023Q2:1.3.0.94 pkgsrc-2023Q2-base:1.3 pkgsrc-2023Q1:1.3.0.92 pkgsrc-2023Q1-base:1.3 pkgsrc-2022Q4:1.3.0.90 pkgsrc-2022Q4-base:1.3 pkgsrc-2022Q3:1.3.0.88 pkgsrc-2022Q3-base:1.3 pkgsrc-2022Q2:1.3.0.86 pkgsrc-2022Q2-base:1.3 pkgsrc-2022Q1:1.3.0.84 pkgsrc-2022Q1-base:1.3 pkgsrc-2021Q4:1.3.0.82 pkgsrc-2021Q4-base:1.3 pkgsrc-2021Q3:1.3.0.80 pkgsrc-2021Q3-base:1.3 pkgsrc-2021Q2:1.3.0.78 pkgsrc-2021Q2-base:1.3 pkgsrc-2021Q1:1.3.0.76 pkgsrc-2021Q1-base:1.3 pkgsrc-2020Q4:1.3.0.74 pkgsrc-2020Q4-base:1.3 pkgsrc-2020Q3:1.3.0.72 pkgsrc-2020Q3-base:1.3 pkgsrc-2020Q2:1.3.0.68 pkgsrc-2020Q2-base:1.3 pkgsrc-2020Q1:1.3.0.48 pkgsrc-2020Q1-base:1.3 pkgsrc-2019Q4:1.3.0.70 pkgsrc-2019Q4-base:1.3 pkgsrc-2019Q3:1.3.0.66 pkgsrc-2019Q3-base:1.3 pkgsrc-2019Q2:1.3.0.64 pkgsrc-2019Q2-base:1.3 pkgsrc-2019Q1:1.3.0.62 pkgsrc-2019Q1-base:1.3 pkgsrc-2018Q4:1.3.0.60 pkgsrc-2018Q4-base:1.3 pkgsrc-2018Q3:1.3.0.58 pkgsrc-2018Q3-base:1.3 pkgsrc-2018Q2:1.3.0.56 pkgsrc-2018Q2-base:1.3 pkgsrc-2018Q1:1.3.0.54 pkgsrc-2018Q1-base:1.3 pkgsrc-2017Q4:1.3.0.52 pkgsrc-2017Q4-base:1.3 pkgsrc-2017Q3:1.3.0.50 pkgsrc-2017Q3-base:1.3 pkgsrc-2017Q2:1.3.0.46 pkgsrc-2017Q2-base:1.3 pkgsrc-2017Q1:1.3.0.44 pkgsrc-2017Q1-base:1.3 pkgsrc-2016Q4:1.3.0.42 pkgsrc-2016Q4-base:1.3 pkgsrc-2016Q3:1.3.0.40 pkgsrc-2016Q3-base:1.3 pkgsrc-2016Q2:1.3.0.38 pkgsrc-2016Q2-base:1.3 pkgsrc-2016Q1:1.3.0.36 pkgsrc-2016Q1-base:1.3 pkgsrc-2015Q4:1.3.0.34 pkgsrc-2015Q4-base:1.3 pkgsrc-2015Q3:1.3.0.32 pkgsrc-2015Q3-base:1.3 pkgsrc-2015Q2:1.3.0.30 pkgsrc-2015Q2-base:1.3 pkgsrc-2015Q1:1.3.0.28 pkgsrc-2015Q1-base:1.3 pkgsrc-2014Q4:1.3.0.26 pkgsrc-2014Q4-base:1.3 pkgsrc-2014Q3:1.3.0.24 pkgsrc-2014Q3-base:1.3 pkgsrc-2014Q2:1.3.0.22 pkgsrc-2014Q2-base:1.3 pkgsrc-2014Q1:1.3.0.20 pkgsrc-2014Q1-base:1.3 pkgsrc-2013Q4:1.3.0.18 pkgsrc-2013Q4-base:1.3 pkgsrc-2013Q3:1.3.0.16 pkgsrc-2013Q3-base:1.3 pkgsrc-2013Q2:1.3.0.14 pkgsrc-2013Q2-base:1.3 pkgsrc-2013Q1:1.3.0.12 pkgsrc-2013Q1-base:1.3 pkgsrc-2012Q4:1.3.0.10 pkgsrc-2012Q4-base:1.3 pkgsrc-2012Q3:1.3.0.8 pkgsrc-2012Q3-base:1.3 pkgsrc-2012Q2:1.3.0.6 pkgsrc-2012Q2-base:1.3 pkgsrc-2012Q1:1.3.0.4 pkgsrc-2012Q1-base:1.3 pkgsrc-2011Q4:1.3.0.2 pkgsrc-2011Q4-base:1.3 pkgsrc-2011Q2:1.2.0.22 pkgsrc-2011Q2-base:1.2 pkgsrc-2009Q4:1.2.0.20 pkgsrc-2009Q4-base:1.2 pkgsrc-2008Q4:1.2.0.18 pkgsrc-2008Q4-base:1.2 pkgsrc-2008Q3:1.2.0.16 pkgsrc-2008Q3-base:1.2 cube-native-xorg:1.2.0.14 cube-native-xorg-base:1.2 pkgsrc-2008Q2:1.2.0.12 pkgsrc-2008Q2-base:1.2 pkgsrc-2008Q1:1.2.0.10 pkgsrc-2008Q1-base:1.2 pkgsrc-2007Q4:1.2.0.8 pkgsrc-2007Q4-base:1.2 pkgsrc-2007Q3:1.2.0.6 pkgsrc-2007Q3-base:1.2 pkgsrc-2007Q2:1.2.0.4 pkgsrc-2007Q2-base:1.2 pkgsrc-2007Q1:1.2.0.2 pkgsrc-2007Q1-base:1.2 pkgsrc-2006Q4:1.1.0.8 pkgsrc-2006Q4-base:1.1 pkgsrc-2006Q3:1.1.0.6 pkgsrc-2006Q3-base:1.1 pkgsrc-2006Q2:1.1.0.4 pkgsrc-2006Q2-base:1.1 pkgsrc-2006Q1:1.1.0.2; locks; strict; comment @# @; 1.3 date 2011.12.16.12.54.41; author drochner; state Exp; branches; next 1.2; 1.2 date 2007.04.01.21.26.49; author wiz; state dead; branches; next 1.1; 1.1 date 2006.04.05.23.59.33; author salo; state Exp; branches 1.1.2.1; next ; 1.1.2.1 date 2006.04.05.23.59.33; author snj; state dead; branches; next 1.1.2.2; 1.1.2.2 date 2006.04.06.00.47.01; author snj; state Exp; branches; next ; desc @@ 1.3 log @-explicitely disable kerberos support to avoid PLIST fluctuations (seen in bulk build) -fix obvious typo in asm code (fixes i386 build) -don't install nettle library to avoid conflict with pkgsrc/nettle bump PKGREV @ text @$NetBSD$ don't install nettle files to avoid conflict with pkgsrc/nettle --- src/nettle/Makefile.in.orig 2007-09-05 18:38:24.000000000 +0000 +++ src/nettle/Makefile.in @@@@ -24,11 +24,13 @@@@ TARGETS = aesdata$(EXEEXT) desdata$(EXEE DOCTARGETS = nettle.info nettle.html nettle.pdf -all check install uninstall: +all check uninstall: $(MAKE) $@@-here set -e; for d in $(SUBDIRS); do \ echo "Making $@@ in $$d" ; (cd $$d && $(MAKE) $@@); done +install: + clean distclean mostlyclean maintainer-clean: set -e; for d in $(SUBDIRS); do \ echo "Making $@@ in $$d" ; (cd $$d && $(MAKE) $@@); done @ 1.2 log @Upgrade lsh to version 2 (from lsh2) and remove lsh2. No disagreement on pkgsrc-users. @ text @d1 1 a1 1 $NetBSD: patch-ad,v 1.1 2006/04/05 23:59:33 salo Exp $ d3 5 a7 5 --- src/unix_random.c.orig 2001-12-12 19:23:51.000000000 +0100 +++ src/unix_random.c 2006-04-06 01:45:14.000000000 +0200 @@@@ -258,6 +258,7 @@@@ if (self->device_fd < 0) return 0; d9 1 a9 3 + io_set_close_on_exec(self->device_fd); self->device_last_read = now; } d11 5 a15 3 @@@@ -382,6 +383,7 @@@@ return NULL; } d17 5 a21 4 + io_set_close_on_exec(self->seed_file_fd); trace("random_init, reading seed file...\n"); if (!read_initial_seed_file(&self->yarrow, self->seed_file_fd)) @ 1.1 log @Backport fix for CVE-2006-0353 from lsh2: "unix_random.c in lshd for lsh 2.0.1 leaks file descriptors related to the randomness generator, which allows local users to cause a denial of service by truncating the seed file, which prevents the server from starting, or obtain sensitive seed information that could be used to crack keys." http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0353 @ text @d1 1 a1 1 $NetBSD$ @ 1.1.2.1 log @file patch-ad was added on branch pkgsrc-2006Q1 on 2006-04-05 23:59:33 +0000 @ text @d1 20 @ 1.1.2.2 log @Pullup ticket 1329 - requested by salo security fix for lsh Revisions pulled up: - pkgsrc/security/lsh/Makefile 1.13 - pkgsrc/security/lsh/distinfo 1.5 - pkgsrc/security/lsh/patches/patch-ad 1.1 Module Name: pkgsrc Committed By: salo Date: Wed Apr 5 23:59:33 UTC 2006 Modified Files: pkgsrc/security/lsh: Makefile distinfo Added Files: pkgsrc/security/lsh/patches: patch-ad Log Message: Backport fix for CVE-2006-0353 from lsh2: "unix_random.c in lshd for lsh 2.0.1 leaks file descriptors related to the randomness generator, which allows local users to cause a denial of service by truncating the seed file, which prevents the server from starting, or obtain sensitive seed information that could be used to crack keys." @ text @a0 20 $NetBSD: patch-ad,v 1.1.2.1 2006/04/06 00:47:01 snj Exp $ --- src/unix_random.c.orig 2001-12-12 19:23:51.000000000 +0100 +++ src/unix_random.c 2006-04-06 01:45:14.000000000 +0200 @@@@ -258,6 +258,7 @@@@ if (self->device_fd < 0) return 0; + io_set_close_on_exec(self->device_fd); self->device_last_read = now; } @@@@ -382,6 +383,7 @@@@ return NULL; } + io_set_close_on_exec(self->seed_file_fd); trace("random_init, reading seed file...\n"); if (!read_initial_seed_file(&self->yarrow, self->seed_file_fd)) @