upgrade to 3.4p1 (openssh-3.4.0.1).
20020626 - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM - (bal) OpenBSD CVS Sync - markus@cvs.openbsd.org 2002/06/23 21:34:07 [channels.c] tcode is u_int - markus@cvs.openbsd.org 2002/06/24 13:12:23 [ssh-agent.1] the socket name contains ssh-agent's ppid; via mpech@ from form@ - markus@cvs.openbsd.org 2002/06/24 14:33:27 [channels.c channels.h clientloop.c serverloop.c] move channel counter to u_int - markus@cvs.openbsd.org 2002/06/24 14:55:38 [authfile.c kex.c ssh-agent.c] cat to (void) when output from buffer_get_X is ignored - itojun@cvs.openbsd.org 2002/06/24 15:49:22 [msg.c] printf type pedant - deraadt@cvs.openbsd.org 2002/06/24 17:57:20 [sftp-server.c sshpty.c] explicit (u_int) for uid and gid - markus@cvs.openbsd.org 2002/06/25 16:22:42 [authfd.c] unnecessary cast - markus@cvs.openbsd.org 2002/06/25 18:51:04 [sshd.c] lightweight do_setusercontext after chroot() - (bal) Updated AIX package build. Patch by dtucker@zip.com.au - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8 - (bal) added back in error check for mmap(). I screwed up, Pointed out by stevesk@ - (tim) [README.privsep] UnixWare tip no longer needed. - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP, but it all damned lies. - (stevesk) [README.privsep] more for sshd pseudo-account. - (tim) [contrib/caldera/openssh.spec] add support for privsep - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@ - (djm) OpenBSD CVS Sync - markus@cvs.openbsd.org 2002/06/26 08:53:12 [bufaux.c] limit size of BNs to 8KB; ok provos/deraadt - markus@cvs.openbsd.org 2002/06/26 08:54:18 [buffer.c] limit append to 1MB and buffers to 10MB - markus@cvs.openbsd.org 2002/06/26 08:55:02 [channels.c] limit # of channels to 10000 - markus@cvs.openbsd.org 2002/06/26 08:58:26 [session.c] limit # of env vars to 1000; ok deraadt/djm - deraadt@cvs.openbsd.org 2002/06/26 13:20:57 [monitor.c] be careful in mm_zalloc - deraadt@cvs.openbsd.org 2002/06/26 13:49:26 [session.c] disclose less information from environment files; based on input from djm, and dschultz@uclink.Berkeley.EDU - markus@cvs.openbsd.org 2002/06/26 13:55:37 [auth2-chall.c] make sure # of response matches # of queries, fixes int overflow; from ISS - markus@cvs.openbsd.org 2002/06/26 13:56:27 [version.h] 3.4 - (djm) Require krb5 devel for RPM build w/ KrbV - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai <nalin@redhat.com> - (djm) Update spec files for release - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS - (djm) Release 3.4p1 20020625 - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh - (stevesk) [README.privsep] minor updates - (djm) Create privsep directory and warn if privsep user is missing during make install - (bal) Started list of PrivSep issues in TODO - (bal) if mmap() is substandard, don't allow compression on server side. Post 'event' we will add more options. - (tim) [contrib/caldera/openssh.spec] Sync with Caldera - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by dtucker@zip.com.au - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus for Cygwin, Cray, & SCO 20020624 - OpenBSD CVS Sync - deraadt@cvs.openbsd.org 2002/06/23 03:25:50 [tildexpand.c] KNF - deraadt@cvs.openbsd.org 2002/06/23 03:26:19 [cipher.c key.c] KNF - deraadt@cvs.openbsd.org 2002/06/23 03:30:58 [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c sshpty.c] various KNF and %d for unsigned - deraadt@cvs.openbsd.org 2002/06/23 09:30:14 [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c sftp.c] bunch of u_int vs int stuff - deraadt@cvs.openbsd.org 2002/06/23 09:39:55 [ssh-keygen.c] u_int stuff - deraadt@cvs.openbsd.org 2002/06/23 09:46:51 [bufaux.c servconf.c] minor KNF. things the fingers do while you read - deraadt@cvs.openbsd.org 2002/06/23 10:29:52 [ssh-agent.c sshd.c] some minor KNF and %u - deraadt@cvs.openbsd.org 2002/06/23 20:39:45 [session.c] compression_level is u_int - deraadt@cvs.openbsd.org 2002/06/23 21:06:13 [sshpty.c] KNF - deraadt@cvs.openbsd.org 2002/06/23 21:06:41 [channels.c channels.h session.c session.h] display, screen, row, col, xpixel, ypixel are u_int; markus ok - deraadt@cvs.openbsd.org 2002/06/23 21:10:02 [packet.c] packet_get_int() returns unsigned for reason & seqnr - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col, xpixel are u_int. 20020623 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX. - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset. - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au - OpenBSD CVS Sync - stevesk@cvs.openbsd.org 2002/06/22 02:00:29 [ssh.h] correct comment - stevesk@cvs.openbsd.org 2002/06/22 02:40:23 [ssh.1] section 5 not 4 for ssh_config - naddy@cvs.openbsd.org 2002/06/22 11:51:39 [ssh.1] typo - stevesk@cvs.openbsd.org 2002/06/22 16:32:54 [sshd.8] add /var/empty in FILES section - stevesk@cvs.openbsd.org 2002/06/22 16:40:19 [sshd.c] check /var/empty owner mode; ok provos@ - stevesk@cvs.openbsd.org 2002/06/22 16:41:57 [scp.1] typo - stevesk@cvs.openbsd.org 2002/06/22 16:45:29 [ssh-agent.1 sshd.8 sshd_config.5] use process ID vs. pid/PID/process identifier - stevesk@cvs.openbsd.org 2002/06/22 20:05:27 [sshd.c] don't call setsid() if debugging or run from inetd; no "Operation not permitted" errors now; ok millert@ markus@ - stevesk@cvs.openbsd.org 2002/06/22 23:09:51 [monitor.c] save auth method before monitor_reset_key_state(); bugzilla bug #284; ok provos@
This commit is contained in:
parent
e44396437f
commit
da273e2dd6
4 changed files with 6 additions and 51 deletions
|
@ -1,7 +1,7 @@
|
|||
# $NetBSD: Makefile,v 1.77 2002/06/26 07:44:38 itojun Exp $
|
||||
# $NetBSD: Makefile,v 1.78 2002/06/26 14:33:29 itojun Exp $
|
||||
|
||||
DISTNAME= openssh-3.3p1
|
||||
PKGNAME= openssh-3.3.0.1
|
||||
DISTNAME= openssh-3.4p1
|
||||
PKGNAME= openssh-3.4.0.1
|
||||
SVR4_PKGNAME= ossh
|
||||
CATEGORIES= security
|
||||
MASTER_SITES= ftp://gd.tuwien.ac.at/opsys/OpenBSD/OpenSSH/portable/ \
|
||||
|
|
|
@ -1,9 +1,7 @@
|
|||
$NetBSD: distinfo,v 1.19 2002/06/25 18:10:50 toshii Exp $
|
||||
$NetBSD: distinfo,v 1.20 2002/06/26 14:33:30 itojun Exp $
|
||||
|
||||
SHA1 (openssh-3.3p1.tar.gz) = 386212e32297acec0f0f2e84cca457be61e4ee53
|
||||
Size (openssh-3.3p1.tar.gz) = 831189 bytes
|
||||
SHA1 (openssh-3.4p1.tar.gz) = 8841326bf79b2c8a88d7a6e371739ec21cee73bc
|
||||
Size (openssh-3.4p1.tar.gz) = 837668 bytes
|
||||
SHA1 (patch-aa) = 0287823fc0c5953996891576b4d3571e08618b3d
|
||||
SHA1 (patch-ab) = 8a7c9c0802a5089ef25ae91a520772a09a2b5000
|
||||
SHA1 (patch-ac) = b61f7eacf8ddf36a4bd1e15eef7b16be6f3aaf5b
|
||||
SHA1 (patch-ad) = a43dd3929ab48c5c02070fbbabb3b72d19f74a8f
|
||||
SHA1 (patch-ah) = 9913c868bde5d318915b1dee2c05dcf454a0f506
|
||||
|
|
|
@ -1,30 +0,0 @@
|
|||
$NetBSD: patch-ac,v 1.7 2002/06/25 18:09:45 toshii Exp $
|
||||
|
||||
--- monitor_mm.c.orig Fri Jun 7 10:57:25 2002
|
||||
+++ monitor_mm.c
|
||||
@@ -71,6 +71,9 @@
|
||||
{
|
||||
void *address;
|
||||
struct mm_master *mm;
|
||||
+#if defined(HAVE_MMAP) && !defined(MAP_ANON)
|
||||
+ int fd;
|
||||
+#endif
|
||||
|
||||
if (mmalloc == NULL)
|
||||
mm = xmalloc(sizeof(struct mm_master));
|
||||
@@ -87,6 +90,15 @@
|
||||
#if defined(HAVE_MMAP) && defined(MAP_ANON)
|
||||
address = mmap(NULL, size, PROT_WRITE|PROT_READ, MAP_ANON|MAP_SHARED,
|
||||
-1, 0);
|
||||
+ if (address == MAP_FAILED)
|
||||
+ fatal("mmap(%lu): %s", (u_long)size, strerror(errno));
|
||||
+#elif defined(HAVE_MMAP) && !defined(MAP_ANON)
|
||||
+ fd = open("/dev/zero", O_RDWR);
|
||||
+ if (fd < 0)
|
||||
+ fatal("open(/dev/zero): %s", strerror(errno));
|
||||
+ address = mmap(NULL, size, PROT_WRITE|PROT_READ, MAP_SHARED,
|
||||
+ fd, 0);
|
||||
+ close(fd);
|
||||
if (address == MAP_FAILED)
|
||||
fatal("mmap(%lu): %s", (u_long)size, strerror(errno));
|
||||
#else
|
|
@ -1,13 +0,0 @@
|
|||
$NetBSD: patch-ad,v 1.4 2002/06/25 18:09:46 toshii Exp $
|
||||
|
||||
--- servconf.c.orig Fri Jun 21 15:20:44 2002
|
||||
+++ servconf.c
|
||||
@@ -257,7 +257,7 @@
|
||||
if (use_privsep == -1)
|
||||
use_privsep = 1;
|
||||
|
||||
-#if !defined(HAVE_MMAP) || !defined(MAP_ANON)
|
||||
+#if !defined(HAVE_MMAP)
|
||||
if (use_privsep && options->compression == 1) {
|
||||
error("This platform does not support both privilege "
|
||||
"separation and compression");
|
Loading…
Reference in a new issue