Commit graph

5 commits

Author SHA1 Message Date
wiz
47036fe032 Upgrade lsh to version 2 (from lsh2) and remove lsh2.
No disagreement on pkgsrc-users.
2007-04-01 21:26:48 +00:00
drochner
da45d43410 pull in some patches from lsh2 to make it compile with gcc4 2007-02-22 17:38:33 +00:00
salo
12e8fb90e2 Backport fix for CVE-2006-0353 from lsh2:
"unix_random.c in lshd for lsh 2.0.1 leaks file descriptors related
 to the randomness generator, which allows local users to cause a denial
 of service by truncating the seed file, which prevents the server from
 starting, or obtain sensitive seed information that could be used to
 crack keys."

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0353
2006-04-05 23:59:33 +00:00
drochner
0271a0b85b Move the freshly update lsh-2.0.1 into a separate pkg and leave
security/lsh at 1.4.3.
lsh-2.0.1 has interoperability problems with openssh servers
(always gets "Invalid server signature" errors).
lsh-1.4.3 is not affected by CAN-2003-0826. Add a patch to address
CAN-2005-0814 and bump PKGREVISION.
2005-04-30 12:23:42 +00:00
drochner
94d670332b add a pkg for lsh-1.4.3, an alternative ssh2 client/server 2004-01-12 15:55:11 +00:00