mirror of
https://git.FreeBSD.org/ports.git
synced 2024-10-21 20:38:45 +00:00
Fix a potential security problem on Linux/glibc whose getpass(3) apparently
fails with very long passwords leading to a segfault. It may be exploitable. FreeBSD is *not* vulnerable. No thanks to: the jerk who posted on bugtraq w/o mailing me beforehand.
This commit is contained in:
parent
205d9964ac
commit
9e154d0c21
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=102299
@ -6,7 +6,7 @@
|
||||
#
|
||||
|
||||
PORTNAME= calife
|
||||
PORTVERSION= 2.8.5
|
||||
PORTVERSION= 2.8.6
|
||||
CATEGORIES= security
|
||||
MASTER_SITES= ftp://postfix.eu.org/pub/calife/
|
||||
|
||||
@ -14,7 +14,7 @@ MAINTAINER= thomas@FreeBSD.org
|
||||
COMMENT= A lightweight alternative to sudo
|
||||
|
||||
GNU_CONFIGURE= yes
|
||||
CONFIGURE_ARGS= "--with-etcdir=$(PREFIX)/etc"
|
||||
CONFIGURE_ARGS= "--with-etcdir=${PREFIX}/etc"
|
||||
|
||||
MAN1= calife.1
|
||||
MAN5= calife.auth.5
|
||||
|
@ -1 +1,2 @@
|
||||
MD5 (calife-2.8.5.tar.gz) = 71f630c3d0ea0211951844af2088b27d
|
||||
MD5 (calife-2.8.6.tar.gz) = bc7380688a5d67a14101f498577d1f61
|
||||
SIZE (calife-2.8.6.tar.gz) = 95393
|
||||
|
@ -6,7 +6,7 @@
|
||||
#
|
||||
|
||||
PORTNAME= calife
|
||||
PORTVERSION= 2.8.5
|
||||
PORTVERSION= 2.8.6
|
||||
CATEGORIES= security
|
||||
MASTER_SITES= ftp://postfix.eu.org/pub/calife/
|
||||
|
||||
@ -14,7 +14,7 @@ MAINTAINER= thomas@FreeBSD.org
|
||||
COMMENT= A lightweight alternative to sudo
|
||||
|
||||
GNU_CONFIGURE= yes
|
||||
CONFIGURE_ARGS= "--with-etcdir=$(PREFIX)/etc"
|
||||
CONFIGURE_ARGS= "--with-etcdir=${PREFIX}/etc"
|
||||
|
||||
MAN1= calife.1
|
||||
MAN5= calife.auth.5
|
||||
|
@ -1 +1,2 @@
|
||||
MD5 (calife-2.8.5.tar.gz) = 71f630c3d0ea0211951844af2088b27d
|
||||
MD5 (calife-2.8.6.tar.gz) = bc7380688a5d67a14101f498577d1f61
|
||||
SIZE (calife-2.8.6.tar.gz) = 95393
|
||||
|
Loading…
Reference in New Issue
Block a user