openbsd-ports/mail/fetchmail/patches/patch-configure
bernd 60d27b1449 Security update to fetchmail-6.3.6:
A password disclosure vulnerability (CVE-2006-5867, fetchmail's using unsafe
logins or omitting TLS) and a denial of service vulnerability (CVE-2006-5974,
fetchmail crashes, dereferencing the null page, when rejecting a message sent
to an MDA).

Fetchmail 6.3.6 also fixes several regressions and long-standing bugs.

Details:
https://lists.berlios.de/pipermail/fetchmail-announce/2007-January/000042.html

tests & ok jasper@, simon@
2007-01-09 10:35:42 +00:00

46 lines
1.4 KiB
Plaintext

$OpenBSD: patch-configure,v 1.11 2007/01/09 10:35:42 bernd Exp $
--- configure.orig Sun Jan 7 11:34:15 2007
+++ configure Sun Jan 7 11:37:38 2007
@@ -8530,7 +8530,7 @@ _ACEOF
- INTLLIBS="$LIBINTL"
+ INTLLIBS="$LTLIBINTL"
@@ -13245,7 +13245,7 @@ cat >>confdefs.h <<\_ACEOF
_ACEOF
CEFLAGS="$CEFLAGS -I/usr/include/kerberosV"
- LIBS="$LIBS -lasn1 -lkrb5 -lcom_err -lkafs"
+ LIBS="$LIBS -lkrb5"
elif krb5-config 2> /dev/null >/dev/null ; then
krb5_prefix=`krb5-config --prefix krb5`
{ echo "$as_me:$LINENO: result: krb5-config points to kerberosV under $krb5_prefix" >&5
@@ -16956,8 +16956,8 @@ pythondir!$pythondir$ac_delim
pkgpythondir!$pkgpythondir$ac_delim
pyexecdir!$pyexecdir$ac_delim
pkgpyexecdir!$pkgpyexecdir$ac_delim
-HAVE_PYTHON_TRUE!$HAVE_PYTHON_TRUE$ac_delim
-HAVE_PYTHON_FALSE!$HAVE_PYTHON_FALSE$ac_delim
+HAVE_PYTHON_TRUE!#$ac_delim
+HAVE_PYTHON_FALSE!#$ac_delim
CC!$CC$ac_delim
CFLAGS!$CFLAGS$ac_delim
LDFLAGS!$LDFLAGS$ac_delim
@@ -17031,10 +17031,10 @@ GMSGFMT!$GMSGFMT$ac_delim
XGETTEXT!$XGETTEXT$ac_delim
MSGMERGE!$MSGMERGE$ac_delim
INTL_MACOSX_LIBS!$INTL_MACOSX_LIBS$ac_delim
-LIBICONV!$LIBICONV$ac_delim
+LIBICONV!$LTLIBICONV$ac_delim
LTLIBICONV!$LTLIBICONV$ac_delim
INTLLIBS!$INTLLIBS$ac_delim
-LIBINTL!$LIBINTL$ac_delim
+LIBINTL!$LTLIBINTL$ac_delim
LTLIBINTL!$LTLIBINTL$ac_delim
POSUB!$POSUB$ac_delim
LIBOBJS!$LIBOBJS$ac_delim