head 1.10; access; symbols pkgsrc-2013Q2:1.10.0.10 pkgsrc-2013Q2-base:1.10 pkgsrc-2012Q4:1.10.0.8 pkgsrc-2012Q4-base:1.10 pkgsrc-2011Q4:1.10.0.6 pkgsrc-2011Q4-base:1.10 pkgsrc-2011Q2:1.10.0.4 pkgsrc-2011Q2-base:1.10 pkgsrc-2009Q4:1.10.0.2 pkgsrc-2009Q4-base:1.10 pkgsrc-2009Q1:1.9.0.22 pkgsrc-2009Q1-base:1.9 pkgsrc-2008Q4:1.9.0.20 pkgsrc-2008Q4-base:1.9 pkgsrc-2008Q3:1.9.0.18 pkgsrc-2008Q3-base:1.9 cube-native-xorg:1.9.0.16 cube-native-xorg-base:1.9 pkgsrc-2008Q2:1.9.0.14 pkgsrc-2008Q2-base:1.9 cwrapper:1.9.0.12 pkgsrc-2008Q1:1.9.0.10 pkgsrc-2008Q1-base:1.9 pkgsrc-2007Q4:1.9.0.8 pkgsrc-2007Q4-base:1.9 pkgsrc-2007Q3:1.9.0.6 pkgsrc-2007Q3-base:1.9 pkgsrc-2007Q2:1.9.0.4 pkgsrc-2007Q2-base:1.9 pkgsrc-2007Q1:1.9.0.2 pkgsrc-2007Q1-base:1.9 pkgsrc-2006Q4:1.8.0.4 pkgsrc-2006Q4-base:1.8 pkgsrc-2006Q3:1.8.0.2 pkgsrc-2006Q3-base:1.8 pkgsrc-2006Q2:1.7.0.2 pkgsrc-2006Q2-base:1.7 pkgsrc-2006Q1:1.5.0.4 pkgsrc-2006Q1-base:1.5 pkgsrc-2005Q4:1.5.0.2 pkgsrc-2005Q4-base:1.5 pkgsrc-2005Q3:1.4.0.8 pkgsrc-2005Q3-base:1.4 pkgsrc-2005Q2:1.4.0.6 pkgsrc-2005Q2-base:1.4 pkgsrc-2005Q1:1.4.0.4 pkgsrc-2005Q1-base:1.4 pkgsrc-2004Q4:1.4.0.2 pkgsrc-2004Q4-base:1.4 pkgsrc-2004Q3:1.3.0.8 pkgsrc-2004Q3-base:1.3 pkgsrc-2004Q2:1.3.0.6 pkgsrc-2004Q2-base:1.3 pkgsrc-2004Q1:1.3.0.4 pkgsrc-2004Q1-base:1.3 pkgsrc-2003Q4:1.3.0.2 pkgsrc-2003Q4-base:1.3 buildlink2-base:1.3; locks; strict; comment @# @; 1.10 date 2009.05.23.09.04.01; author tron; state dead; branches; next 1.9; 1.9 date 2007.01.06.22.45.49; author wiz; state Exp; branches 1.9.22.1; next 1.8; 1.8 date 2006.08.24.22.02.02; author salo; state Exp; branches; next 1.7; 1.7 date 2006.05.29.13.51.20; author tron; state Exp; branches 1.7.2.1; next 1.6; 1.6 date 2006.05.29.13.48.53; author tron; state Exp; branches; next 1.5; 1.5 date 2005.10.03.15.00.12; author wiz; state Exp; branches 1.5.4.1; next 1.4; 1.4 date 2004.12.17.22.29.06; author wiz; state Exp; branches; next 1.3; 1.3 date 2000.05.19.11.03.40; author wiz; state dead; branches; next 1.2; 1.2 date 2000.05.14.00.18.56; author hubertf; state Exp; branches; next 1.1; 1.1 date 2000.05.04.01.33.07; author hubertf; state Exp; branches; next ; 1.9.22.1 date 2009.06.04.08.56.16; author spz; state dead; branches; next ; 1.7.2.1 date 2006.08.25.11.05.02; author ghen; state Exp; branches; next ; 1.5.4.1 date 2006.05.30.20.18.31; author ghen; state Exp; branches; next ; desc @@ 1.10 log @Update "cscope" package to version 15.7a. This version fixes the security vulnerability reported in CVE-2009-0148. @ text @$NetBSD: patch-af,v 1.9 2007/01/06 22:45:49 wiz Exp $ --- src/main.c.orig 2006-09-30 10:13:00.000000000 +0200 +++ src/main.c @@@@ -389,12 +389,12 @@@@ cscope: Could not create private temp di * used instead of failing to open a non-existant database in * the home directory */ - sprintf(path, "%s/%s", home, reffile); + snprintf(path, sizeof(path), "%s/%s", home, reffile); if (isuptodate == NO || access(path, READ) == 0) { reffile = my_strdup(path); - sprintf(path, "%s/%s", home, invname); + snprintf(path, sizeof(path), "%s/%s", home, invname); invname = my_strdup(path); - sprintf(path, "%s/%s", home, invpost); + snprintf(path, sizeof(path), "%s/%s", home, invpost); invpost = my_strdup(path); } } @ 1.9 log @Update to 15.6: Some security problems have been addressed, and overall stability has improved. There are no new features. (The security problems were already fixed in pkgsrc.) @ text @d1 1 a1 1 $NetBSD: patch-af,v 1.8 2006/08/24 22:02:02 salo Exp $ @ 1.9.22.1 log @Pullup ticket 2780 - requested by tron Security update Revisions pulled up: - pkgsrc/devel/cscope/Makefile 1.50 - pkgsrc/devel/cscope/distinfo 1.19 Files deleted: - pkgsrc/devel/cscope/patches/patch-ae - pkgsrc/devel/cscope/patches/patch-af - pkgsrc/devel/cscope/patches/patch-ag - pkgsrc/devel/cscope/patches/patch-ah - pkgsrc/devel/cscope/patches/patch-ai - pkgsrc/devel/cscope/patches/patch-aj - pkgsrc/devel/cscope/patches/patch-ak - pkgsrc/devel/cscope/patches/patch-al - pkgsrc/devel/cscope/patches/patch-am - pkgsrc/devel/cscope/patches/patch-an - pkgsrc/devel/cscope/patches/patch-ao - pkgsrc/devel/cscope/patches/patch-ap Module Name: pkgsrc Committed By: tron Date: Sat May 23 09:04:02 UTC 2009 Modified Files: pkgsrc/devel/cscope: Makefile distinfo Removed Files: pkgsrc/devel/cscope/patches: patch-ae patch-af patch-ag patch-ah patch-ai patch-aj patch-ak patch-al patch-am patch-an patch-ao patch-ap Log Message: Update "cscope" package to version 15.7a. This version fixes the security vulnerability reported in CVE-2009-0148. To generate a diff of this commit: cvs rdiff -u -r1.49 -r1.50 pkgsrc/devel/cscope/Makefile cvs rdiff -u -r1.18 -r1.19 pkgsrc/devel/cscope/distinfo cvs rdiff -u -r1.10 -r0 pkgsrc/devel/cscope/patches/patch-ae cvs rdiff -u -r1.9 -r0 pkgsrc/devel/cscope/patches/patch-af cvs rdiff -u -r1.6 -r0 pkgsrc/devel/cscope/patches/patch-ag \ pkgsrc/devel/cscope/patches/patch-ai cvs rdiff -u -r1.7 -r0 pkgsrc/devel/cscope/patches/patch-ah cvs rdiff -u -r1.4 -r0 pkgsrc/devel/cscope/patches/patch-aj cvs rdiff -u -r1.3 -r0 pkgsrc/devel/cscope/patches/patch-ak \ pkgsrc/devel/cscope/patches/patch-al pkgsrc/devel/cscope/patches/patch-ap cvs rdiff -u -r1.2 -r0 pkgsrc/devel/cscope/patches/patch-am \ pkgsrc/devel/cscope/patches/patch-an pkgsrc/devel/cscope/patches/patch-ao @ text @d1 1 a1 1 $NetBSD: patch-af,v 1.9 2007/01/06 22:45:49 wiz Exp $ @ 1.8 log @Security fix for SA21601: "Will Drewry has reported some vulnerabilities in Cscope, which potentially can be exploited by malicious people to compromise a vulnerable system. 1) Various boundary errors within the parsing of file lists or the expansion of environment variables can be exploited to cause stack-based buffer overflows when parsing specially crafted "cscope.lists" files or directories. 2) A boundary error within the parsing of command line arguments can be exploited to cause a stack-based buffer overflow when supplying an overly long "reffile" argument. Successful exploitation may allow execution of arbitrary code." Patches adapted from cscope CVS. Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD$ d3 16 a18 24 --- src/main.c.orig 2003-08-14 16:36:18.000000000 +0200 +++ src/main.c 2006-08-24 23:58:29.000000000 +0200 @@@@ -103,7 +103,7 @@@@ char temp1[PATHLEN + 1]; /* temporary fi char temp2[PATHLEN + 1]; /* temporary file name */ long totalterms; /* total inverted index terms */ BOOL trun_syms; /* truncate symbols to 8 characters */ -char tempstring[8192]; /* use this as a buffer, instead of 'yytext', +char tempstring[TEMPSTRING_LEN + 1]; /* use this as a buffer, instead of 'yytext', * which had better be left alone */ char *tmpdir; /* temporary directory */ @@@@ -247,6 +247,11 @@@@ main(int argc, char **argv) switch (c) { case 'f': /* alternate cross-reference file */ reffile = s; + if (strlen(reffile) > sizeof(path) - 1) { + posterr("\ +cscope: reffile too long, cannot be > %d characters\n", sizeof(path) - 1); + /* NOTREACHED */ + } (void) strcpy(path, s); #ifdef SHORT_NAMES_ONLY /* System V has a 14 character limit */ @@@@ -330,9 +335,31 @@@@ lastarg: d20 1 a20 81 /* create the temporary file names */ - pid = getpid(); - (void) sprintf(temp1, "%s/cscope%d.1", tmpdir, pid); - (void) sprintf(temp2, "%s/cscope%d.2", tmpdir, pid); + do { + char *tempfile = tempnam(tmpdir, "cscope1"); + if (!tempfile) { + fputs ("Can't create tempfile\n", stderr); + exit (1); + } + if (strlen(tempfile) >= sizeof(temp1)) { + fputs ("TMPDIR path is too long\n", stderr); + exit(1); + } + strncpy (temp1, tempfile, sizeof (temp1)); + } while (open (temp1, O_CREAT|O_EXCL|O_WRONLY, 0600) < 0); + do { + char *tempfile = tempnam(tmpdir, "cscope2"); + if (!tempfile) { + fputs ("Can't create tempfile\n", stderr); + exit (1); + } + if (strlen(tempfile) >= sizeof(temp2)) { + fputs ("TMPDIR path is too long\n", stderr); + exit(1); + } + strncpy (temp2, tempfile, sizeof (temp2)); + } while (open (temp2, O_CREAT|O_EXCL|O_WRONLY, 0600) < 0); + /* if running in the foreground */ if (signal(SIGINT, SIG_IGN) != SIG_IGN) { @@@@ -352,12 +379,12 @@@@ lastarg: * used instead of failing to open a non-existant database in * the home directory */ - (void) sprintf(path, "%s/%s", home, reffile); + (void) snprintf(path, sizeof(path), "%s/%s", home, reffile); if (isuptodate == NO || access(path, READ) == 0) { reffile = stralloc(path); - (void) sprintf(path, "%s/%s", home, invname); + (void) snprintf(path, sizeof(path), "%s/%s", home, invname); invname = stralloc(path); - (void) sprintf(path, "%s/%s", home, invpost); + (void) snprintf(path, sizeof(path), "%s/%s", home, invpost); invpost = stralloc(path); } } @@@@ -467,11 +494,11 @@@@ lastarg: || (names = vpfopen(NAMEFILE, "r")) != NULL) { /* read any -p option from it */ - while (fscanf(names, "%s", path) == 1 && *path == '-') { + while (fgets(path, sizeof(path), names) != NULL && *path == '-') { i = path[1]; s = path + 2; /* for "-Ipath" */ if (*s == '\0') { /* if "-I path" */ - (void) fscanf(names, "%s", path); + (void) fgets(path, sizeof(path), names); s = path; } switch (i) { @@@@ -488,7 +515,7 @@@@ lastarg: } else { for (i = 0; i < nsrcfiles; ++i) { - if (fscanf(oldrefs, "%s", path) != 1) { + if (!fgets(path, sizeof(path), oldrefs) ) { posterr("cscope: cannot read source file name from file %s\n", reffile); myexit(1); } @@@@ -692,7 +719,7 @@@@ cannotwrite(char *file) #else char *msg = mymalloc(50+strlen(file)); - (void) sprintf(msg, "Removed file %s because write failed", file); + (void) snprintf(msg, sizeof(msg), "Removed file %s because write failed", file); #endif myperror(msg); /* display the reason */ @ 1.7 log @Add missing RCS Ids. @ text @d3 24 a26 3 --- src/main.c.orig 2003-08-14 15:36:18.000000000 +0100 +++ src/main.c 2006-05-29 14:34:26.000000000 +0100 @@@@ -330,9 +330,31 @@@@ d61 1 a61 1 @@@@ -352,12 +374,12 @@@@ d77 24 a100 1 @@@@ -692,7 +714,7 @@@@ @ 1.7.2.1 log @Pullup ticket 1808 - requested by salo security fix for cscope Revisions pulled up: - pkgsrc/devel/cscope/Makefile 1.45 - pkgsrc/devel/cscope/distinfo 1.15 - pkgsrc/devel/cscope/patches/patch-aa 1.11 - pkgsrc/devel/cscope/patches/patch-ae 1.9 - pkgsrc/devel/cscope/patches/patch-af 1.8 - pkgsrc/devel/cscope/patches/patch-ag 1.5 - pkgsrc/devel/cscope/patches/patch-ah 1.5 - pkgsrc/devel/cscope/patches/patch-ai 1.5 - pkgsrc/devel/cscope/patches/patch-aj 1.3 - pkgsrc/devel/cscope/patches/patch-ap 1. Module Name: pkgsrc Committed By: salo Date: Thu Aug 24 22:02:02 UTC 2006 Modified Files: pkgsrc/devel/cscope: Makefile distinfo pkgsrc/devel/cscope/patches: patch-aa patch-ae patch-af patch-ag patch-ah patch-ai patch-aj Added Files: pkgsrc/devel/cscope/patches: patch-ap Log Message: Security fix for SA21601: "Will Drewry has reported some vulnerabilities in Cscope, which potentially can be exploited by malicious people to compromise a vulnerable system. 1) Various boundary errors within the parsing of file lists or the expansion of environment variables can be exploited to cause stack-based buffer overflows when parsing specially crafted "cscope.lists" files or directories. 2) A boundary error within the parsing of command line arguments can be exploited to cause a stack-based buffer overflow when supplying an overly long "reffile" argument. Successful exploitation may allow execution of arbitrary code." Patches adapted from cscope CVS. Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD: patch-af,v 1.8 2006/08/24 22:02:02 salo Exp $ d3 3 a5 24 --- src/main.c.orig 2003-08-14 16:36:18.000000000 +0200 +++ src/main.c 2006-08-24 23:58:29.000000000 +0200 @@@@ -103,7 +103,7 @@@@ char temp1[PATHLEN + 1]; /* temporary fi char temp2[PATHLEN + 1]; /* temporary file name */ long totalterms; /* total inverted index terms */ BOOL trun_syms; /* truncate symbols to 8 characters */ -char tempstring[8192]; /* use this as a buffer, instead of 'yytext', +char tempstring[TEMPSTRING_LEN + 1]; /* use this as a buffer, instead of 'yytext', * which had better be left alone */ char *tmpdir; /* temporary directory */ @@@@ -247,6 +247,11 @@@@ main(int argc, char **argv) switch (c) { case 'f': /* alternate cross-reference file */ reffile = s; + if (strlen(reffile) > sizeof(path) - 1) { + posterr("\ +cscope: reffile too long, cannot be > %d characters\n", sizeof(path) - 1); + /* NOTREACHED */ + } (void) strcpy(path, s); #ifdef SHORT_NAMES_ONLY /* System V has a 14 character limit */ @@@@ -330,9 +335,31 @@@@ lastarg: d40 1 a40 1 @@@@ -352,12 +379,12 @@@@ lastarg: d56 1 a56 24 @@@@ -467,11 +494,11 @@@@ lastarg: || (names = vpfopen(NAMEFILE, "r")) != NULL) { /* read any -p option from it */ - while (fscanf(names, "%s", path) == 1 && *path == '-') { + while (fgets(path, sizeof(path), names) != NULL && *path == '-') { i = path[1]; s = path + 2; /* for "-Ipath" */ if (*s == '\0') { /* if "-I path" */ - (void) fscanf(names, "%s", path); + (void) fgets(path, sizeof(path), names); s = path; } switch (i) { @@@@ -488,7 +515,7 @@@@ lastarg: } else { for (i = 0; i < nsrcfiles; ++i) { - if (fscanf(oldrefs, "%s", path) != 1) { + if (!fgets(path, sizeof(path), oldrefs) ) { posterr("cscope: cannot read source file name from file %s\n", reffile); myexit(1); } @@@@ -692,7 +719,7 @@@@ cannotwrite(char *file) @ 1.6 log @Integrate Debian's fix for security whole reported in CVE-2004-2541. Bump package revision. @ text @d1 2 @ 1.5 log @Update to 15.5: (2003/08/14 - broeker) Cleaned up man page, INSTALL and TODO files. (2003/08/14 - broeker) Have configure check for . Bail out if none found. (2003/08/14 - broeker) New options --help and --version. (2003/06/12 - broeker) New option -v to output progress updates even in line mode. To be used by interface kscope. (2003/06/02 - broeker) Use the basename of files only to test for SCCS/RCS files in -R traversal. (2003/04/29 - broeker) Check that a src file is a regular file before trying to scan it. Change from S_IFDIR/S_IFREG bit tests to macros S_ISDIR/S_ISREG. (2003/03/05 - broeker) Remove '-y' option from pipe call to utility "sort". It's long since deprecated, and some modern versions will barf seeing it. (2003/03/02 - broeker) Don't restrict to 14 character filenames any longer. (2003/01/23 - broeker) Update to latest auto* tools. First step towards integration of GNOME GUI version. (2002/12/11 - broeker) Get rid of deprecated ={...} style actions in egrep.y. Use plain {...} instead. (2002/10/29 - broeker) Fix bug #588671: disprefs was still 0 if only 1 very long reference output shown by curses display. (2002/08/27 - broeker) Fix bug #600494: use mygetenv() for HOME, and provide a fall-back if it's not there. @ text @d1 3 a3 5 $NetBSD: patch-af,v 1.4 2004/12/17 22:29:06 wiz Exp $ --- src/main.c.orig 2003-08-14 16:36:18.000000000 +0200 +++ src/main.c @@@@ -330,9 +330,32 @@@@ lastarg: d10 25 a34 26 + do { + char *tempfile = tempnam(tmpdir, "cscope1"); + if (!tempfile) { + fprintf (stderr, "Can't create tempfile\n"); + exit(1); + } + if (strlen(tempfile) >= sizeof(temp1)) { + fprintf (stderr, "TMPDIR path is too long\n"); + exit(1); + } + strncpy (temp1, tempfile, sizeof (temp1)); + free (tempfile); + } while (open (temp1, O_CREAT|O_EXCL|O_WRONLY, S_IREAD|S_IWRITE) < 0); + do { + char *tempfile = tempnam(tmpdir, "cscope2"); + if (!tempfile) { + fprintf (stderr, "Can't create tempfile\n"); + exit(1); + } + if (strlen(tempfile) >= sizeof(temp2)) { + fprintf (stderr, "TMPDIR path is too long\n"); + exit(1); + } + strncpy (temp2, tempfile, sizeof (temp2)); + free (tempfile); + } while (open (temp2, O_CREAT|O_EXCL|O_WRONLY, S_IREAD|S_IWRITE) < 0); d38 25 @ 1.5.4.1 log @Pullup ticket 1675 - requested by tron security fix for cscope Revisions pulled up: - pkgsrc/devel/cscope/Makefile 1.44 - pkgsrc/devel/cscope/distinfo 1.13 - pkgsrc/devel/cscope/patches/patch-ae 1.7 - pkgsrc/devel/cscope/patches/patch-af 1.6 - pkgsrc/devel/cscope/patches/patch-ag 1.3 - pkgsrc/devel/cscope/patches/patch-ah 1.3 - pkgsrc/devel/cscope/patches/patch-ai 1.3 - pkgsrc/devel/cscope/patches/patch-aj 1.1 - pkgsrc/devel/cscope/patches/patch-ak 1.1 - pkgsrc/devel/cscope/patches/patch-al 1.1 - pkgsrc/devel/cscope/patches/patch-am 1.1 - pkgsrc/devel/cscope/patches/patch-an 1.1 - pkgsrc/devel/cscope/patches/patch-ao 1.1 Module Name: pkgsrc Committed By: tron Date: Mon May 29 13:48:53 UTC 2006 Modified Files: pkgsrc/devel/cscope: Makefile distinfo pkgsrc/devel/cscope/patches: patch-af Added Files: pkgsrc/devel/cscope/patches: patch-ae patch-ag patch-ah patch-ai patch-aj patch-ak patch-al patch-am patch-an patch-ao Log Message: Integrate Debian's fix for security whole reported in CVE-2004-2541. Bump package revision. @ text @d1 5 a5 3 --- src/main.c.orig 2003-08-14 15:36:18.000000000 +0100 +++ src/main.c 2006-05-29 14:34:26.000000000 +0100 @@@@ -330,9 +330,31 @@@@ d12 26 a37 25 + do { + char *tempfile = tempnam(tmpdir, "cscope1"); + if (!tempfile) { + fputs ("Can't create tempfile\n", stderr); + exit (1); + } + if (strlen(tempfile) >= sizeof(temp1)) { + fputs ("TMPDIR path is too long\n", stderr); + exit(1); + } + strncpy (temp1, tempfile, sizeof (temp1)); + } while (open (temp1, O_CREAT|O_EXCL|O_WRONLY, 0600) < 0); + do { + char *tempfile = tempnam(tmpdir, "cscope2"); + if (!tempfile) { + fputs ("Can't create tempfile\n", stderr); + exit (1); + } + if (strlen(tempfile) >= sizeof(temp2)) { + fputs ("TMPDIR path is too long\n", stderr); + exit(1); + } + strncpy (temp2, tempfile, sizeof (temp2)); + } while (open (temp2, O_CREAT|O_EXCL|O_WRONLY, 0600) < 0); + a40 25 @@@@ -352,12 +374,12 @@@@ * used instead of failing to open a non-existant database in * the home directory */ - (void) sprintf(path, "%s/%s", home, reffile); + (void) snprintf(path, sizeof(path), "%s/%s", home, reffile); if (isuptodate == NO || access(path, READ) == 0) { reffile = stralloc(path); - (void) sprintf(path, "%s/%s", home, invname); + (void) snprintf(path, sizeof(path), "%s/%s", home, invname); invname = stralloc(path); - (void) sprintf(path, "%s/%s", home, invpost); + (void) snprintf(path, sizeof(path), "%s/%s", home, invpost); invpost = stralloc(path); } } @@@@ -692,7 +714,7 @@@@ #else char *msg = mymalloc(50+strlen(file)); - (void) sprintf(msg, "Removed file %s because write failed", file); + (void) snprintf(msg, sizeof(msg), "Removed file %s because write failed", file); #endif myperror(msg); /* display the reason */ @ 1.4 log @Apply patch from Debian package against CAN-2004-0996; based on patch by Gerardo Di Giacomo. Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD$ d3 1 a3 1 --- src/main.c.orig 2002-07-28 17:40:07.000000000 +0200 d5 1 a5 1 @@@@ -319,9 +319,32 @@@@ lastarg: @ 1.3 log @Update to 15.0bl2. Changes: Bugfixes, better man page, code cleanup. Fixes pkg/10153. @ text @d1 1 a1 1 $NetBSD: patch-af,v 1.2 2000/05/14 00:18:56 hubertf Exp $ d3 4 a6 7 --- common/input.c.orig Tue Apr 18 03:40:44 2000 +++ common/input.c Sun May 14 01:09:36 2000 @@@@ -40,2 +40,5 @@@@ #include /* jmp_buf */ +#ifdef __NetBSD__ +#include +#endif d8 33 @ 1.2 log @Fix some of the patches - some RCS IDs did sneak in! Need a smarter pkgdiff...! - Hubert @ text @d1 1 a1 1 $NetBSD$ @ 1.1 log @ * split * don't change the name of cbreak to crmode if sun is not defined Hint by Brett Lymn , sent to me by Thomas Klausner. @ text @d3 3 a5 6 diff -x *.orig -urN ./common/input.c /disk1/cvs/pkgsrc/devel/cscope/work.i386.unpatched/cscope-13.0/common/input.c --- ./common/input.c Tue Apr 18 03:40:44 2000 +++ /disk1/cvs/pkgsrc/devel/cscope/work.i386.unpatched/cscope-13.0/common/input.c Thu May 4 03:24:27 2000 @@@@ -38,6 +38,9 @@@@ #include "global.h" #include a9 2 static char const rcsid[] = "$Id$"; @