[Frugalware-git] frugalware-current: clanlib-legacy-0.6.5_1-4-i686

2008-08-26 Thread Priyank
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=69747d8682e9252ffac1c20a38c9c37282e24ece

commit 69747d8682e9252ffac1c20a38c9c37282e24ece
Author: Priyank <[EMAIL PROTECTED]>
Date:   Wed Aug 27 11:33:41 2008 +0530

clanlib-legacy-0.6.5_1-4-i686
* Added a patch to fix build with gcc43

diff --git a/source/xlib-extra/clanlib-legacy/FrugalBuild 
b/source/xlib-extra/clanlib-legacy/FrugalBuild
index 42b50b9..d2fcd46 100644
--- a/source/xlib-extra/clanlib-legacy/FrugalBuild
+++ b/source/xlib-extra/clanlib-legacy/FrugalBuild
@@ -3,7 +3,7 @@

pkgname=clanlib-legacy
pkgver=0.6.5_1
-pkgrel=3
+pkgrel=4
pkgdesc="ClanLib is a cross platform game development library."
url="http://www.clanlib.org/";
license="LGPL-2"
@@ -17,13 +17,14 @@ up2date="lynx -dump 
'http://clanlib.org/download/legacy/?C=N;O=D'|grep -m1 'Clan
source=(http://clanlib.org/download/legacy/ClanLib-`echo ${pkgver} | sed 
's/_/-/'`.tar.gz \
clanlib-0.6.5-freetype.patch clanlib-0.6.5-gcc3.patch \
clanlib-0.6.5-gcc41.patch clanlib-0.6.5-DirectFB-update.patch \
-   clanlib-0.6.5-DirectFB-ALTGR.patch)
+   clanlib-0.6.5-DirectFB-ALTGR.patch clanlib-0.6.5-gcc43.patch)
sha1sums=('d3a8558c1f8b652742636e4712b5b9911f74e4d8' \
- 'fe6251df44716347dc28c018f6fd8bc9b1445f1b' \
- '682426d4826c47be9d92931a3957822b2da940d7' \
- 'e651201db3a78edf12465f395d4917c987495876' \
- '7f2c4885c334f029b8a7f102a211d405d244d685' \
- '25157aa5a79500ad85b60626eb361cecb79f5925')
+  'fe6251df44716347dc28c018f6fd8bc9b1445f1b' \
+  '682426d4826c47be9d92931a3957822b2da940d7' \
+  'e651201db3a78edf12465f395d4917c987495876' \
+  '7f2c4885c334f029b8a7f102a211d405d244d685' \
+  '25157aa5a79500ad85b60626eb361cecb79f5925' \
+  '94729759cd759ec48403e86ccb7f898ddfacc325')
_F_cd_path="ClanLib-`echo $pkgver | sed 's/_.*//'`"
Fconfopts="[EMAIL PROTECTED] --enable-smalljpeg --enable-clansound 
--enable-network \
--enable-dyn --enable-x11 --enable-opengl --enable-vorbis \
diff --git a/source/xlib-extra/clanlib-legacy/clanlib-0.6.5-gcc43.patch 
b/source/xlib-extra/clanlib-legacy/clanlib-0.6.5-gcc43.patch
new file mode 100644
index 000..86f2d7d
--- /dev/null
+++ b/source/xlib-extra/clanlib-legacy/clanlib-0.6.5-gcc43.patch
@@ -0,0 +1,332 @@
+diff -Naur ClanLib-0.6.5/Sources/API/Display/Display/pixeldata.h 
ClanLib-0.6.5.new/Sources/API/Display/Display/pixeldata.h
+--- ClanLib-0.6.5/Sources/API/Display/Display/pixeldata.h  2001-11-01 
19:26:50.0 +0530
 ClanLib-0.6.5.new/Sources/API/Display/Display/pixeldata.h  2008-08-27 
10:43:26.0 +0530
+@@ -18,7 +18,7 @@
+
+ #ifndef header_pixeldata
+ #define header_pixeldata
+-
++#include 
+ #include 
+ #include 
+ #include 
+diff -Naur 
ClanLib-0.6.5/Sources/Core/IOData/Generic/datafile_inputprovider.cpp 
ClanLib-0.6.5.new/Sources/Core/IOData/Generic/datafile_inputprovider.cpp
+--- ClanLib-0.6.5/Sources/Core/IOData/Generic/datafile_inputprovider.cpp   
2002-03-01 03:42:56.0 +0530
 ClanLib-0.6.5.new/Sources/Core/IOData/Generic/datafile_inputprovider.cpp   
2008-08-27 10:32:01.0 +0530
+@@ -24,6 +24,7 @@
+
+ #include 
+ #include 
++#include 
+
+ #ifdef WIN32
+   #define OPENFLAGS O_RDONLY|O_BINARY
+diff -Naur 
ClanLib-0.6.5/Sources/Core/IOData/Generic/inputsource_memory_generic.cpp 
ClanLib-0.6.5.new/Sources/Core/IOData/Generic/inputsource_memory_generic.cpp
+--- ClanLib-0.6.5/Sources/Core/IOData/Generic/inputsource_memory_generic.cpp   
2001-12-12 02:14:21.0 +0530
 
ClanLib-0.6.5.new/Sources/Core/IOData/Generic/inputsource_memory_generic.cpp
   2008-08-27 10:37:22.0 +0530
+@@ -13,7 +13,7 @@
+ */
+
+ #include "Core/precomp.h"
+-
++#include 
+ #include "API/Core/System/cl_assert.h"
+ #include "inputsource_memory_generic.h"
+ #include "outputsource_memory_generic.h"
+diff -Naur 
ClanLib-0.6.5/Sources/Core/IOData/Generic/inputsource_provider_file.cpp 
ClanLib-0.6.5.new/Sources/Core/IOData/Generic/inputsource_provider_file.cpp
+--- ClanLib-0.6.5/Sources/Core/IOData/Generic/inputsource_provider_file.cpp
2008-08-27 10:35:44.0 +0530
 
ClanLib-0.6.5.new/Sources/Core/IOData/Generic/inputsource_provider_file.cpp 
   2008-08-27 10:35:55.0 +0530
+@@ -18,7 +18,7 @@
+ #else
+ #include 
+ #endif
+-
++#include 
+ #include 
+ #include 
+
+diff -Naur 
ClanLib-0.6.5/Sources/Core/IOData/Generic/outputsource_memory_generic.cpp 
ClanLib-0.6.5.new/Sources/Core/IOData/Generic/outputsource_memory_generic.cpp
+--- ClanLib-0.6.5/Sources/Core/IOData/Generic/outputsource_memory_generic.cpp  
2001-04-29 22:34:28.0 +0530
 
ClanLib-0.6.5.new/Sources/Core/IOData/Generic/outputsource_memory_generic.cpp   
   2008-08-27 10:38:51.0 +0530
+@@ -11,7 +11,7 @@
+
+   
+ */
+-
++#include 
+ #include "Core/precomp.h"
+
+ #include "API/Core/System/cl_assert.h"
+diff -Naur 
Clan

[Frugalware-git] frugalware-current: util-linux-ng-2.14-4-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=66b858b78e3663611a2a2d6a7a001826e6ed9f31

commit 66b858b78e3663611a2a2d6a7a001826e6ed9f31
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Wed Aug 27 00:55:53 2008 +0200

util-linux-ng-2.14-4-i686
- pkgrel++ to have the fixed scriptlet in the fpm

diff --git a/source/base/util-linux-ng/FrugalBuild 
b/source/base/util-linux-ng/FrugalBuild
index d2cf296..9c6fd11 100644
--- a/source/base/util-linux-ng/FrugalBuild
+++ b/source/base/util-linux-ng/FrugalBuild
@@ -3,7 +3,7 @@

pkgname=util-linux-ng
pkgver=2.14
-pkgrel=3
+pkgrel=4
pkgdesc="Miscellaneous system utilities for Linux"
url="http://www.kernel.org/pub/linux/utils/util-linux-ng";
backup=('etc/sysconfig/console' 'etc/sysconfig/numlock')
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: tetex-3.0-16-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=6683dbe78c7e1f8cc4a2a85982dcabc5792fe2d8

commit 6683dbe78c7e1f8cc4a2a85982dcabc5792fe2d8
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Wed Aug 27 00:51:01 2008 +0200

tetex-3.0-16-i686
- install scriptlet: /usr/info -> /usr/share/info

diff --git a/source/xapps-extra/tetex/FrugalBuild 
b/source/xapps-extra/tetex/FrugalBuild
index 5c25147..b99fc50 100644
--- a/source/xapps-extra/tetex/FrugalBuild
+++ b/source/xapps-extra/tetex/FrugalBuild
@@ -4,7 +4,7 @@

pkgname=tetex
pkgver=3.0
-pkgrel=15
+pkgrel=16
pkgdesc="teTeX is a complete TeX distribution for UNIX compatible systems - 
base files, libraries, fonts"
url="http://www.tug.org/teTeX/";
depends=('libstdc++' 'libxp' 'libxmu' 'libxft' 'libxpm' 'freetype2' 
'fontconfig' 'expat' 'openmotif>=2.3.0' 'zlib' 'libpng' 'tetex-kpathsea')
@@ -74,12 +74,12 @@ EOF
Fmv usr/share/texmf/ls-R usr/share/texmf/ls-R.tetex-bin.orig

#cp $startdir/src/haltp.tex $startdir/pkg/usr/share/texmf/doc
-   Frm usr/info/dir
+   Frm usr/share/info/dir

# Remove conflicting files with texet-kpathsea
Frm 
usr/bin/{kpseaccess,kpsereadlink,kpsestat,kpsewhich,mktexlsr,mktexmf,mktexpk,mktextfm}
Frm usr/include/kpathsea
-   Frm usr/info/kpathsea.info
+   Frm usr/share/info/kpathsea.info
Frm usr/lib/libkpathsea.*
Frm 
usr/man/man1/{kpseaccess,kpsereadlink,kpsestat,kpsewhich,mktexlsr,mktexmf,mktexpk,mktextfm}.*
}
diff --git a/source/xapps-extra/tetex/tetex.install 
b/source/xapps-extra/tetex/tetex.install
index bc60102..dac7cf7 100644
--- a/source/xapps-extra/tetex/tetex.install
+++ b/source/xapps-extra/tetex/tetex.install
@@ -2,21 +2,21 @@ post_install() {
echo "Creating ls-R database with mktexlsr..."
/usr/bin/mktexlsr
echo "generating the top-level Info node... "
-   mkinfodir /usr/info > /usr/info/dir 2>/dev/null
+   mkinfodir /usr/share/info > /usr/share/info/dir 2>/dev/null
}

post_upgrade() {
echo "Creating ls-R database with mktexlsr..."
/usr/bin/mktexlsr
echo "generating the top-level Info node... "
-   mkinfodir /usr/info > /usr/info/dir 2>/dev/null
+   mkinfodir /usr/share/info > /usr/share/info/dir 2>/dev/null
}

post_remove()
{
rm /usr/share/texmf/doc/haltp.* /usr/share/texmf/web2c/latex.fmt 
/usr/share/texmf/web2c/latex.log &>/dev/null
echo "generating the top-level Info node... "
-   mkinfodir /usr/info > /usr/info/dir 2>/dev/null
+   mkinfodir /usr/share/info > /usr/share/info/dir 2>/dev/null

}
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: libgtop-2.22.3-2-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=4a7f15b0a65ce99b6b9f55eebb29b38f516bb4c3

commit 4a7f15b0a65ce99b6b9f55eebb29b38f516bb4c3
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Wed Aug 27 00:42:19 2008 +0200

libgtop-2.22.3-2-i686
- use Finclude tetex

diff --git a/source/xlib/libgtop/FrugalBuild b/source/xlib/libgtop/FrugalBuild
index 2c55876..d94ee5b 100644
--- a/source/xlib/libgtop/FrugalBuild
+++ b/source/xlib/libgtop/FrugalBuild
@@ -3,14 +3,14 @@

pkgname=libgtop
pkgver=2.22.3
-pkgrel=1
+pkgrel=2
pkgdesc="A library that read information about processes and the running system"
url="http://www.gnome.org/";
depends=('glib2>=2.16.3' 'popt' 'texinfo' 'libxau')
makedepends=('libxt' 'perl-xml-parser' 'gtk-doc' 'intltool')
groups=('xlib')
archs=('i686' 'x86_64')
-Finclude gnome
+Finclude gnome texinfo
Fconfopts="$Fconfopts --enable-debug=no --enable-fatal-warnings=no"
sha1sums=('cc172b78f11c19cb4ba7ed3b55a34283f6f63d50')

diff --git a/source/xlib/libgtop/libgtop.install 
b/source/xlib/libgtop/libgtop.install
deleted file mode 100644
index da40cae..000
--- a/source/xlib/libgtop/libgtop.install
+++ /dev/null
@@ -1,18 +0,0 @@
-post_install() {
-   echo -n "generating the top-level Info node... "
-   mkinfodir /usr/info > /usr/info/dir
-   echo "done."
-}
-
-post_upgrade() {
-   post_install
-}
-
-post_remove() {
-   post_install
-}
-
-op=$1
-shift
-
-$op $*
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: libmikmod-3.1.11-8-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=7b1b156e06bcde85941bb880581a46127a947e40

commit 7b1b156e06bcde85941bb880581a46127a947e40
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Wed Aug 27 00:40:17 2008 +0200

libmikmod-3.1.11-8-i686
- use Finclude texinfo

diff --git a/source/lib/libmikmod/FrugalBuild b/source/lib/libmikmod/FrugalBuild
index 36b9bfe..0a4d2c8 100644
--- a/source/lib/libmikmod/FrugalBuild
+++ b/source/lib/libmikmod/FrugalBuild
@@ -4,7 +4,7 @@

pkgname=libmikmod
pkgver=3.1.11
-pkgrel=7
+pkgrel=8
pkgdesc="A module sound player and library"
url="http://mikmod.raphnet.net/";
groups=('lib')
@@ -17,6 +17,7 @@ 
source=(http://mikmod.raphnet.net/files/$pkgname-$pkgver.tar.gz libmikmod-3.1.11
sha1sums=('ca18fff19348d3bcf3550aa920b129b082c5069a' \
'3df6cdfa3f8f97094a21b23e35dcc671fdb28408' \
'22c9f0aed6415612ed2b16d2eaed31a22207aeef')
+Finclude texinfo

build()
{
diff --git a/source/lib/libmikmod/libmikmod.install 
b/source/lib/libmikmod/libmikmod.install
deleted file mode 100644
index 2336955..000
--- a/source/lib/libmikmod/libmikmod.install
+++ /dev/null
@@ -1,18 +0,0 @@
-post_install() {
-   echo -n "generating the top-level Info node... "
-   mkinfodir /usr/info > /usr/info/dir 2>/dev/null
-   echo "done."
-}
-
-post_upgrade() {
-   post_install
-}
-
-post_remove() {
-   post_install
-}
-
-op=$1
-shift
-
-$op $*
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: glib-1.2.10-6-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=af3c1c97275982aaf7c06fcaa80e5b4764f5e088

commit af3c1c97275982aaf7c06fcaa80e5b4764f5e088
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Wed Aug 27 00:37:41 2008 +0200

glib-1.2.10-6-i686
- use Finclude texinfo

diff --git a/source/lib/glib/FrugalBuild b/source/lib/glib/FrugalBuild
index d8bb16f..1cf86af 100644
--- a/source/lib/glib/FrugalBuild
+++ b/source/lib/glib/FrugalBuild
@@ -4,7 +4,7 @@

pkgname=glib
pkgver=1.2.10
-pkgrel=5
+pkgrel=6
pkgdesc="Common C routines used by Gtk+ and other libs"
url="http://www.gnome.org/";
depends=('glibc')
@@ -17,6 +17,7 @@ 
source=(ftp://ftp.gtk.org/pub/gtk/v$preup2date/$pkgname-$pkgver.tar.gz $pkgname-
sha1sums=('e5a9361c594608d152d5d9650154c2e3260b87fa' \
'07bd9ef15c3d4a3d5b6e054d46d4642d5c7f1bed' \
'68cb3f3080db37290d212ddc78757612049d3094')
+Finclude texinfo

build() {
Fcd
diff --git a/source/lib/glib/glib.install b/source/lib/glib/glib.install
deleted file mode 100644
index bfe624e..000
--- a/source/lib/glib/glib.install
+++ /dev/null
@@ -1,18 +0,0 @@
-post_install() {
-   echo -n "generating the top-level Info node... "
-   mkinfodir /usr/info > /usr/info/dir 2> /dev/null
-   echo "done."
-}
-
-post_upgrade() {
-   post_install
-}
-
-post_remove() {
-   post_install
-}
-
-op=$1
-shift
-
-$op $*
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: aalib-1.4rc5-4-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=120f987d020329b4047664e3fb908cf980f8bdb9

commit 120f987d020329b4047664e3fb908cf980f8bdb9
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Wed Aug 27 00:36:11 2008 +0200

aalib-1.4rc5-4-i686
- use Finclude texinfo

diff --git a/source/lib/aalib/FrugalBuild b/source/lib/aalib/FrugalBuild
index 58ca532..10d27fc 100644
--- a/source/lib/aalib/FrugalBuild
+++ b/source/lib/aalib/FrugalBuild
@@ -4,14 +4,14 @@

pkgname=aalib
pkgver=1.4rc5
-pkgrel=3
+pkgrel=4
pkgdesc="A portable ascii art graphics library."
groups=('lib')
archs=('i686' 'x86_64')
depends=('glibc' 'gpm>=1.20.5-2' 'ncurses')
_F_cd_path="$pkgname-1.4.0"
_F_sourceforge_dirname=aa-project
-Finclude sourceforge
+Finclude sourceforge texinfo
url="http://aa-project.sourceforge.net/aalib/";
up2date="lynx -dump 
'http://sourceforge.net/project/showfiles.php?group_id=20003'|grep -m1 
'aalib-'|sed 's/.*-\(.*\).t.* .*/\1/'"
source=([EMAIL PROTECTED] aalib-m4-fix.patch missing-includes.patch)
diff --git a/source/lib/aalib/aalib.install b/source/lib/aalib/aalib.install
deleted file mode 100644
index 2336955..000
--- a/source/lib/aalib/aalib.install
+++ /dev/null
@@ -1,18 +0,0 @@
-post_install() {
-   echo -n "generating the top-level Info node... "
-   mkinfodir /usr/info > /usr/info/dir 2>/dev/null
-   echo "done."
-}
-
-post_upgrade() {
-   post_install
-}
-
-post_remove() {
-   post_install
-}
-
-op=$1
-shift
-
-$op $*
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: grub-0.97-22-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=5b7033462e61182ef525b8b96179b0bce929701f

commit 5b7033462e61182ef525b8b96179b0bce929701f
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Wed Aug 27 00:30:09 2008 +0200

grub-0.97-22-i686
- use Finclude texinfo

diff --git a/source/base/grub/FrugalBuild b/source/base/grub/FrugalBuild
index 809b7af..f993639 100644
--- a/source/base/grub/FrugalBuild
+++ b/source/base/grub/FrugalBuild
@@ -3,12 +3,11 @@

pkgname=grub
pkgver=0.97
-pkgrel=21
+pkgrel=22
pkgdesc="The GNU GRand Unified Bootloader"
url="http://www.gnu.org/software/grub/";
depends=('texinfo')
[ "$CARCH" == "i686" ] && depends=([EMAIL PROTECTED] 'ncurses' 'mktemp')
-#makedepends=('gfxboot>=3.3.22' 'perl-html-parser' 'cpio')
[ "$CARCH" == "x86_64" ] && makedepends=([EMAIL PROTECTED] 'ncurses' 'mktemp')
rodepends=('grub-theme-frugalware' 'os-prober')
groups=('base')
@@ -30,10 +29,7 @@ sha1sums=('2580626c4579bd99336d3af4482c346c95dac4fb' \
'adbb4685c98797ffb4dc83561ec75698991dddbd' \
'389913c8b09e5882373e7cb233ecfefb7ad3a3cb' \
'56223e12b2460c3390674158eddfb5a14a2efcc6')
-
-# Original patch was for Debian at:
-# http://neverborn.org/files/grub-gfxboot/source/grub-gfxboot/ and
-# http://www.morphix.org/debian/source/grub-gfxboot/
+Finclude texinfo

build()
{
@@ -50,21 +46,13 @@ build()
--enable-{epic100,exos205,ni5210,lance,ne2100,ni{50,65}10,natsemi} \
--enable-{ne,ns8390,wd,otulip,rtl8139,sis900,sk-g16,smc9000,tiara} \
--enable-{tulip,via-rhine,w89c840}
-   Ffilerel stage2/stage2 /usr/lib/grub/i386-pc/stage2.netboot
-   Ffilerel stage2/{nbgrub,pxegrub} /usr/lib/grub/i386-pc/
+   Ffilerel stage2/stage2 /usr/lib/grub/i386-frugalware/stage2.netboot
+   Ffilerel stage2/{nbgrub,pxegrub} /usr/lib/grub/i386-frugalware/
make clean

# the normal build
Fmake --bindir=/bin --sbindir=/sbin
Fmakeinstall
-
-   # message
-#  cp -a /usr/share/gfxboot/themes/frugalware ./
-#  cd frugalware
-#  make BINDIR=/usr/sbin/
-#  cd boot
-#  Ffilerel /boot/grub/message
}

# optimization OK
-
diff --git a/source/base/grub/grub.install b/source/base/grub/grub.install
deleted file mode 100644
index 5a9a9f6..000
--- a/source/base/grub/grub.install
+++ /dev/null
@@ -1,23 +0,0 @@
-post_install()
-{
-   echo -n "generating the top-level Info node... "
-   mkinfodir /usr/info > /usr/info/dir 2>/dev/null
-   echo "done."
-}
-
-post_upgrade()
-{
-   post_install
-}
-
-post_remove()
-{
-   post_install
-}
-
-op=$1
-shift
-
-$op $*
-
-# vim: ft=sh
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: a2ps-4.14-2-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=ac7410ba08bd5427715c95e9a90f11efbab79244

commit ac7410ba08bd5427715c95e9a90f11efbab79244
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Wed Aug 27 00:23:11 2008 +0200

a2ps-4.14-2-i686
- use Finclude texinfo

diff --git a/source/apps/a2ps/FrugalBuild b/source/apps/a2ps/FrugalBuild
index 9982930..e90f686 100644
--- a/source/apps/a2ps/FrugalBuild
+++ b/source/apps/a2ps/FrugalBuild
@@ -5,7 +5,7 @@
pkgname=a2ps
pkgver=4.14
pkgextraver=
-pkgrel=1
+pkgrel=2
pkgdesc="An Any to PostScript filter"
url="http://www.inf.enst.fr/~demaille/a2ps";
depends=('glibc' 'urw-fonts' 'psutils' 'texinfo')
@@ -18,6 +18,7 @@ 
source=(ftp://ftp.gnu.org/gnu/$pkgname/$pkgname-$pkgver.tar.gz \
libtool.patch)
sha1sums=('365abbbe4b7128bf70dad16d06e23c5701874852' \
'2cd26284b19f897505b0f344fcd423ab10b76a6f')
+Finclude texinfo

build()
{
diff --git a/source/apps/a2ps/a2ps.install b/source/apps/a2ps/a2ps.install
deleted file mode 100644
index da40cae..000
--- a/source/apps/a2ps/a2ps.install
+++ /dev/null
@@ -1,18 +0,0 @@
-post_install() {
-   echo -n "generating the top-level Info node... "
-   mkinfodir /usr/info > /usr/info/dir
-   echo "done."
-}
-
-post_upgrade() {
-   post_install
-}
-
-post_remove() {
-   post_install
-}
-
-op=$1
-shift
-
-$op $*
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: texinfo-4.11-4-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=71644014f9e187ad17c8faf5939d1713b6fce18a

commit 71644014f9e187ad17c8faf5939d1713b6fce18a
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Wed Aug 27 00:17:45 2008 +0200

texinfo-4.11-4-i686
- use Finclude texinfo
- this silences the warning about non-existing /usr/info on install

diff --git a/source/base/texinfo/FrugalBuild b/source/base/texinfo/FrugalBuild
index 495e7c0..9962112 100644
--- a/source/base/texinfo/FrugalBuild
+++ b/source/base/texinfo/FrugalBuild
@@ -4,7 +4,7 @@

pkgname=texinfo
pkgver=4.11
-pkgrel=3
+pkgrel=4
pkgdesc="The GNU info program and utilities"
url="http://www.gnu.org/software/texinfo/";
depends=('ncurses>=5.6-4' 'net-tools>=1.60-26' 'grep>=2.5.3-4' 'sed>=4.1.5-3' 
'udev>=124-2' 'gawk>=3.1.6-3')
@@ -17,6 +17,7 @@ Fup2gnubz2
source=(http://ftp.gnu.org/pub/gnu/$pkgname/$pkgname-$pkgver.tar.bz2 mkinfodir)
sha1sums=('915a42e1278860b0fa64e4ef9d5ad4488d3b23a0' \
'd744345f082e32af0675a0b9d3287c6b8d4600a7')
+Finclude texinfo


build()
diff --git a/source/base/texinfo/texinfo.install 
b/source/base/texinfo/texinfo.install
deleted file mode 100644
index 766019d..000
--- a/source/base/texinfo/texinfo.install
+++ /dev/null
@@ -1,25 +0,0 @@
-post_install()
-{
-   echo -n "generating the top-level Info node... "
-   mkinfodir /usr/info > /usr/info/dir 2>/dev/null
-   echo "done."
-}
-
-post_upgrade()
-{
-   post_install
-}
-
-pre_remove()
-{
-   echo -n "removing the top-level Info node... "
-   rm -f /usr/info/dir
-   echo "done."
-}
-
-op=$1
-shift
-
-$op $*
-
-# vim: ft=sh
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] fwlive: fwlive-i686

2008-08-26 Thread Janos Kovacs
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=fwlive.git;a=commitdiff;h=f4b7a79aba71a677d1fc4d04b617b0a1d3aa460d

commit f4b7a79aba71a677d1fc4d04b617b0a1d3aa460d
Author: Janos Kovacs <[EMAIL PROTECTED]>
Date:   Tue Aug 26 22:20:00 2008 +0200

fwlive-i686
* other correction to systems
* bump to rc2

diff --git a/Makefile b/Makefile
index a6e5189..6eae2a4 100644
--- a/Makefile
+++ b/Makefile
@@ -219,9 +219,9 @@ create-users: checkroot
fi

live-base: checkroot
-   echo "Include = /etc/pacman.d/janny" >> 
${CHROOTDIR}/${TREE}/etc/pacman-g2.conf; \
-   echo "[janny]" > ${CHROOTDIR}/${TREE}/etc/pacman.d/janny; \
-   echo "Server = 
http://ftp.frugalware.org/pub/other/people/janny/fwlive/frugalware-i686/"; >> 
${CHROOTDIR}/${TREE}/etc/pacman.d/janny; \
+   echo "Include = /etc/pacman-g2/repos/janny" >> 
${CHROOTDIR}/${TREE}/etc/pacman-g2.conf; \
+   echo "[janny]" > ${CHROOTDIR}/${TREE}/etc/pacman-g2/repos/janny; \
+   echo "Server = 
http://ftp.frugalware.org/pub/other/people/janny/fwlive/frugalware-i686/"; >> 
${CHROOTDIR}/${TREE}/etc/pacman-g2/repos/janny; \
cp -a live-base ${CHROOTDIR}/${TREE}/tmp/
mkdir -p ${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/grub 
${CHROOTDIR}/${TREE}/tmp/live-base/initrd/rootfs/{lib,bin,etc}
ln -sf configsave ${CHROOTDIR}/${TREE}/usr/local/bin/configrestore
@@ -260,7 +260,7 @@ ifeq ($(CONFIG_SETUP),y)
cp ${SETUPKERNEL} ${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/
cp ${SETUPINITRD} ${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/
endif
-   cp ${CHROOTDIR}/${TREE}/usr/lib/grub/i386-pc/stage2_eltorito 
${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/grub/
+   cp ${CHROOTDIR}/${TREE}/usr/lib/grub/i386-frugalware/stage2_eltorito 
${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/grub/
cp ${CHROOTDIR}/${TREE}/boot/grub/message-fwlive 
${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/grub/message
cp menu.lst ${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/grub/
sed -i "s|@GRUBTITLE@|${FWLSREL} ${FWREL}|" 
${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/grub/menu.lst
diff --git a/config b/config
index a026f1e..f93f759 100644
--- a/config
+++ b/config
@@ -6,7 +6,7 @@
# repos to be included in the chroot. probably you want "current" or "stable".
# use a come-separated list if you want to list multiple repos. the first one
# takes precedence
-TREE = stable
+TREE = testing

# default language, in an xx_YY form
FWLLLANG = en_US
@@ -37,8 +37,8 @@ FWVER = $(shell date +%Y%m%d)
FWCODENAME = -current
endif
ifeq ($(findstring testing,$(TREE)),testing)
-FWVER = 0.8
-FWCODENAME = Kalgan
+FWVER = 0.9rc2
+FWCODENAME = Solaria
endif
FWVER ?= 0.8
FWCODENAME ?= Kalgan
@@ -48,7 +48,7 @@ FWREL = ${FWVER} (${FWCODENAME})
ISONAME = ${FWLHOST}-${FWVER}-$(shell uname -m)-$(shell echo ${APPSGROUP}|tr 
[A-Z] [a-z]).iso

# codename of the livecd, used in /etc/issue and /etc/fwlive-release
-FWLCODENAME = Voyager
+FWLCODENAME = Tibet

# Vendor name (used in /etc/issue only)
VENDOR = Frugalware
@@ -69,9 +69,9 @@ SAVEDIRS = etc home lib root usr var
CONFIG_SETUP = y

# additional packages to be installed by the profiles
-# no builded pkgs: truecrypt-fwlive
-DRIVERS = gspcav1-fwlive qc-usb-fwlive dazuko-fwlive busybox-fwlive 
lirc-fwlive \
- acerhk-fwlive redirfs-fwlive madwifi-fwlive wlan-ng-fwlive 
busybox-fwlive \
+# no builded pkgs: truecrypt-fwlive acerhk-fwlive lirc-fwlive
+DRIVERS = gspcav1-fwlive qc-usb-fwlive dazuko-fwlive busybox-fwlive \
+ redirfs-fwlive madwifi-fwlive wlan-ng-fwlive busybox-fwlive \
ndiswrapper-fwlive kqemu-fwlive acx100-fwlive
INST_MUSTHAVE_APPS = busybox-fwlive util-linux-ng grub-theme-fwlive \
sudo aufs squashfs cdrtools ntfs-3g
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-0.8: libxslt-1.1.22-2kalgan2-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=6ef5f3207cd36ecfe39690e1ab75cdb6067476ba

commit 6ef5f3207cd36ecfe39690e1ab75cdb6067476ba
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 18:14:46 2008 +0200

libxslt-1.1.22-2kalgan2-i686
- added CVE-2008-2935.patch
- closes #3285

diff --git a/source/lib/libxslt/CVE-2008-2935.patch 
b/source/lib/libxslt/CVE-2008-2935.patch
new file mode 100644
index 000..c9ab232
--- /dev/null
+++ b/source/lib/libxslt/CVE-2008-2935.patch
@@ -0,0 +1,152 @@
+Index: libexslt/crypto.c
+===
+--- libexslt/crypto.c  (revision 1479)
 libexslt/crypto.c  (working copy)
+@@ -595,11 +595,13 @@ exsltCryptoRc4EncryptFunction (xmlXPathP
+ int str_len = 0, bin_len = 0, hex_len = 0;
+ xmlChar *key = NULL, *str = NULL, *padkey = NULL;
+ xmlChar *bin = NULL, *hex = NULL;
++xsltTransformContextPtr tctxt = NULL;
+
+-if ((nargs < 1) || (nargs > 3)) {
++if (nargs != 2) {
+   xmlXPathSetArityError (ctxt);
+   return;
+ }
++tctxt = xsltXPathGetTransformContext(ctxt);
+
+ str = xmlXPathPopString (ctxt);
+ str_len = xmlUTF8Strlen (str);
+@@ -611,7 +613,7 @@ exsltCryptoRc4EncryptFunction (xmlXPathP
+ }
+
+ key = xmlXPathPopString (ctxt);
+-key_len = xmlUTF8Strlen (str);
++key_len = xmlUTF8Strlen (key);
+
+ if (key_len == 0) {
+   xmlXPathReturnEmptyString (ctxt);
+@@ -620,15 +622,33 @@ exsltCryptoRc4EncryptFunction (xmlXPathP
+   return;
+ }
+
+-padkey = xmlMallocAtomic (RC4_KEY_LENGTH);
++padkey = xmlMallocAtomic (RC4_KEY_LENGTH + 1);
++if (padkey == NULL) {
++  xsltTransformError(tctxt, NULL, tctxt->inst,
++  "exsltCryptoRc4EncryptFunction: Failed to allocate padkey\n");
++  tctxt->state = XSLT_STATE_STOPPED;
++  xmlXPathReturnEmptyString (ctxt);
++  goto done;
++}
++memset(padkey, 0, RC4_KEY_LENGTH + 1);
++
+ key_size = xmlUTF8Strsize (key, key_len);
++if ((key_size > RC4_KEY_LENGTH) || (key_size < 0)) {
++  xsltTransformError(tctxt, NULL, tctxt->inst,
++  "exsltCryptoRc4EncryptFunction: key size too long or key broken\n");
++  tctxt->state = XSLT_STATE_STOPPED;
++  xmlXPathReturnEmptyString (ctxt);
++  goto done;
++}
+ memcpy (padkey, key, key_size);
+-memset (padkey + key_size, '\0', sizeof (padkey));
+
+ /* encrypt it */
+ bin_len = str_len;
+ bin = xmlStrdup (str);
+ if (bin == NULL) {
++  xsltTransformError(tctxt, NULL, tctxt->inst,
++  "exsltCryptoRc4EncryptFunction: Failed to allocate string\n");
++  tctxt->state = XSLT_STATE_STOPPED;
+   xmlXPathReturnEmptyString (ctxt);
+   goto done;
+ }
+@@ -638,6 +658,9 @@ exsltCryptoRc4EncryptFunction (xmlXPathP
+ hex_len = str_len * 2 + 1;
+ hex = xmlMallocAtomic (hex_len);
+ if (hex == NULL) {
++  xsltTransformError(tctxt, NULL, tctxt->inst,
++  "exsltCryptoRc4EncryptFunction: Failed to allocate result\n");
++  tctxt->state = XSLT_STATE_STOPPED;
+   xmlXPathReturnEmptyString (ctxt);
+   goto done;
+ }
+@@ -670,11 +693,13 @@ exsltCryptoRc4DecryptFunction (xmlXPathP
+ int str_len = 0, bin_len = 0, ret_len = 0;
+ xmlChar *key = NULL, *str = NULL, *padkey = NULL, *bin =
+   NULL, *ret = NULL;
++xsltTransformContextPtr tctxt = NULL;
+
+-if ((nargs < 1) || (nargs > 3)) {
++if (nargs != 2) {
+   xmlXPathSetArityError (ctxt);
+   return;
+ }
++tctxt = xsltXPathGetTransformContext(ctxt);
+
+ str = xmlXPathPopString (ctxt);
+ str_len = xmlUTF8Strlen (str);
+@@ -686,7 +711,7 @@ exsltCryptoRc4DecryptFunction (xmlXPathP
+ }
+
+ key = xmlXPathPopString (ctxt);
+-key_len = xmlUTF8Strlen (str);
++key_len = xmlUTF8Strlen (key);
+
+ if (key_len == 0) {
+   xmlXPathReturnEmptyString (ctxt);
+@@ -695,22 +720,51 @@ exsltCryptoRc4DecryptFunction (xmlXPathP
+   return;
+ }
+
+-padkey = xmlMallocAtomic (RC4_KEY_LENGTH);
++padkey = xmlMallocAtomic (RC4_KEY_LENGTH + 1);
++if (padkey == NULL) {
++  xsltTransformError(tctxt, NULL, tctxt->inst,
++  "exsltCryptoRc4EncryptFunction: Failed to allocate padkey\n");
++  tctxt->state = XSLT_STATE_STOPPED;
++  xmlXPathReturnEmptyString (ctxt);
++  goto done;
++}
++memset(padkey, 0, RC4_KEY_LENGTH + 1);
+ key_size = xmlUTF8Strsize (key, key_len);
++if ((key_size > RC4_KEY_LENGTH) || (key_size < 0)) {
++  xsltTransformError(tctxt, NULL, tctxt->inst,
++  "exsltCryptoRc4EncryptFunction: key size too long or key broken\n");
++  tctxt->state = XSLT_STATE_STOPPED;
++  xmlXPathReturnEmptyString (ctxt);
++  goto done;
++}
+ memcpy (padkey, key, key_size);
+-memset (padkey + key_size, '\0', sizeof (padkey));
+
+ /* decode hex to binary */
+ bin_len = str_len;
+ bin = xmlMallocAtomic (bin_len);
++if (bin =

[Frugalware-git] frugalware-0.8: python-2.5.2-2kalgan2-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=8743fd062258b92c2e0f88d32eaf741cc5ac5d26

commit 8743fd062258b92c2e0f88d32eaf741cc5ac5d26
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 17:57:04 2008 +0200

python-2.5.2-2kalgan2-i686
- added CVE-2008-2315, CVE-2008-2316, CVE-2008-3142 and CVE-2008-3144
- closes #3286

diff --git a/source/devel/python/CVE-2008-2315.patch 
b/source/devel/python/CVE-2008-2315.patch
new file mode 100644
index 000..19a654b
--- /dev/null
+++ b/source/devel/python/CVE-2008-2315.patch
@@ -0,0 +1,581 @@
+Index: Python-2.5.2/Objects/unicodeobject.c
+===
+--- Python-2.5.2.orig/Objects/unicodeobject.c
 Python-2.5.2/Objects/unicodeobject.c
+@@ -240,6 +240,11 @@ PyUnicodeObject *_PyUnicode_New(Py_ssize
+ return unicode_empty;
+ }
+
++/* Ensure we won't overflow the size. */
++if (length > ((PY_SSIZE_T_MAX / sizeof(Py_UNICODE)) - 1)) {
++return (PyUnicodeObject *)PyErr_NoMemory();
++}
++
+ /* Unicode freelist & memory allocation */
+ if (unicode_freelist) {
+ unicode = unicode_freelist;
+@@ -1102,6 +1107,9 @@ PyObject *PyUnicode_EncodeUTF7(const Py_
+ char * out;
+ char * start;
+
++if (cbAllocated / 5 != size)
++return PyErr_NoMemory();
++
+ if (size == 0)
+   return PyString_FromStringAndSize(NULL, 0);
+
+@@ -1700,8 +1708,9 @@ PyUnicode_EncodeUTF16(const Py_UNICODE *
+ {
+ PyObject *v;
+ unsigned char *p;
++Py_ssize_t nsize, bytesize;
+ #ifdef Py_UNICODE_WIDE
+-int i, pairs;
++Py_ssize_t i, pairs;
+ #else
+ const int pairs = 0;
+ #endif
+@@ -1724,8 +1733,15 @@ PyUnicode_EncodeUTF16(const Py_UNICODE *
+   if (s[i] >= 0x1)
+   pairs++;
+ #endif
+-v = PyString_FromStringAndSize(NULL,
+-2 * (size + pairs + (byteorder == 0)));
++/* 2 * (size + pairs + (byteorder == 0)) */
++if (size > PY_SSIZE_T_MAX ||
++  size > PY_SSIZE_T_MAX - pairs - (byteorder == 0))
++  return PyErr_NoMemory();
++nsize = (size + pairs + (byteorder == 0));
++bytesize = nsize * 2;
++if (bytesize / 2 != nsize)
++  return PyErr_NoMemory();
++v = PyString_FromStringAndSize(NULL, bytesize);
+ if (v == NULL)
+ return NULL;
+
+@@ -2053,6 +2069,11 @@ PyObject *unicodeescape_string(const Py_
+ char *p;
+
+ static const char *hexdigit = "0123456789abcdef";
++#ifdef Py_UNICODE_WIDE
++const Py_ssize_t expandsize = 10;
++#else
++const Py_ssize_t expandsize = 6;
++#endif
+
+ /* Initial allocation is based on the longest-possible unichr
+escape.
+@@ -2068,13 +2089,12 @@ PyObject *unicodeescape_string(const Py_
+escape.
+ */
+
++if (size > (PY_SSIZE_T_MAX - 2 - 1) / expandsize)
++  return PyErr_NoMemory();
++
+ repr = PyString_FromStringAndSize(NULL,
+ 2
+-#ifdef Py_UNICODE_WIDE
+-+ 10*size
+-#else
+-+ 6*size
+-#endif
+++ expandsize*size
+ + 1);
+ if (repr == NULL)
+ return NULL;
+@@ -2315,12 +2335,16 @@ PyObject *PyUnicode_EncodeRawUnicodeEsca
+ char *q;
+
+ static const char *hexdigit = "0123456789abcdef";
+-
+ #ifdef Py_UNICODE_WIDE
+-repr = PyString_FromStringAndSize(NULL, 10 * size);
++const Py_ssize_t expandsize = 10;
+ #else
+-repr = PyString_FromStringAndSize(NULL, 6 * size);
++const Py_ssize_t expandsize = 6;
+ #endif
++
++if (size > PY_SSIZE_T_MAX / expandsize)
++  return PyErr_NoMemory();
++
++repr = PyString_FromStringAndSize(NULL, expandsize * size);
+ if (repr == NULL)
+ return NULL;
+ if (size == 0)
+@@ -4730,6 +4754,11 @@ PyUnicodeObject *pad(PyUnicodeObject *se
+ return self;
+ }
+
++if (left > PY_SSIZE_T_MAX - self->length ||
++  right > PY_SSIZE_T_MAX - (left + self->length)) {
++PyErr_SetString(PyExc_OverflowError, "padded string is too long");
++return NULL;
++}
+ u = _PyUnicode_New(left + self->length + right);
+ if (u) {
+ if (left)
+Index: Python-2.5.2/Objects/tupleobject.c
+===
+--- Python-2.5.2.orig/Objects/tupleobject.c
 Python-2.5.2/Objects/tupleobject.c
+@@ -60,11 +60,12 @@ PyTuple_New(register Py_ssize_t size)
+   Py_ssize_t nbytes = size * sizeof(PyObject *);
+   /* Check for overflow */
+   if (nbytes / sizeof(PyObject *) != (size_t)size ||
+-  (nbytes += sizeof(PyTupleObject) - sizeof(PyObject *))
+-  <= 0)
++  (nbytes > PY_SSIZE_T_MAX - sizeof(PyTupleObject) - 
sizeof(PyObject *)))
+   {
+   return PyErr_NoMemory();
+   }
++  nbytes += sizeof(PyTupleObject) - sizeof(PyObject *);
++
+   op = PyObject_GC_NewVar(PyTupleObject, &PyTuple_Type, size);
+   if (

[Frugalware-git] frugalware-0.8: apache-2.2.8-2kalgan2-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=0440167e58f731710bf757370cfe9348a4882a12

commit 0440167e58f731710bf757370cfe9348a4882a12
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 17:33:07 2008 +0200

apache-2.2.8-2kalgan2-i686
- add CVE-2008-2939.patch
- closes #3307

diff --git a/source/network/apache/CVE-2008-2939.patch 
b/source/network/apache/CVE-2008-2939.patch
new file mode 100644
index 000..ddf5c6a
--- /dev/null
+++ b/source/network/apache/CVE-2008-2939.patch
@@ -0,0 +1,10 @@
+--- 2.2.x/modules/proxy/mod_proxy_ftp.c2008/08/05 19:00:05 682869
 2.2.x/modules/proxy/mod_proxy_ftp.c2008/08/05 19:01:50 682870
+@@ -383,6 +383,7 @@
+c->bucket_alloc));
+ }
+ if (wildcard != NULL) {
++wildcard = ap_escape_html(p, wildcard);
+ APR_BRIGADE_INSERT_TAIL(out, apr_bucket_pool_create(wildcard,
+strlen(wildcard), 
p,
+c->bucket_alloc));
diff --git a/source/network/apache/FrugalBuild 
b/source/network/apache/FrugalBuild
index 3247385..a2d8c1b 100644
--- a/source/network/apache/FrugalBuild
+++ b/source/network/apache/FrugalBuild
@@ -4,7 +4,7 @@

pkgname=apache
pkgver=2.2.8
-pkgrel=2kalgan1
+pkgrel=2kalgan2
pkgdesc="A high performance Unix-based HTTP server (with SSL)"
url="http://httpd.apache.org/";
backup=(etc/httpd/conf/{httpd.conf,ssl.conf,ssl.crt/server.crt,ssl.csr/server.csr,ssl.key/server.key}
 \
@@ -19,8 +19,8 @@ 
source=(http://archive.apache.org/dist/httpd/httpd-$pkgver.tar.bz2 \
http://ftp.frugalware.org/pub/other/sources/apache/mkcert.tar.gz \
rc.httpd rc.httpd-hu.po httpd.conf ssl.conf \
README.Frugalware index.html http://frugalware.org/images/frugalware.png \
-   CVE-2008-2364.patch)
-signatures=($source.asc '' '' '' '' '' '' '' '' '')
+   CVE-2008-2364.patch CVE-2008-2939.patch)
+signatures=($source.asc '' '' '' '' '' '' '' '' '' '')

# svn web interface:
# http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-0.8: links-2.1-1kalgan1-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=d2a6c6be269f34ae56ad10e381379af030c09d4c

commit d2a6c6be269f34ae56ad10e381379af030c09d4c
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 17:24:56 2008 +0200

links-2.1-1kalgan1-i686
- secfix bump
- closes #3272 in stable

diff --git a/source/network-extra/links/FrugalBuild 
b/source/network-extra/links/FrugalBuild
index d651e5d..25febf1 100644
--- a/source/network-extra/links/FrugalBuild
+++ b/source/network-extra/links/FrugalBuild
@@ -2,8 +2,8 @@
# Maintainer: VMiklos <[EMAIL PROTECTED]>

pkgname=links
-pkgver=2.1pre33
-pkgrel=1
+pkgver=2.1
+pkgrel=1kalgan1
pkgdesc="A web browser running in both graphics and text mode."
url="http://links.twibright.com/";
depends=('libpng' 'libjpeg' 'libtiff' 'openssl' 'gpm' 'ncurses')
@@ -13,6 +13,6 @@ up2date="lynx -dump $url/download.php|grep Current|sed 's/.* 
\(.*\)\..*/\1/'"
source=($url/download/$pkgname-$pkgver.tar.bz2)
Fconfopts="$Fconfopts --enable-javascript --enable-graphics --without-x"

-sha1sums=('0ac2aa7c45f56692751f5a9ab94f3551c38ba846')
+sha1sums=('f14617c6bce69a23fd20bd8816e693a789a8c5e4')
# optimization OK
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] homepage-ng: add description about missing FSA508

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=f2e2b72eeca97eab463075a676041278bb3ac696

commit f2e2b72eeca97eab463075a676041278bb3ac696
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 17:10:55 2008 +0200

add description about missing FSA508

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 7b2a285..b4141c6 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -107,21 +107,7 @@
11) An error in the processing of "Alt Names" provided by "peer" trusted 
certificates can be exploited to conduct spoofing attacks.
12) An error in the processing of Windows URL shortcuts can be exploited to run 
a remote site as a local file.

-   
-   508
-   2008-08-16
-   postfix
-   2.4.6-1
-   2.4.7-1kalgan1
-   http://bugs.frugalware.org/task/3296
-   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936
-   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937
-   Sebastian Krahmer has reported some security issues in 
Postfix, which can be exploited by malicious, local users to disclose 
potentially sensitive information and perform certain actions with escalated 
privileges.
-   1) A security issue is caused due to Postfix 
incorrectly handling symlink files. This can be exploited to e.g. append mail 
messages to arbitrary files by creating a hardlink to a symlink owned by the 
root user.
-   Successful exploitation requires write permission to 
the mail spool directory, that there is no "root" mailbox, and users can create 
a hardlink to a symlink (e.g. Linux 2.x, Solaris, Irix 6.5).
-   2) A security issue is caused due to Postfix not 
correctly checking the ownership of the destination when delivering email. This 
can be exploited to e.g. disclose emails by creating an insecure mailbox file 
for other users.
-   Successful exploitation requires permission to create 
files within the mail spool directory.
-   
+   

507
2008-08-16
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: ruby-1.8.7-5-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=2dc7c6b923393fa847501ead450264b590813f15

commit 2dc7c6b923393fa847501ead450264b590813f15
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 17:08:25 2008 +0200

ruby-1.8.7-5-i686
- update to patchlevel '72'
- closes #3300

diff --git a/source/devel/ruby/FrugalBuild b/source/devel/ruby/FrugalBuild
index 64a1522..9ea7d68 100644
--- a/source/devel/ruby/FrugalBuild
+++ b/source/devel/ruby/FrugalBuild
@@ -4,9 +4,9 @@

pkgname=ruby
pkgver=1.8.7
-pkgpatch=22
+pkgpatch=72
pkgextraver=
-pkgrel=4
+pkgrel=5
pkgdesc="An object-oriented programming language."
url="http://www.ruby-lang.org/";
depends=('termcap' 'zlib' 'db>=4.7.25-2' 'readline' 'openssl' 'gdbm')
@@ -15,7 +15,7 @@ groups=('devel')
archs=('i686' 'x86_64')
up2date="lynx -dump http://www.ruby-lang.org/en/downloads/|sed 
's/-p$pkgpatch//' |Flasttar"
source=(ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-${pkgver}-p$pkgpatch.tar.bz2)
-sha1sums=('a54e59393f0ca8fcc39f9e23e63a04b1cd4e3b7a')
+sha1sums=('462e990a724580e4dfeeac5a271b93f6cfcbf5c7')

build() {
Fcd ruby-$pkgver-p$pkgpatch
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-0.8: ruby-1.8.6-5kalgan1-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=5733f80314861074ae037e6f8e8ad2671e0b7468

commit 5733f80314861074ae037e6f8e8ad2671e0b7468
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 16:42:16 2008 +0200

ruby-1.8.6-5kalgan1-i686
- update to patchlevel '287'
- closes #3300

diff --git a/source/devel/ruby/FrugalBuild b/source/devel/ruby/FrugalBuild
index 87d650c..6f537d7 100644
--- a/source/devel/ruby/FrugalBuild
+++ b/source/devel/ruby/FrugalBuild
@@ -4,8 +4,8 @@

pkgname=ruby
pkgver=1.8.6
-pkgextraver=-p111
-pkgrel=4
+pkgextraver=-p287
+pkgrel=5kalgan1
pkgdesc="An object-oriented programming language."
url="http://www.ruby-lang.org/";
depends=('termcap' 'zlib' 'db>=4.6.18' 'readline' 'openssl' 'gdbm')
@@ -14,7 +14,7 @@ groups=('devel')
archs=('i686' 'x86_64')
up2date="lynx -dump http://www.ruby-lang.org/en/downloads/ |grep tar.gz |sed 
-ne 's/.*y-\(.*\).tar.*/\1/;1p' |sed s/$pkgextraver//"
source=(ftp://ftp.ruby-lang.org/pub/ruby/ruby-${pkgver}${pkgextraver}.tar.bz2)
-sha1sums=('d85d25786e0ce30f8f54f5cfa36968ec0f6b9a5f')
+sha1sums=('29b02ccab3c1d6b4a71148ad960e65b5f892fe17')

build() {
Fbuild --enable-shared --enable-pthread \
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] homepage-ng: FSA513-git

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=b1ba57161b752174fec92d3b89c0162572cd3f7f

commit b1ba57161b752174fec92d3b89c0162572cd3f7f
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 16:29:00 2008 +0200

FSA513-git

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 12e7a17..7b2a285 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,16 @@



+   513
+   2008-08-26
+   git
+   1.5.4.3-1
+   1.5.6.4-1kalgan1
+   http://bugs.frugalware.org/task/3305
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3546
+   Stack-based buffer overflow in the (1) diff_addremove and 
(2) diff_change functions in GIT before 1.5.6.4 might allow local users to 
execute arbitrary code via a PATH whose length is larger than the system's 
PATH_MAX when running GIT utilities such as git-diff or git-grep.
+   
+   
512
2008-08-26
amarok
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: docs/security

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=80148288c43197df1b4c43d12b2e3294d5bd30b2

commit 80148288c43197df1b4c43d12b2e3294d5bd30b2
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 16:24:48 2008 +0200

docs/security

fix the order of the steps in the 'How to release an FSA' section

diff --git a/docs/security.txt b/docs/security.txt
index 448b53b..f2a8968 100644
--- a/docs/security.txt
+++ b/docs/security.txt
@@ -23,12 +23,12 @@ issue in -stable and releases a new FSA.

== How to release an FSA?

-. Open the -stable Changelog file of the package. There you can see the
-  vulnerable and unaffected versions of the package.
-
. Check if the backport built by syncpkgd is ready (the binary packages
should be uploaded for each arch).

+. Open the -stable Changelog file of the package. There you can see the
+  vulnerable and unaffected versions of the package.
+
. Add a new entry to the frugalware/xml/security.xml file in the
homepage-ng repo.
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] homepage-ng: FSA512-amarok

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=4818fdb9e07eefce8584a089546c369b1d76d5ba

commit 4818fdb9e07eefce8584a089546c369b1d76d5ba
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 16:22:34 2008 +0200

FSA512-amarok

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 20aec8f..12e7a17 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,17 @@



+   512
+   2008-08-26
+   amarok
+   1.4.8-2
+   1.4.10-1kalgan1
+   http://bugs.frugalware.org/task/3312
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3699
+   A security issue has been reported in Amarok, which can 
be exploited by malicious, local users to perform certain actions with 
escalated privileges.
+   The security issue is caused due to the 
"MagnatuneBrowser::listDownloadComplete()" function handling temporary files in 
an insecure manner. This can be exploited via symlink attacks in combination 
with a race condition to overwrite arbitrary files with the privileges of the 
user running the application.
+   
+   
511
2008-08-26
pdns
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] homepage-ng: FSA511-pdns

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=fba3b7ab0719e5f14cb755451a7853203b1bba48

commit fba3b7ab0719e5f14cb755451a7853203b1bba48
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 16:20:07 2008 +0200

FSA511-pdns

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 4667730..20aec8f 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,17 @@



+   511
+   2008-08-26
+   pdns
+   2.9.21-3
+   2.9.21.1-1kalgan1
+   http://bugs.frugalware.org/task/3309
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337
+   A weakness has been reported in PowerDNS, which can be 
exploited by malicious people to conduct spoofing attacks.
+   The weakness is caused due to the server dropping DNS 
queries for invalid DNS records within a valid domain. This can be exploited to 
facilitate the spoofing of the valid domain on third-party DNS servers.
+   
+   
510
2008-08-26
thunderbird
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] homepage-ng: FSA510-thunderbird

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=927438ac418d1596a2389d642866bf1d9c4c4776

commit 927438ac418d1596a2389d642866bf1d9c4c4776
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 16:18:11 2008 +0200

FSA510-thunderbird

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index a55825c..4667730 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,21 @@



+   510
+   2008-08-26
+   thunderbird
+   2.0.0.14-1kalgan1
+   2.0.0.16-1kalgan1
+   http://bugs.frugalware.org/task/3206
+   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811
+   Some vulnerabilities have been reported in Mozilla 
Thunderbird, which potentially can be exploited by malicious people to 
compromise a user's system.
+   For more information, see FSA509
+   
+   
509
2008-08-26
firefox
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] homepage-ng: FSA509-firefox

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=62ec266a77a3ab9b4d1b8462f49ed9375d0a51ea

commit 62ec266a77a3ab9b4d1b8462f49ed9375d0a51ea
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 16:15:44 2008 +0200

FSA509-firefox

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index e356ab4..a55825c 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,56 @@



+   509
+   2008-08-26
+   firefox
+   2.0.0.14-1kalgan1
+   2.0.0.15-1kalgan1
+   http://bugs.frugalware.org/task/3202
+   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2800
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2801
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2805
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2806
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2808
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2809
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2810
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811
+   Some vulnerabilities have been reported in Mozilla 
Firefox, which can be exploited by malicious people to conduct cross-site 
scripting and spoofing attacks, bypass certain security restrictions, disclose 
sensitive information, or potentially compromise a user's system.
+   1) Multiple errors in the layout and JavaScript engines 
can be exploited to corrupt memory.
+   2) An error in the handling of unprivileged XUL 
documents can be exploited to load Chrome scripts from a "fastload" file via 
"script" elements.
+   3) An error in the "mozIJSSubScriptLoader.LoadScript()" 
function can be exploited to bypass XPCNativeWrappers and run arbitrary code 
with Chrome privileges.
+   Successful exploitation requires that an add-on using 
the affected function is installed.
+   4) An error in the block reflow process can be 
exploited to cause a crash or potentially execute arbitrary code.
+   5) An error in the processing of file URLs contained 
within local directory listings can potentially be exploited to execute 
malicious JavaScript content.
+   6) Multiple errors in the implementation of the 
JavaScript same origin policy can be exploited to execute arbitrary script code 
in the context of a different domain.
+   7) Multiple errors in the verification of signed JAR 
files can be exploited to execute arbitrary JavaScript code with the privileges 
of the JAR's signer.
+   8) An error in the implementation of file upload forms 
can be exploited to upload arbitrary local files to a remote webserver via 
specially crafted "DOM Range" and "originalTarget" elements.
+   9) An error in the Java LiveConnect implementation on 
Mac OS X can be exploited to establish arbitrary socket connections.
+   10) An uninitialized memory access in the processing of 
improperly encoded ".properties" files can potentially be exploited to disclose 
sensitive memory via an add-on using the malformed file.
+   11) An error in the processing of "Alt Names" provided 
by "peer" trusted certificates can be exploited to conduct spoofing attacks.
+   12) An error in the processing of Windows URL shortcuts 
can be exploited to run a remote site as a local file.
+   
+   
+   508
+   2008-08-16
+   postfix
+   2.4.6-1
+   2.4.7-1kalgan1
+   http://bugs.frugalware.org/task/3296
+   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937
+   Sebastian Krahmer has reported some security issues in 
Postfix, which can be exploited by malicious, local users to disclose 
potentially sensitive information and perform certain actions with escalated 
privileges.
+   1) A security issue is caused due to Postfix 
incorrectly handling symlink files. This can be exploited to e.g. append mail 
messages to arbitrary files by creating a hardlink to a symlink 

[Frugalware-git] frugalware-0.8: git-1.5.6.4-1kalgan1-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=3b2ca975630aee47a79a6fa9b0e6d54e05f653f3

commit 3b2ca975630aee47a79a6fa9b0e6d54e05f653f3
Author: Miklos Vajna <[EMAIL PROTECTED]>
Date:   Tue Aug 26 16:00:54 2008 +0200

git-1.5.6.4-1kalgan1-i686
- secfix bump
- closes #3305

diff --git a/source/devel-extra/git/FrugalBuild 
b/source/devel-extra/git/FrugalBuild
index f2e24a3..a3dd774 100644
--- a/source/devel-extra/git/FrugalBuild
+++ b/source/devel-extra/git/FrugalBuild
@@ -8,11 +8,11 @@ USE_DEVEL=${USE_DEVEL:-"n"}
USE_HTMLMAN=${USE_HTMLMAN:-"y"}

pkgname=git
-pkgver=1.5.4.3
+pkgver=1.5.6.4
Fuse $USE_DEVEL && pkgver=1.5.4.rc5
-pkgrel=1
+pkgrel=1kalgan1
pkgdesc="A fast, scalable, distributed revision control system."
-url="http://www.kernel.org/pub/software/scm/git/";
+url="http://www.hu.kernel.org/pub/software/scm/git/";
depends=('curl>=7.16.0' 'openssl' 'perl>=5.10.0')
backup=(etc/sysconfig/git)
makedepends=('asciidoc' 'docbook-xsl>=1.73.0-2' 'docbook-xml' 'docbook2x' 
'sgml-common' 'xmlto' 'cpio')
@@ -66,7 +66,7 @@ build()
Fconf
make V=1 CLFAGS="$CFLAGS" ASCIIDOC8=YesPlease \
ETC_GITCONFIG=/etc/gitconfig DOCBOOK2X_TEXI=docbook2texi \
-   all doc info test || return 1
+   all doc info || return 1
Fmakeinstall install-doc install-info ETC_GITCONFIG=/etc/gitconfig 
mandir=/usr/share/man
Ffilerel perl/private-Error.pm /usr/lib/perl5/site_perl/current/Error.pm
make -C Documentation WEBDOC_DEST=$Fdestdir/usr/share/doc/$pkgname-$pkgver 
install-webdoc || return 1
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git