[Frugalware-git] frugalware-current: clanlib-legacy-0.6.5_1-4-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=69747d8682e9252ffac1c20a38c9c37282e24ece commit 69747d8682e9252ffac1c20a38c9c37282e24ece Author: Priyank <[EMAIL PROTECTED]> Date: Wed Aug 27 11:33:41 2008 +0530 clanlib-legacy-0.6.5_1-4-i686 * Added a patch to fix build with gcc43 diff --git a/source/xlib-extra/clanlib-legacy/FrugalBuild b/source/xlib-extra/clanlib-legacy/FrugalBuild index 42b50b9..d2fcd46 100644 --- a/source/xlib-extra/clanlib-legacy/FrugalBuild +++ b/source/xlib-extra/clanlib-legacy/FrugalBuild @@ -3,7 +3,7 @@ pkgname=clanlib-legacy pkgver=0.6.5_1 -pkgrel=3 +pkgrel=4 pkgdesc="ClanLib is a cross platform game development library." url="http://www.clanlib.org/"; license="LGPL-2" @@ -17,13 +17,14 @@ up2date="lynx -dump 'http://clanlib.org/download/legacy/?C=N;O=D'|grep -m1 'Clan source=(http://clanlib.org/download/legacy/ClanLib-`echo ${pkgver} | sed 's/_/-/'`.tar.gz \ clanlib-0.6.5-freetype.patch clanlib-0.6.5-gcc3.patch \ clanlib-0.6.5-gcc41.patch clanlib-0.6.5-DirectFB-update.patch \ - clanlib-0.6.5-DirectFB-ALTGR.patch) + clanlib-0.6.5-DirectFB-ALTGR.patch clanlib-0.6.5-gcc43.patch) sha1sums=('d3a8558c1f8b652742636e4712b5b9911f74e4d8' \ - 'fe6251df44716347dc28c018f6fd8bc9b1445f1b' \ - '682426d4826c47be9d92931a3957822b2da940d7' \ - 'e651201db3a78edf12465f395d4917c987495876' \ - '7f2c4885c334f029b8a7f102a211d405d244d685' \ - '25157aa5a79500ad85b60626eb361cecb79f5925') + 'fe6251df44716347dc28c018f6fd8bc9b1445f1b' \ + '682426d4826c47be9d92931a3957822b2da940d7' \ + 'e651201db3a78edf12465f395d4917c987495876' \ + '7f2c4885c334f029b8a7f102a211d405d244d685' \ + '25157aa5a79500ad85b60626eb361cecb79f5925' \ + '94729759cd759ec48403e86ccb7f898ddfacc325') _F_cd_path="ClanLib-`echo $pkgver | sed 's/_.*//'`" Fconfopts="[EMAIL PROTECTED] --enable-smalljpeg --enable-clansound --enable-network \ --enable-dyn --enable-x11 --enable-opengl --enable-vorbis \ diff --git a/source/xlib-extra/clanlib-legacy/clanlib-0.6.5-gcc43.patch b/source/xlib-extra/clanlib-legacy/clanlib-0.6.5-gcc43.patch new file mode 100644 index 000..86f2d7d --- /dev/null +++ b/source/xlib-extra/clanlib-legacy/clanlib-0.6.5-gcc43.patch @@ -0,0 +1,332 @@ +diff -Naur ClanLib-0.6.5/Sources/API/Display/Display/pixeldata.h ClanLib-0.6.5.new/Sources/API/Display/Display/pixeldata.h +--- ClanLib-0.6.5/Sources/API/Display/Display/pixeldata.h 2001-11-01 19:26:50.0 +0530 ClanLib-0.6.5.new/Sources/API/Display/Display/pixeldata.h 2008-08-27 10:43:26.0 +0530 +@@ -18,7 +18,7 @@ + + #ifndef header_pixeldata + #define header_pixeldata +- ++#include + #include + #include + #include +diff -Naur ClanLib-0.6.5/Sources/Core/IOData/Generic/datafile_inputprovider.cpp ClanLib-0.6.5.new/Sources/Core/IOData/Generic/datafile_inputprovider.cpp +--- ClanLib-0.6.5/Sources/Core/IOData/Generic/datafile_inputprovider.cpp 2002-03-01 03:42:56.0 +0530 ClanLib-0.6.5.new/Sources/Core/IOData/Generic/datafile_inputprovider.cpp 2008-08-27 10:32:01.0 +0530 +@@ -24,6 +24,7 @@ + + #include + #include ++#include + + #ifdef WIN32 + #define OPENFLAGS O_RDONLY|O_BINARY +diff -Naur ClanLib-0.6.5/Sources/Core/IOData/Generic/inputsource_memory_generic.cpp ClanLib-0.6.5.new/Sources/Core/IOData/Generic/inputsource_memory_generic.cpp +--- ClanLib-0.6.5/Sources/Core/IOData/Generic/inputsource_memory_generic.cpp 2001-12-12 02:14:21.0 +0530 ClanLib-0.6.5.new/Sources/Core/IOData/Generic/inputsource_memory_generic.cpp 2008-08-27 10:37:22.0 +0530 +@@ -13,7 +13,7 @@ + */ + + #include "Core/precomp.h" +- ++#include + #include "API/Core/System/cl_assert.h" + #include "inputsource_memory_generic.h" + #include "outputsource_memory_generic.h" +diff -Naur ClanLib-0.6.5/Sources/Core/IOData/Generic/inputsource_provider_file.cpp ClanLib-0.6.5.new/Sources/Core/IOData/Generic/inputsource_provider_file.cpp +--- ClanLib-0.6.5/Sources/Core/IOData/Generic/inputsource_provider_file.cpp 2008-08-27 10:35:44.0 +0530 ClanLib-0.6.5.new/Sources/Core/IOData/Generic/inputsource_provider_file.cpp 2008-08-27 10:35:55.0 +0530 +@@ -18,7 +18,7 @@ + #else + #include + #endif +- ++#include + #include + #include + +diff -Naur ClanLib-0.6.5/Sources/Core/IOData/Generic/outputsource_memory_generic.cpp ClanLib-0.6.5.new/Sources/Core/IOData/Generic/outputsource_memory_generic.cpp +--- ClanLib-0.6.5/Sources/Core/IOData/Generic/outputsource_memory_generic.cpp 2001-04-29 22:34:28.0 +0530 ClanLib-0.6.5.new/Sources/Core/IOData/Generic/outputsource_memory_generic.cpp 2008-08-27 10:38:51.0 +0530 +@@ -11,7 +11,7 @@ + + + */ +- ++#include + #include "Core/precomp.h" + + #include "API/Core/System/cl_assert.h" +diff -Naur Clan
[Frugalware-git] frugalware-current: util-linux-ng-2.14-4-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=66b858b78e3663611a2a2d6a7a001826e6ed9f31 commit 66b858b78e3663611a2a2d6a7a001826e6ed9f31 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Wed Aug 27 00:55:53 2008 +0200 util-linux-ng-2.14-4-i686 - pkgrel++ to have the fixed scriptlet in the fpm diff --git a/source/base/util-linux-ng/FrugalBuild b/source/base/util-linux-ng/FrugalBuild index d2cf296..9c6fd11 100644 --- a/source/base/util-linux-ng/FrugalBuild +++ b/source/base/util-linux-ng/FrugalBuild @@ -3,7 +3,7 @@ pkgname=util-linux-ng pkgver=2.14 -pkgrel=3 +pkgrel=4 pkgdesc="Miscellaneous system utilities for Linux" url="http://www.kernel.org/pub/linux/utils/util-linux-ng"; backup=('etc/sysconfig/console' 'etc/sysconfig/numlock') ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: tetex-3.0-16-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=6683dbe78c7e1f8cc4a2a85982dcabc5792fe2d8 commit 6683dbe78c7e1f8cc4a2a85982dcabc5792fe2d8 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Wed Aug 27 00:51:01 2008 +0200 tetex-3.0-16-i686 - install scriptlet: /usr/info -> /usr/share/info diff --git a/source/xapps-extra/tetex/FrugalBuild b/source/xapps-extra/tetex/FrugalBuild index 5c25147..b99fc50 100644 --- a/source/xapps-extra/tetex/FrugalBuild +++ b/source/xapps-extra/tetex/FrugalBuild @@ -4,7 +4,7 @@ pkgname=tetex pkgver=3.0 -pkgrel=15 +pkgrel=16 pkgdesc="teTeX is a complete TeX distribution for UNIX compatible systems - base files, libraries, fonts" url="http://www.tug.org/teTeX/"; depends=('libstdc++' 'libxp' 'libxmu' 'libxft' 'libxpm' 'freetype2' 'fontconfig' 'expat' 'openmotif>=2.3.0' 'zlib' 'libpng' 'tetex-kpathsea') @@ -74,12 +74,12 @@ EOF Fmv usr/share/texmf/ls-R usr/share/texmf/ls-R.tetex-bin.orig #cp $startdir/src/haltp.tex $startdir/pkg/usr/share/texmf/doc - Frm usr/info/dir + Frm usr/share/info/dir # Remove conflicting files with texet-kpathsea Frm usr/bin/{kpseaccess,kpsereadlink,kpsestat,kpsewhich,mktexlsr,mktexmf,mktexpk,mktextfm} Frm usr/include/kpathsea - Frm usr/info/kpathsea.info + Frm usr/share/info/kpathsea.info Frm usr/lib/libkpathsea.* Frm usr/man/man1/{kpseaccess,kpsereadlink,kpsestat,kpsewhich,mktexlsr,mktexmf,mktexpk,mktextfm}.* } diff --git a/source/xapps-extra/tetex/tetex.install b/source/xapps-extra/tetex/tetex.install index bc60102..dac7cf7 100644 --- a/source/xapps-extra/tetex/tetex.install +++ b/source/xapps-extra/tetex/tetex.install @@ -2,21 +2,21 @@ post_install() { echo "Creating ls-R database with mktexlsr..." /usr/bin/mktexlsr echo "generating the top-level Info node... " - mkinfodir /usr/info > /usr/info/dir 2>/dev/null + mkinfodir /usr/share/info > /usr/share/info/dir 2>/dev/null } post_upgrade() { echo "Creating ls-R database with mktexlsr..." /usr/bin/mktexlsr echo "generating the top-level Info node... " - mkinfodir /usr/info > /usr/info/dir 2>/dev/null + mkinfodir /usr/share/info > /usr/share/info/dir 2>/dev/null } post_remove() { rm /usr/share/texmf/doc/haltp.* /usr/share/texmf/web2c/latex.fmt /usr/share/texmf/web2c/latex.log &>/dev/null echo "generating the top-level Info node... " - mkinfodir /usr/info > /usr/info/dir 2>/dev/null + mkinfodir /usr/share/info > /usr/share/info/dir 2>/dev/null } ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: libgtop-2.22.3-2-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=4a7f15b0a65ce99b6b9f55eebb29b38f516bb4c3 commit 4a7f15b0a65ce99b6b9f55eebb29b38f516bb4c3 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Wed Aug 27 00:42:19 2008 +0200 libgtop-2.22.3-2-i686 - use Finclude tetex diff --git a/source/xlib/libgtop/FrugalBuild b/source/xlib/libgtop/FrugalBuild index 2c55876..d94ee5b 100644 --- a/source/xlib/libgtop/FrugalBuild +++ b/source/xlib/libgtop/FrugalBuild @@ -3,14 +3,14 @@ pkgname=libgtop pkgver=2.22.3 -pkgrel=1 +pkgrel=2 pkgdesc="A library that read information about processes and the running system" url="http://www.gnome.org/"; depends=('glib2>=2.16.3' 'popt' 'texinfo' 'libxau') makedepends=('libxt' 'perl-xml-parser' 'gtk-doc' 'intltool') groups=('xlib') archs=('i686' 'x86_64') -Finclude gnome +Finclude gnome texinfo Fconfopts="$Fconfopts --enable-debug=no --enable-fatal-warnings=no" sha1sums=('cc172b78f11c19cb4ba7ed3b55a34283f6f63d50') diff --git a/source/xlib/libgtop/libgtop.install b/source/xlib/libgtop/libgtop.install deleted file mode 100644 index da40cae..000 --- a/source/xlib/libgtop/libgtop.install +++ /dev/null @@ -1,18 +0,0 @@ -post_install() { - echo -n "generating the top-level Info node... " - mkinfodir /usr/info > /usr/info/dir - echo "done." -} - -post_upgrade() { - post_install -} - -post_remove() { - post_install -} - -op=$1 -shift - -$op $* ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: libmikmod-3.1.11-8-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=7b1b156e06bcde85941bb880581a46127a947e40 commit 7b1b156e06bcde85941bb880581a46127a947e40 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Wed Aug 27 00:40:17 2008 +0200 libmikmod-3.1.11-8-i686 - use Finclude texinfo diff --git a/source/lib/libmikmod/FrugalBuild b/source/lib/libmikmod/FrugalBuild index 36b9bfe..0a4d2c8 100644 --- a/source/lib/libmikmod/FrugalBuild +++ b/source/lib/libmikmod/FrugalBuild @@ -4,7 +4,7 @@ pkgname=libmikmod pkgver=3.1.11 -pkgrel=7 +pkgrel=8 pkgdesc="A module sound player and library" url="http://mikmod.raphnet.net/"; groups=('lib') @@ -17,6 +17,7 @@ source=(http://mikmod.raphnet.net/files/$pkgname-$pkgver.tar.gz libmikmod-3.1.11 sha1sums=('ca18fff19348d3bcf3550aa920b129b082c5069a' \ '3df6cdfa3f8f97094a21b23e35dcc671fdb28408' \ '22c9f0aed6415612ed2b16d2eaed31a22207aeef') +Finclude texinfo build() { diff --git a/source/lib/libmikmod/libmikmod.install b/source/lib/libmikmod/libmikmod.install deleted file mode 100644 index 2336955..000 --- a/source/lib/libmikmod/libmikmod.install +++ /dev/null @@ -1,18 +0,0 @@ -post_install() { - echo -n "generating the top-level Info node... " - mkinfodir /usr/info > /usr/info/dir 2>/dev/null - echo "done." -} - -post_upgrade() { - post_install -} - -post_remove() { - post_install -} - -op=$1 -shift - -$op $* ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: glib-1.2.10-6-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=af3c1c97275982aaf7c06fcaa80e5b4764f5e088 commit af3c1c97275982aaf7c06fcaa80e5b4764f5e088 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Wed Aug 27 00:37:41 2008 +0200 glib-1.2.10-6-i686 - use Finclude texinfo diff --git a/source/lib/glib/FrugalBuild b/source/lib/glib/FrugalBuild index d8bb16f..1cf86af 100644 --- a/source/lib/glib/FrugalBuild +++ b/source/lib/glib/FrugalBuild @@ -4,7 +4,7 @@ pkgname=glib pkgver=1.2.10 -pkgrel=5 +pkgrel=6 pkgdesc="Common C routines used by Gtk+ and other libs" url="http://www.gnome.org/"; depends=('glibc') @@ -17,6 +17,7 @@ source=(ftp://ftp.gtk.org/pub/gtk/v$preup2date/$pkgname-$pkgver.tar.gz $pkgname- sha1sums=('e5a9361c594608d152d5d9650154c2e3260b87fa' \ '07bd9ef15c3d4a3d5b6e054d46d4642d5c7f1bed' \ '68cb3f3080db37290d212ddc78757612049d3094') +Finclude texinfo build() { Fcd diff --git a/source/lib/glib/glib.install b/source/lib/glib/glib.install deleted file mode 100644 index bfe624e..000 --- a/source/lib/glib/glib.install +++ /dev/null @@ -1,18 +0,0 @@ -post_install() { - echo -n "generating the top-level Info node... " - mkinfodir /usr/info > /usr/info/dir 2> /dev/null - echo "done." -} - -post_upgrade() { - post_install -} - -post_remove() { - post_install -} - -op=$1 -shift - -$op $* ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: aalib-1.4rc5-4-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=120f987d020329b4047664e3fb908cf980f8bdb9 commit 120f987d020329b4047664e3fb908cf980f8bdb9 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Wed Aug 27 00:36:11 2008 +0200 aalib-1.4rc5-4-i686 - use Finclude texinfo diff --git a/source/lib/aalib/FrugalBuild b/source/lib/aalib/FrugalBuild index 58ca532..10d27fc 100644 --- a/source/lib/aalib/FrugalBuild +++ b/source/lib/aalib/FrugalBuild @@ -4,14 +4,14 @@ pkgname=aalib pkgver=1.4rc5 -pkgrel=3 +pkgrel=4 pkgdesc="A portable ascii art graphics library." groups=('lib') archs=('i686' 'x86_64') depends=('glibc' 'gpm>=1.20.5-2' 'ncurses') _F_cd_path="$pkgname-1.4.0" _F_sourceforge_dirname=aa-project -Finclude sourceforge +Finclude sourceforge texinfo url="http://aa-project.sourceforge.net/aalib/"; up2date="lynx -dump 'http://sourceforge.net/project/showfiles.php?group_id=20003'|grep -m1 'aalib-'|sed 's/.*-\(.*\).t.* .*/\1/'" source=([EMAIL PROTECTED] aalib-m4-fix.patch missing-includes.patch) diff --git a/source/lib/aalib/aalib.install b/source/lib/aalib/aalib.install deleted file mode 100644 index 2336955..000 --- a/source/lib/aalib/aalib.install +++ /dev/null @@ -1,18 +0,0 @@ -post_install() { - echo -n "generating the top-level Info node... " - mkinfodir /usr/info > /usr/info/dir 2>/dev/null - echo "done." -} - -post_upgrade() { - post_install -} - -post_remove() { - post_install -} - -op=$1 -shift - -$op $* ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: grub-0.97-22-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=5b7033462e61182ef525b8b96179b0bce929701f commit 5b7033462e61182ef525b8b96179b0bce929701f Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Wed Aug 27 00:30:09 2008 +0200 grub-0.97-22-i686 - use Finclude texinfo diff --git a/source/base/grub/FrugalBuild b/source/base/grub/FrugalBuild index 809b7af..f993639 100644 --- a/source/base/grub/FrugalBuild +++ b/source/base/grub/FrugalBuild @@ -3,12 +3,11 @@ pkgname=grub pkgver=0.97 -pkgrel=21 +pkgrel=22 pkgdesc="The GNU GRand Unified Bootloader" url="http://www.gnu.org/software/grub/"; depends=('texinfo') [ "$CARCH" == "i686" ] && depends=([EMAIL PROTECTED] 'ncurses' 'mktemp') -#makedepends=('gfxboot>=3.3.22' 'perl-html-parser' 'cpio') [ "$CARCH" == "x86_64" ] && makedepends=([EMAIL PROTECTED] 'ncurses' 'mktemp') rodepends=('grub-theme-frugalware' 'os-prober') groups=('base') @@ -30,10 +29,7 @@ sha1sums=('2580626c4579bd99336d3af4482c346c95dac4fb' \ 'adbb4685c98797ffb4dc83561ec75698991dddbd' \ '389913c8b09e5882373e7cb233ecfefb7ad3a3cb' \ '56223e12b2460c3390674158eddfb5a14a2efcc6') - -# Original patch was for Debian at: -# http://neverborn.org/files/grub-gfxboot/source/grub-gfxboot/ and -# http://www.morphix.org/debian/source/grub-gfxboot/ +Finclude texinfo build() { @@ -50,21 +46,13 @@ build() --enable-{epic100,exos205,ni5210,lance,ne2100,ni{50,65}10,natsemi} \ --enable-{ne,ns8390,wd,otulip,rtl8139,sis900,sk-g16,smc9000,tiara} \ --enable-{tulip,via-rhine,w89c840} - Ffilerel stage2/stage2 /usr/lib/grub/i386-pc/stage2.netboot - Ffilerel stage2/{nbgrub,pxegrub} /usr/lib/grub/i386-pc/ + Ffilerel stage2/stage2 /usr/lib/grub/i386-frugalware/stage2.netboot + Ffilerel stage2/{nbgrub,pxegrub} /usr/lib/grub/i386-frugalware/ make clean # the normal build Fmake --bindir=/bin --sbindir=/sbin Fmakeinstall - - # message -# cp -a /usr/share/gfxboot/themes/frugalware ./ -# cd frugalware -# make BINDIR=/usr/sbin/ -# cd boot -# Ffilerel /boot/grub/message } # optimization OK - diff --git a/source/base/grub/grub.install b/source/base/grub/grub.install deleted file mode 100644 index 5a9a9f6..000 --- a/source/base/grub/grub.install +++ /dev/null @@ -1,23 +0,0 @@ -post_install() -{ - echo -n "generating the top-level Info node... " - mkinfodir /usr/info > /usr/info/dir 2>/dev/null - echo "done." -} - -post_upgrade() -{ - post_install -} - -post_remove() -{ - post_install -} - -op=$1 -shift - -$op $* - -# vim: ft=sh ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: a2ps-4.14-2-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=ac7410ba08bd5427715c95e9a90f11efbab79244 commit ac7410ba08bd5427715c95e9a90f11efbab79244 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Wed Aug 27 00:23:11 2008 +0200 a2ps-4.14-2-i686 - use Finclude texinfo diff --git a/source/apps/a2ps/FrugalBuild b/source/apps/a2ps/FrugalBuild index 9982930..e90f686 100644 --- a/source/apps/a2ps/FrugalBuild +++ b/source/apps/a2ps/FrugalBuild @@ -5,7 +5,7 @@ pkgname=a2ps pkgver=4.14 pkgextraver= -pkgrel=1 +pkgrel=2 pkgdesc="An Any to PostScript filter" url="http://www.inf.enst.fr/~demaille/a2ps"; depends=('glibc' 'urw-fonts' 'psutils' 'texinfo') @@ -18,6 +18,7 @@ source=(ftp://ftp.gnu.org/gnu/$pkgname/$pkgname-$pkgver.tar.gz \ libtool.patch) sha1sums=('365abbbe4b7128bf70dad16d06e23c5701874852' \ '2cd26284b19f897505b0f344fcd423ab10b76a6f') +Finclude texinfo build() { diff --git a/source/apps/a2ps/a2ps.install b/source/apps/a2ps/a2ps.install deleted file mode 100644 index da40cae..000 --- a/source/apps/a2ps/a2ps.install +++ /dev/null @@ -1,18 +0,0 @@ -post_install() { - echo -n "generating the top-level Info node... " - mkinfodir /usr/info > /usr/info/dir - echo "done." -} - -post_upgrade() { - post_install -} - -post_remove() { - post_install -} - -op=$1 -shift - -$op $* ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: texinfo-4.11-4-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=71644014f9e187ad17c8faf5939d1713b6fce18a commit 71644014f9e187ad17c8faf5939d1713b6fce18a Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Wed Aug 27 00:17:45 2008 +0200 texinfo-4.11-4-i686 - use Finclude texinfo - this silences the warning about non-existing /usr/info on install diff --git a/source/base/texinfo/FrugalBuild b/source/base/texinfo/FrugalBuild index 495e7c0..9962112 100644 --- a/source/base/texinfo/FrugalBuild +++ b/source/base/texinfo/FrugalBuild @@ -4,7 +4,7 @@ pkgname=texinfo pkgver=4.11 -pkgrel=3 +pkgrel=4 pkgdesc="The GNU info program and utilities" url="http://www.gnu.org/software/texinfo/"; depends=('ncurses>=5.6-4' 'net-tools>=1.60-26' 'grep>=2.5.3-4' 'sed>=4.1.5-3' 'udev>=124-2' 'gawk>=3.1.6-3') @@ -17,6 +17,7 @@ Fup2gnubz2 source=(http://ftp.gnu.org/pub/gnu/$pkgname/$pkgname-$pkgver.tar.bz2 mkinfodir) sha1sums=('915a42e1278860b0fa64e4ef9d5ad4488d3b23a0' \ 'd744345f082e32af0675a0b9d3287c6b8d4600a7') +Finclude texinfo build() diff --git a/source/base/texinfo/texinfo.install b/source/base/texinfo/texinfo.install deleted file mode 100644 index 766019d..000 --- a/source/base/texinfo/texinfo.install +++ /dev/null @@ -1,25 +0,0 @@ -post_install() -{ - echo -n "generating the top-level Info node... " - mkinfodir /usr/info > /usr/info/dir 2>/dev/null - echo "done." -} - -post_upgrade() -{ - post_install -} - -pre_remove() -{ - echo -n "removing the top-level Info node... " - rm -f /usr/info/dir - echo "done." -} - -op=$1 -shift - -$op $* - -# vim: ft=sh ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] fwlive: fwlive-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=fwlive.git;a=commitdiff;h=f4b7a79aba71a677d1fc4d04b617b0a1d3aa460d commit f4b7a79aba71a677d1fc4d04b617b0a1d3aa460d Author: Janos Kovacs <[EMAIL PROTECTED]> Date: Tue Aug 26 22:20:00 2008 +0200 fwlive-i686 * other correction to systems * bump to rc2 diff --git a/Makefile b/Makefile index a6e5189..6eae2a4 100644 --- a/Makefile +++ b/Makefile @@ -219,9 +219,9 @@ create-users: checkroot fi live-base: checkroot - echo "Include = /etc/pacman.d/janny" >> ${CHROOTDIR}/${TREE}/etc/pacman-g2.conf; \ - echo "[janny]" > ${CHROOTDIR}/${TREE}/etc/pacman.d/janny; \ - echo "Server = http://ftp.frugalware.org/pub/other/people/janny/fwlive/frugalware-i686/"; >> ${CHROOTDIR}/${TREE}/etc/pacman.d/janny; \ + echo "Include = /etc/pacman-g2/repos/janny" >> ${CHROOTDIR}/${TREE}/etc/pacman-g2.conf; \ + echo "[janny]" > ${CHROOTDIR}/${TREE}/etc/pacman-g2/repos/janny; \ + echo "Server = http://ftp.frugalware.org/pub/other/people/janny/fwlive/frugalware-i686/"; >> ${CHROOTDIR}/${TREE}/etc/pacman-g2/repos/janny; \ cp -a live-base ${CHROOTDIR}/${TREE}/tmp/ mkdir -p ${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/grub ${CHROOTDIR}/${TREE}/tmp/live-base/initrd/rootfs/{lib,bin,etc} ln -sf configsave ${CHROOTDIR}/${TREE}/usr/local/bin/configrestore @@ -260,7 +260,7 @@ ifeq ($(CONFIG_SETUP),y) cp ${SETUPKERNEL} ${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/ cp ${SETUPINITRD} ${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/ endif - cp ${CHROOTDIR}/${TREE}/usr/lib/grub/i386-pc/stage2_eltorito ${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/grub/ + cp ${CHROOTDIR}/${TREE}/usr/lib/grub/i386-frugalware/stage2_eltorito ${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/grub/ cp ${CHROOTDIR}/${TREE}/boot/grub/message-fwlive ${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/grub/message cp menu.lst ${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/grub/ sed -i "s|@GRUBTITLE@|${FWLSREL} ${FWREL}|" ${CHROOTDIR}/${TREE}/tmp/live-base/cd-root/boot/grub/menu.lst diff --git a/config b/config index a026f1e..f93f759 100644 --- a/config +++ b/config @@ -6,7 +6,7 @@ # repos to be included in the chroot. probably you want "current" or "stable". # use a come-separated list if you want to list multiple repos. the first one # takes precedence -TREE = stable +TREE = testing # default language, in an xx_YY form FWLLLANG = en_US @@ -37,8 +37,8 @@ FWVER = $(shell date +%Y%m%d) FWCODENAME = -current endif ifeq ($(findstring testing,$(TREE)),testing) -FWVER = 0.8 -FWCODENAME = Kalgan +FWVER = 0.9rc2 +FWCODENAME = Solaria endif FWVER ?= 0.8 FWCODENAME ?= Kalgan @@ -48,7 +48,7 @@ FWREL = ${FWVER} (${FWCODENAME}) ISONAME = ${FWLHOST}-${FWVER}-$(shell uname -m)-$(shell echo ${APPSGROUP}|tr [A-Z] [a-z]).iso # codename of the livecd, used in /etc/issue and /etc/fwlive-release -FWLCODENAME = Voyager +FWLCODENAME = Tibet # Vendor name (used in /etc/issue only) VENDOR = Frugalware @@ -69,9 +69,9 @@ SAVEDIRS = etc home lib root usr var CONFIG_SETUP = y # additional packages to be installed by the profiles -# no builded pkgs: truecrypt-fwlive -DRIVERS = gspcav1-fwlive qc-usb-fwlive dazuko-fwlive busybox-fwlive lirc-fwlive \ - acerhk-fwlive redirfs-fwlive madwifi-fwlive wlan-ng-fwlive busybox-fwlive \ +# no builded pkgs: truecrypt-fwlive acerhk-fwlive lirc-fwlive +DRIVERS = gspcav1-fwlive qc-usb-fwlive dazuko-fwlive busybox-fwlive \ + redirfs-fwlive madwifi-fwlive wlan-ng-fwlive busybox-fwlive \ ndiswrapper-fwlive kqemu-fwlive acx100-fwlive INST_MUSTHAVE_APPS = busybox-fwlive util-linux-ng grub-theme-fwlive \ sudo aufs squashfs cdrtools ntfs-3g ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-0.8: libxslt-1.1.22-2kalgan2-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=6ef5f3207cd36ecfe39690e1ab75cdb6067476ba commit 6ef5f3207cd36ecfe39690e1ab75cdb6067476ba Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 18:14:46 2008 +0200 libxslt-1.1.22-2kalgan2-i686 - added CVE-2008-2935.patch - closes #3285 diff --git a/source/lib/libxslt/CVE-2008-2935.patch b/source/lib/libxslt/CVE-2008-2935.patch new file mode 100644 index 000..c9ab232 --- /dev/null +++ b/source/lib/libxslt/CVE-2008-2935.patch @@ -0,0 +1,152 @@ +Index: libexslt/crypto.c +=== +--- libexslt/crypto.c (revision 1479) libexslt/crypto.c (working copy) +@@ -595,11 +595,13 @@ exsltCryptoRc4EncryptFunction (xmlXPathP + int str_len = 0, bin_len = 0, hex_len = 0; + xmlChar *key = NULL, *str = NULL, *padkey = NULL; + xmlChar *bin = NULL, *hex = NULL; ++xsltTransformContextPtr tctxt = NULL; + +-if ((nargs < 1) || (nargs > 3)) { ++if (nargs != 2) { + xmlXPathSetArityError (ctxt); + return; + } ++tctxt = xsltXPathGetTransformContext(ctxt); + + str = xmlXPathPopString (ctxt); + str_len = xmlUTF8Strlen (str); +@@ -611,7 +613,7 @@ exsltCryptoRc4EncryptFunction (xmlXPathP + } + + key = xmlXPathPopString (ctxt); +-key_len = xmlUTF8Strlen (str); ++key_len = xmlUTF8Strlen (key); + + if (key_len == 0) { + xmlXPathReturnEmptyString (ctxt); +@@ -620,15 +622,33 @@ exsltCryptoRc4EncryptFunction (xmlXPathP + return; + } + +-padkey = xmlMallocAtomic (RC4_KEY_LENGTH); ++padkey = xmlMallocAtomic (RC4_KEY_LENGTH + 1); ++if (padkey == NULL) { ++ xsltTransformError(tctxt, NULL, tctxt->inst, ++ "exsltCryptoRc4EncryptFunction: Failed to allocate padkey\n"); ++ tctxt->state = XSLT_STATE_STOPPED; ++ xmlXPathReturnEmptyString (ctxt); ++ goto done; ++} ++memset(padkey, 0, RC4_KEY_LENGTH + 1); ++ + key_size = xmlUTF8Strsize (key, key_len); ++if ((key_size > RC4_KEY_LENGTH) || (key_size < 0)) { ++ xsltTransformError(tctxt, NULL, tctxt->inst, ++ "exsltCryptoRc4EncryptFunction: key size too long or key broken\n"); ++ tctxt->state = XSLT_STATE_STOPPED; ++ xmlXPathReturnEmptyString (ctxt); ++ goto done; ++} + memcpy (padkey, key, key_size); +-memset (padkey + key_size, '\0', sizeof (padkey)); + + /* encrypt it */ + bin_len = str_len; + bin = xmlStrdup (str); + if (bin == NULL) { ++ xsltTransformError(tctxt, NULL, tctxt->inst, ++ "exsltCryptoRc4EncryptFunction: Failed to allocate string\n"); ++ tctxt->state = XSLT_STATE_STOPPED; + xmlXPathReturnEmptyString (ctxt); + goto done; + } +@@ -638,6 +658,9 @@ exsltCryptoRc4EncryptFunction (xmlXPathP + hex_len = str_len * 2 + 1; + hex = xmlMallocAtomic (hex_len); + if (hex == NULL) { ++ xsltTransformError(tctxt, NULL, tctxt->inst, ++ "exsltCryptoRc4EncryptFunction: Failed to allocate result\n"); ++ tctxt->state = XSLT_STATE_STOPPED; + xmlXPathReturnEmptyString (ctxt); + goto done; + } +@@ -670,11 +693,13 @@ exsltCryptoRc4DecryptFunction (xmlXPathP + int str_len = 0, bin_len = 0, ret_len = 0; + xmlChar *key = NULL, *str = NULL, *padkey = NULL, *bin = + NULL, *ret = NULL; ++xsltTransformContextPtr tctxt = NULL; + +-if ((nargs < 1) || (nargs > 3)) { ++if (nargs != 2) { + xmlXPathSetArityError (ctxt); + return; + } ++tctxt = xsltXPathGetTransformContext(ctxt); + + str = xmlXPathPopString (ctxt); + str_len = xmlUTF8Strlen (str); +@@ -686,7 +711,7 @@ exsltCryptoRc4DecryptFunction (xmlXPathP + } + + key = xmlXPathPopString (ctxt); +-key_len = xmlUTF8Strlen (str); ++key_len = xmlUTF8Strlen (key); + + if (key_len == 0) { + xmlXPathReturnEmptyString (ctxt); +@@ -695,22 +720,51 @@ exsltCryptoRc4DecryptFunction (xmlXPathP + return; + } + +-padkey = xmlMallocAtomic (RC4_KEY_LENGTH); ++padkey = xmlMallocAtomic (RC4_KEY_LENGTH + 1); ++if (padkey == NULL) { ++ xsltTransformError(tctxt, NULL, tctxt->inst, ++ "exsltCryptoRc4EncryptFunction: Failed to allocate padkey\n"); ++ tctxt->state = XSLT_STATE_STOPPED; ++ xmlXPathReturnEmptyString (ctxt); ++ goto done; ++} ++memset(padkey, 0, RC4_KEY_LENGTH + 1); + key_size = xmlUTF8Strsize (key, key_len); ++if ((key_size > RC4_KEY_LENGTH) || (key_size < 0)) { ++ xsltTransformError(tctxt, NULL, tctxt->inst, ++ "exsltCryptoRc4EncryptFunction: key size too long or key broken\n"); ++ tctxt->state = XSLT_STATE_STOPPED; ++ xmlXPathReturnEmptyString (ctxt); ++ goto done; ++} + memcpy (padkey, key, key_size); +-memset (padkey + key_size, '\0', sizeof (padkey)); + + /* decode hex to binary */ + bin_len = str_len; + bin = xmlMallocAtomic (bin_len); ++if (bin =
[Frugalware-git] frugalware-0.8: python-2.5.2-2kalgan2-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=8743fd062258b92c2e0f88d32eaf741cc5ac5d26 commit 8743fd062258b92c2e0f88d32eaf741cc5ac5d26 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 17:57:04 2008 +0200 python-2.5.2-2kalgan2-i686 - added CVE-2008-2315, CVE-2008-2316, CVE-2008-3142 and CVE-2008-3144 - closes #3286 diff --git a/source/devel/python/CVE-2008-2315.patch b/source/devel/python/CVE-2008-2315.patch new file mode 100644 index 000..19a654b --- /dev/null +++ b/source/devel/python/CVE-2008-2315.patch @@ -0,0 +1,581 @@ +Index: Python-2.5.2/Objects/unicodeobject.c +=== +--- Python-2.5.2.orig/Objects/unicodeobject.c Python-2.5.2/Objects/unicodeobject.c +@@ -240,6 +240,11 @@ PyUnicodeObject *_PyUnicode_New(Py_ssize + return unicode_empty; + } + ++/* Ensure we won't overflow the size. */ ++if (length > ((PY_SSIZE_T_MAX / sizeof(Py_UNICODE)) - 1)) { ++return (PyUnicodeObject *)PyErr_NoMemory(); ++} ++ + /* Unicode freelist & memory allocation */ + if (unicode_freelist) { + unicode = unicode_freelist; +@@ -1102,6 +1107,9 @@ PyObject *PyUnicode_EncodeUTF7(const Py_ + char * out; + char * start; + ++if (cbAllocated / 5 != size) ++return PyErr_NoMemory(); ++ + if (size == 0) + return PyString_FromStringAndSize(NULL, 0); + +@@ -1700,8 +1708,9 @@ PyUnicode_EncodeUTF16(const Py_UNICODE * + { + PyObject *v; + unsigned char *p; ++Py_ssize_t nsize, bytesize; + #ifdef Py_UNICODE_WIDE +-int i, pairs; ++Py_ssize_t i, pairs; + #else + const int pairs = 0; + #endif +@@ -1724,8 +1733,15 @@ PyUnicode_EncodeUTF16(const Py_UNICODE * + if (s[i] >= 0x1) + pairs++; + #endif +-v = PyString_FromStringAndSize(NULL, +-2 * (size + pairs + (byteorder == 0))); ++/* 2 * (size + pairs + (byteorder == 0)) */ ++if (size > PY_SSIZE_T_MAX || ++ size > PY_SSIZE_T_MAX - pairs - (byteorder == 0)) ++ return PyErr_NoMemory(); ++nsize = (size + pairs + (byteorder == 0)); ++bytesize = nsize * 2; ++if (bytesize / 2 != nsize) ++ return PyErr_NoMemory(); ++v = PyString_FromStringAndSize(NULL, bytesize); + if (v == NULL) + return NULL; + +@@ -2053,6 +2069,11 @@ PyObject *unicodeescape_string(const Py_ + char *p; + + static const char *hexdigit = "0123456789abcdef"; ++#ifdef Py_UNICODE_WIDE ++const Py_ssize_t expandsize = 10; ++#else ++const Py_ssize_t expandsize = 6; ++#endif + + /* Initial allocation is based on the longest-possible unichr +escape. +@@ -2068,13 +2089,12 @@ PyObject *unicodeescape_string(const Py_ +escape. + */ + ++if (size > (PY_SSIZE_T_MAX - 2 - 1) / expandsize) ++ return PyErr_NoMemory(); ++ + repr = PyString_FromStringAndSize(NULL, + 2 +-#ifdef Py_UNICODE_WIDE +-+ 10*size +-#else +-+ 6*size +-#endif +++ expandsize*size + + 1); + if (repr == NULL) + return NULL; +@@ -2315,12 +2335,16 @@ PyObject *PyUnicode_EncodeRawUnicodeEsca + char *q; + + static const char *hexdigit = "0123456789abcdef"; +- + #ifdef Py_UNICODE_WIDE +-repr = PyString_FromStringAndSize(NULL, 10 * size); ++const Py_ssize_t expandsize = 10; + #else +-repr = PyString_FromStringAndSize(NULL, 6 * size); ++const Py_ssize_t expandsize = 6; + #endif ++ ++if (size > PY_SSIZE_T_MAX / expandsize) ++ return PyErr_NoMemory(); ++ ++repr = PyString_FromStringAndSize(NULL, expandsize * size); + if (repr == NULL) + return NULL; + if (size == 0) +@@ -4730,6 +4754,11 @@ PyUnicodeObject *pad(PyUnicodeObject *se + return self; + } + ++if (left > PY_SSIZE_T_MAX - self->length || ++ right > PY_SSIZE_T_MAX - (left + self->length)) { ++PyErr_SetString(PyExc_OverflowError, "padded string is too long"); ++return NULL; ++} + u = _PyUnicode_New(left + self->length + right); + if (u) { + if (left) +Index: Python-2.5.2/Objects/tupleobject.c +=== +--- Python-2.5.2.orig/Objects/tupleobject.c Python-2.5.2/Objects/tupleobject.c +@@ -60,11 +60,12 @@ PyTuple_New(register Py_ssize_t size) + Py_ssize_t nbytes = size * sizeof(PyObject *); + /* Check for overflow */ + if (nbytes / sizeof(PyObject *) != (size_t)size || +- (nbytes += sizeof(PyTupleObject) - sizeof(PyObject *)) +- <= 0) ++ (nbytes > PY_SSIZE_T_MAX - sizeof(PyTupleObject) - sizeof(PyObject *))) + { + return PyErr_NoMemory(); + } ++ nbytes += sizeof(PyTupleObject) - sizeof(PyObject *); ++ + op = PyObject_GC_NewVar(PyTupleObject, &PyTuple_Type, size); + if (
[Frugalware-git] frugalware-0.8: apache-2.2.8-2kalgan2-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=0440167e58f731710bf757370cfe9348a4882a12 commit 0440167e58f731710bf757370cfe9348a4882a12 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 17:33:07 2008 +0200 apache-2.2.8-2kalgan2-i686 - add CVE-2008-2939.patch - closes #3307 diff --git a/source/network/apache/CVE-2008-2939.patch b/source/network/apache/CVE-2008-2939.patch new file mode 100644 index 000..ddf5c6a --- /dev/null +++ b/source/network/apache/CVE-2008-2939.patch @@ -0,0 +1,10 @@ +--- 2.2.x/modules/proxy/mod_proxy_ftp.c2008/08/05 19:00:05 682869 2.2.x/modules/proxy/mod_proxy_ftp.c2008/08/05 19:01:50 682870 +@@ -383,6 +383,7 @@ +c->bucket_alloc)); + } + if (wildcard != NULL) { ++wildcard = ap_escape_html(p, wildcard); + APR_BRIGADE_INSERT_TAIL(out, apr_bucket_pool_create(wildcard, +strlen(wildcard), p, +c->bucket_alloc)); diff --git a/source/network/apache/FrugalBuild b/source/network/apache/FrugalBuild index 3247385..a2d8c1b 100644 --- a/source/network/apache/FrugalBuild +++ b/source/network/apache/FrugalBuild @@ -4,7 +4,7 @@ pkgname=apache pkgver=2.2.8 -pkgrel=2kalgan1 +pkgrel=2kalgan2 pkgdesc="A high performance Unix-based HTTP server (with SSL)" url="http://httpd.apache.org/"; backup=(etc/httpd/conf/{httpd.conf,ssl.conf,ssl.crt/server.crt,ssl.csr/server.csr,ssl.key/server.key} \ @@ -19,8 +19,8 @@ source=(http://archive.apache.org/dist/httpd/httpd-$pkgver.tar.bz2 \ http://ftp.frugalware.org/pub/other/sources/apache/mkcert.tar.gz \ rc.httpd rc.httpd-hu.po httpd.conf ssl.conf \ README.Frugalware index.html http://frugalware.org/images/frugalware.png \ - CVE-2008-2364.patch) -signatures=($source.asc '' '' '' '' '' '' '' '' '') + CVE-2008-2364.patch CVE-2008-2939.patch) +signatures=($source.asc '' '' '' '' '' '' '' '' '' '') # svn web interface: # http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/ ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-0.8: links-2.1-1kalgan1-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=d2a6c6be269f34ae56ad10e381379af030c09d4c commit d2a6c6be269f34ae56ad10e381379af030c09d4c Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 17:24:56 2008 +0200 links-2.1-1kalgan1-i686 - secfix bump - closes #3272 in stable diff --git a/source/network-extra/links/FrugalBuild b/source/network-extra/links/FrugalBuild index d651e5d..25febf1 100644 --- a/source/network-extra/links/FrugalBuild +++ b/source/network-extra/links/FrugalBuild @@ -2,8 +2,8 @@ # Maintainer: VMiklos <[EMAIL PROTECTED]> pkgname=links -pkgver=2.1pre33 -pkgrel=1 +pkgver=2.1 +pkgrel=1kalgan1 pkgdesc="A web browser running in both graphics and text mode." url="http://links.twibright.com/"; depends=('libpng' 'libjpeg' 'libtiff' 'openssl' 'gpm' 'ncurses') @@ -13,6 +13,6 @@ up2date="lynx -dump $url/download.php|grep Current|sed 's/.* \(.*\)\..*/\1/'" source=($url/download/$pkgname-$pkgver.tar.bz2) Fconfopts="$Fconfopts --enable-javascript --enable-graphics --without-x" -sha1sums=('0ac2aa7c45f56692751f5a9ab94f3551c38ba846') +sha1sums=('f14617c6bce69a23fd20bd8816e693a789a8c5e4') # optimization OK ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] homepage-ng: add description about missing FSA508
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=f2e2b72eeca97eab463075a676041278bb3ac696 commit f2e2b72eeca97eab463075a676041278bb3ac696 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 17:10:55 2008 +0200 add description about missing FSA508 diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 7b2a285..b4141c6 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -107,21 +107,7 @@ 11) An error in the processing of "Alt Names" provided by "peer" trusted certificates can be exploited to conduct spoofing attacks. 12) An error in the processing of Windows URL shortcuts can be exploited to run a remote site as a local file. - - 508 - 2008-08-16 - postfix - 2.4.6-1 - 2.4.7-1kalgan1 - http://bugs.frugalware.org/task/3296 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937 - Sebastian Krahmer has reported some security issues in Postfix, which can be exploited by malicious, local users to disclose potentially sensitive information and perform certain actions with escalated privileges. - 1) A security issue is caused due to Postfix incorrectly handling symlink files. This can be exploited to e.g. append mail messages to arbitrary files by creating a hardlink to a symlink owned by the root user. - Successful exploitation requires write permission to the mail spool directory, that there is no "root" mailbox, and users can create a hardlink to a symlink (e.g. Linux 2.x, Solaris, Irix 6.5). - 2) A security issue is caused due to Postfix not correctly checking the ownership of the destination when delivering email. This can be exploited to e.g. disclose emails by creating an insecure mailbox file for other users. - Successful exploitation requires permission to create files within the mail spool directory. - + 507 2008-08-16 ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: ruby-1.8.7-5-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=2dc7c6b923393fa847501ead450264b590813f15 commit 2dc7c6b923393fa847501ead450264b590813f15 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 17:08:25 2008 +0200 ruby-1.8.7-5-i686 - update to patchlevel '72' - closes #3300 diff --git a/source/devel/ruby/FrugalBuild b/source/devel/ruby/FrugalBuild index 64a1522..9ea7d68 100644 --- a/source/devel/ruby/FrugalBuild +++ b/source/devel/ruby/FrugalBuild @@ -4,9 +4,9 @@ pkgname=ruby pkgver=1.8.7 -pkgpatch=22 +pkgpatch=72 pkgextraver= -pkgrel=4 +pkgrel=5 pkgdesc="An object-oriented programming language." url="http://www.ruby-lang.org/"; depends=('termcap' 'zlib' 'db>=4.7.25-2' 'readline' 'openssl' 'gdbm') @@ -15,7 +15,7 @@ groups=('devel') archs=('i686' 'x86_64') up2date="lynx -dump http://www.ruby-lang.org/en/downloads/|sed 's/-p$pkgpatch//' |Flasttar" source=(ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-${pkgver}-p$pkgpatch.tar.bz2) -sha1sums=('a54e59393f0ca8fcc39f9e23e63a04b1cd4e3b7a') +sha1sums=('462e990a724580e4dfeeac5a271b93f6cfcbf5c7') build() { Fcd ruby-$pkgver-p$pkgpatch ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-0.8: ruby-1.8.6-5kalgan1-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=5733f80314861074ae037e6f8e8ad2671e0b7468 commit 5733f80314861074ae037e6f8e8ad2671e0b7468 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 16:42:16 2008 +0200 ruby-1.8.6-5kalgan1-i686 - update to patchlevel '287' - closes #3300 diff --git a/source/devel/ruby/FrugalBuild b/source/devel/ruby/FrugalBuild index 87d650c..6f537d7 100644 --- a/source/devel/ruby/FrugalBuild +++ b/source/devel/ruby/FrugalBuild @@ -4,8 +4,8 @@ pkgname=ruby pkgver=1.8.6 -pkgextraver=-p111 -pkgrel=4 +pkgextraver=-p287 +pkgrel=5kalgan1 pkgdesc="An object-oriented programming language." url="http://www.ruby-lang.org/"; depends=('termcap' 'zlib' 'db>=4.6.18' 'readline' 'openssl' 'gdbm') @@ -14,7 +14,7 @@ groups=('devel') archs=('i686' 'x86_64') up2date="lynx -dump http://www.ruby-lang.org/en/downloads/ |grep tar.gz |sed -ne 's/.*y-\(.*\).tar.*/\1/;1p' |sed s/$pkgextraver//" source=(ftp://ftp.ruby-lang.org/pub/ruby/ruby-${pkgver}${pkgextraver}.tar.bz2) -sha1sums=('d85d25786e0ce30f8f54f5cfa36968ec0f6b9a5f') +sha1sums=('29b02ccab3c1d6b4a71148ad960e65b5f892fe17') build() { Fbuild --enable-shared --enable-pthread \ ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] homepage-ng: FSA513-git
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=b1ba57161b752174fec92d3b89c0162572cd3f7f commit b1ba57161b752174fec92d3b89c0162572cd3f7f Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 16:29:00 2008 +0200 FSA513-git diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 12e7a17..7b2a285 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,16 @@ + 513 + 2008-08-26 + git + 1.5.4.3-1 + 1.5.6.4-1kalgan1 + http://bugs.frugalware.org/task/3305 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3546 + Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep. + + 512 2008-08-26 amarok ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: docs/security
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=80148288c43197df1b4c43d12b2e3294d5bd30b2 commit 80148288c43197df1b4c43d12b2e3294d5bd30b2 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 16:24:48 2008 +0200 docs/security fix the order of the steps in the 'How to release an FSA' section diff --git a/docs/security.txt b/docs/security.txt index 448b53b..f2a8968 100644 --- a/docs/security.txt +++ b/docs/security.txt @@ -23,12 +23,12 @@ issue in -stable and releases a new FSA. == How to release an FSA? -. Open the -stable Changelog file of the package. There you can see the - vulnerable and unaffected versions of the package. - . Check if the backport built by syncpkgd is ready (the binary packages should be uploaded for each arch). +. Open the -stable Changelog file of the package. There you can see the + vulnerable and unaffected versions of the package. + . Add a new entry to the frugalware/xml/security.xml file in the homepage-ng repo. ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] homepage-ng: FSA512-amarok
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=4818fdb9e07eefce8584a089546c369b1d76d5ba commit 4818fdb9e07eefce8584a089546c369b1d76d5ba Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 16:22:34 2008 +0200 FSA512-amarok diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 20aec8f..12e7a17 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,17 @@ + 512 + 2008-08-26 + amarok + 1.4.8-2 + 1.4.10-1kalgan1 + http://bugs.frugalware.org/task/3312 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3699 + A security issue has been reported in Amarok, which can be exploited by malicious, local users to perform certain actions with escalated privileges. + The security issue is caused due to the "MagnatuneBrowser::listDownloadComplete()" function handling temporary files in an insecure manner. This can be exploited via symlink attacks in combination with a race condition to overwrite arbitrary files with the privileges of the user running the application. + + 511 2008-08-26 pdns ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] homepage-ng: FSA511-pdns
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=fba3b7ab0719e5f14cb755451a7853203b1bba48 commit fba3b7ab0719e5f14cb755451a7853203b1bba48 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 16:20:07 2008 +0200 FSA511-pdns diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 4667730..20aec8f 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,17 @@ + 511 + 2008-08-26 + pdns + 2.9.21-3 + 2.9.21.1-1kalgan1 + http://bugs.frugalware.org/task/3309 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337 + A weakness has been reported in PowerDNS, which can be exploited by malicious people to conduct spoofing attacks. + The weakness is caused due to the server dropping DNS queries for invalid DNS records within a valid domain. This can be exploited to facilitate the spoofing of the valid domain on third-party DNS servers. + + 510 2008-08-26 thunderbird ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] homepage-ng: FSA510-thunderbird
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=927438ac418d1596a2389d642866bf1d9c4c4776 commit 927438ac418d1596a2389d642866bf1d9c4c4776 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 16:18:11 2008 +0200 FSA510-thunderbird diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index a55825c..4667730 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,21 @@ + 510 + 2008-08-26 + thunderbird + 2.0.0.14-1kalgan1 + 2.0.0.16-1kalgan1 + http://bugs.frugalware.org/task/3206 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811 + Some vulnerabilities have been reported in Mozilla Thunderbird, which potentially can be exploited by malicious people to compromise a user's system. + For more information, see FSA509 + + 509 2008-08-26 firefox ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] homepage-ng: FSA509-firefox
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=62ec266a77a3ab9b4d1b8462f49ed9375d0a51ea commit 62ec266a77a3ab9b4d1b8462f49ed9375d0a51ea Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 16:15:44 2008 +0200 FSA509-firefox diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index e356ab4..a55825c 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,56 @@ + 509 + 2008-08-26 + firefox + 2.0.0.14-1kalgan1 + 2.0.0.15-1kalgan1 + http://bugs.frugalware.org/task/3202 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2800 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2801 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2805 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2806 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2808 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2809 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2810 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811 + Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, disclose sensitive information, or potentially compromise a user's system. + 1) Multiple errors in the layout and JavaScript engines can be exploited to corrupt memory. + 2) An error in the handling of unprivileged XUL documents can be exploited to load Chrome scripts from a "fastload" file via "script" elements. + 3) An error in the "mozIJSSubScriptLoader.LoadScript()" function can be exploited to bypass XPCNativeWrappers and run arbitrary code with Chrome privileges. + Successful exploitation requires that an add-on using the affected function is installed. + 4) An error in the block reflow process can be exploited to cause a crash or potentially execute arbitrary code. + 5) An error in the processing of file URLs contained within local directory listings can potentially be exploited to execute malicious JavaScript content. + 6) Multiple errors in the implementation of the JavaScript same origin policy can be exploited to execute arbitrary script code in the context of a different domain. + 7) Multiple errors in the verification of signed JAR files can be exploited to execute arbitrary JavaScript code with the privileges of the JAR's signer. + 8) An error in the implementation of file upload forms can be exploited to upload arbitrary local files to a remote webserver via specially crafted "DOM Range" and "originalTarget" elements. + 9) An error in the Java LiveConnect implementation on Mac OS X can be exploited to establish arbitrary socket connections. + 10) An uninitialized memory access in the processing of improperly encoded ".properties" files can potentially be exploited to disclose sensitive memory via an add-on using the malformed file. + 11) An error in the processing of "Alt Names" provided by "peer" trusted certificates can be exploited to conduct spoofing attacks. + 12) An error in the processing of Windows URL shortcuts can be exploited to run a remote site as a local file. + + + 508 + 2008-08-16 + postfix + 2.4.6-1 + 2.4.7-1kalgan1 + http://bugs.frugalware.org/task/3296 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937 + Sebastian Krahmer has reported some security issues in Postfix, which can be exploited by malicious, local users to disclose potentially sensitive information and perform certain actions with escalated privileges. + 1) A security issue is caused due to Postfix incorrectly handling symlink files. This can be exploited to e.g. append mail messages to arbitrary files by creating a hardlink to a symlink
[Frugalware-git] frugalware-0.8: git-1.5.6.4-1kalgan1-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=3b2ca975630aee47a79a6fa9b0e6d54e05f653f3 commit 3b2ca975630aee47a79a6fa9b0e6d54e05f653f3 Author: Miklos Vajna <[EMAIL PROTECTED]> Date: Tue Aug 26 16:00:54 2008 +0200 git-1.5.6.4-1kalgan1-i686 - secfix bump - closes #3305 diff --git a/source/devel-extra/git/FrugalBuild b/source/devel-extra/git/FrugalBuild index f2e24a3..a3dd774 100644 --- a/source/devel-extra/git/FrugalBuild +++ b/source/devel-extra/git/FrugalBuild @@ -8,11 +8,11 @@ USE_DEVEL=${USE_DEVEL:-"n"} USE_HTMLMAN=${USE_HTMLMAN:-"y"} pkgname=git -pkgver=1.5.4.3 +pkgver=1.5.6.4 Fuse $USE_DEVEL && pkgver=1.5.4.rc5 -pkgrel=1 +pkgrel=1kalgan1 pkgdesc="A fast, scalable, distributed revision control system." -url="http://www.kernel.org/pub/software/scm/git/"; +url="http://www.hu.kernel.org/pub/software/scm/git/"; depends=('curl>=7.16.0' 'openssl' 'perl>=5.10.0') backup=(etc/sysconfig/git) makedepends=('asciidoc' 'docbook-xsl>=1.73.0-2' 'docbook-xml' 'docbook2x' 'sgml-common' 'xmlto' 'cpio') @@ -66,7 +66,7 @@ build() Fconf make V=1 CLFAGS="$CFLAGS" ASCIIDOC8=YesPlease \ ETC_GITCONFIG=/etc/gitconfig DOCBOOK2X_TEXI=docbook2texi \ - all doc info test || return 1 + all doc info || return 1 Fmakeinstall install-doc install-info ETC_GITCONFIG=/etc/gitconfig mandir=/usr/share/man Ffilerel perl/private-Error.pm /usr/lib/perl5/site_perl/current/Error.pm make -C Documentation WEBDOC_DEST=$Fdestdir/usr/share/doc/$pkgname-$pkgver install-webdoc || return 1 ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git