[CVS] OpenPKG: openpkg-src/freeradius/ freeradius.patch freeradius.spe...

2004-07-22 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   23-Jul-2004 00:32:39
  Branch: HEAD Handle: 2004072223323900

  Added files:
openpkg-src/freeradius  freeradius.patch freeradius.spec

  Log:
new package: freeradius 1.0.0pre3 (FreeRADIUS Server)

  Summary:
RevisionChanges Path
1.1 +69 -0  openpkg-src/freeradius/freeradius.patch
1.1 +122 -0 openpkg-src/freeradius/freeradius.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/freeradius/freeradius.patch
  
  $ cvs diff -u -r0 -r1.1 freeradius.patch
  --- /dev/null 2004-07-23 00:32:39 +0200
  +++ freeradius.patch  2004-07-23 00:32:39 +0200
  @@ -0,0 +1,69 @@
  +Index: src/modules/rlm_x99_token/x99_rlm.c
  +--- src/modules/rlm_x99_token/x99_rlm.c.orig 2004-02-26 20:04:37 +0100
   src/modules/rlm_x99_token/x99_rlm.c  2004-07-22 21:47:04 +0200
  +@@ -517,8 +517,8 @@
  + }
  + 
  + /* Fast path if we didn't protect the state. */
  +-if (!(user_info.card_id & X99_CF_AM))
  +-goto good_state;
  ++if ((user_info.card_id & X99_CF_AM))
  ++{ /* defeat gcc "label at end of compound statement" error */
  + 
  + /* Verify the state. */
  + (void) memset(challenge, 0, sizeof(challenge));
  +@@ -544,7 +544,7 @@
  + "auth: bad state for [%s]: expired", username);
  + return RLM_MODULE_REJECT;
  + }
  +-good_state:
  ++}
  + /* State is good! */
  + 
  + } else {
  +Index: src/main/radiusd.c
  +--- src/main/radiusd.c.orig  2004-05-28 16:42:27 +0200
   src/main/radiusd.c   2004-07-22 21:57:29 +0200
  +@@ -1443,6 +1443,7 @@
  +  *  doing something with it.
  +  */
  + if (spawn_flag) {
  ++#ifdef HAVE_PTHREAD_H
  + if (!thread_pool_addrequest(request, fun)) {
  + /*
  +  *  FIXME: Maybe just drop
  +@@ -1451,6 +1452,7 @@
  + request_reject(request);
  + request->finished = TRUE;
  + }
  ++#endif
  + } else {
  + rad_respond(request, fun);
  + }
  +Index: src/modules/rlm_ldap/rlm_ldap.c
  +--- src/modules/rlm_ldap/rlm_ldap.c.orig 2004-04-30 09:54:56 +0200
   src/modules/rlm_ldap/rlm_ldap.c  2004-07-22 23:12:09 +0200
  +@@ -193,6 +193,7 @@
  +  *  every use of the pthread functions.
  +  */
  + #define pthread_mutex_lock(a)
  ++#define pthread_mutex_trylock(a) 0
  + #define pthread_mutex_unlock(a)
  + #define pthread_mutex_init(a,b)
  + #define pthread_mutex_destroy(a)
  +Index: src/modules/rlm_sql/drivers/Makefile.in
  +--- src/modules/rlm_sql/drivers/Makefile.in.orig 2003-10-09 06:00:26.0 
+0200
   src/modules/rlm_sql/drivers/Makefile.in  2004-07-23 00:20:38.766269000 +0200
  +@@ -18,10 +18,10 @@
  + 
  + common: 
  + @[ -d lib/ ] || mkdir lib
  +-@for mod in $(SQL_MODULES); do \
  ++@for mod in $(SQL_MODULES) NOOP; do \
  + what=$(WHAT_TO_MAKE); \
  + [ "$$what" = "all" ] && what="$(TARGET_LIBS)"; \
  + echo "Making $$what in $$mod..."; \
  +-(cd $$mod && $(MAKE) $(MFLAGS) $$what) || exit 1;\
  ++[ -d $$mod ] || exit 0; (cd $$mod && $(MAKE) $(MFLAGS) $$what) || exit 
1;\
  + done
  + 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/freeradius/freeradius.spec
  
  $ cvs diff -u -r0 -r1.1 freeradius.spec
  --- /dev/null 2004-07-23 00:32:39 +0200
  +++ freeradius.spec   2004-07-23 00:32:39 +0200
  @@ -0,0 +1,122 @@
  +##
  +##  freeradius.spec -- OpenPKG RPM Specification
  +##  Copyright (c) 2000-2004 The OpenPKG Project 
  +##  Copyright (c) 2000-2004 Ralf S. Engelschall <[EMAIL PROTECTED]>
  +##  Copyright (c) 2000-2004 Cable & Wireless 
  +##
  +##  Permission to use, copy, modify, and distribute this software for
  +##  any purpose with or without fee is hereby granted, provided that
  +##  the above copyright notice and this permission notice appear in all
  +##  copies.
  +##
  +##  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
  +##  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
  +##  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE D

[CVS] OpenPKG: openpkg-src/imagemagick/ imagemagick.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 20:15:48
  Branch: HEAD Handle: 2004072219154700

  Modified files:
openpkg-src/imagemagick imagemagick.spec

  Log:
upgrading package: imagemagick 6.0.3.3 -> 6.0.3.4

  Summary:
RevisionChanges Path
1.153   +2  -2  openpkg-src/imagemagick/imagemagick.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/imagemagick/imagemagick.spec
  
  $ cvs diff -u -r1.152 -r1.153 imagemagick.spec
  --- openpkg-src/imagemagick/imagemagick.spec  17 Jul 2004 06:59:56 -  1.152
  +++ openpkg-src/imagemagick/imagemagick.spec  22 Jul 2004 18:15:47 -  1.153
  @@ -25,7 +25,7 @@
   
   #   package version
   %define   V_major 6.0.3
  -%define   V_minor 3
  +%define   V_minor 4
   %define   V_dist1 %{V_major}
   %define   V_dist2 %{V_major}-%{V_minor}
   %define   V_dist  %{V_dist2}
  @@ -41,7 +41,7 @@
   Group:Graphics
   License:  GPL
   Version:  %{V_major}.%{V_minor}
  -Release:  20040717
  +Release:  20040722
   
   #   package options
   %option   with_perl   no
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/exim/ exim.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 20:00:26
  Branch: HEAD Handle: 2004072219002500

  Modified files:
openpkg-src/eximexim.spec

  Log:
upgrading package: exim 4.40 -> 4.41

  Summary:
RevisionChanges Path
1.72+2  -2  openpkg-src/exim/exim.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/exim/exim.spec
  
  $ cvs diff -u -r1.71 -r1.72 exim.spec
  --- openpkg-src/exim/exim.spec15 Jul 2004 16:54:26 -  1.71
  +++ openpkg-src/exim/exim.spec22 Jul 2004 18:00:25 -  1.72
  @@ -33,8 +33,8 @@
   Class:PLUS
   Group:Mail
   License:  GPL
  -Version:  4.40
  -Release:  20040715
  +Version:  4.41
  +Release:  20040722
   
   #   package options
   %option   with_auth_cram_md5  no
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/patchutils/ patchutils.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 20:00:27
  Branch: HEAD Handle: 2004072219002600

  Modified files:
openpkg-src/patchutils  patchutils.spec

  Log:
upgrading package: patchutils 0.2.29 -> 0.2.30

  Summary:
RevisionChanges Path
1.44+2  -2  openpkg-src/patchutils/patchutils.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/patchutils/patchutils.spec
  
  $ cvs diff -u -r1.43 -r1.44 patchutils.spec
  --- openpkg-src/patchutils/patchutils.spec2 Jun 2004 08:47:50 -   1.43
  +++ openpkg-src/patchutils/patchutils.spec22 Jul 2004 18:00:26 -  1.44
  @@ -33,8 +33,8 @@
   Class:BASE
   Group:Converter
   License:  GPL
  -Version:  0.2.29
  -Release:  20040602
  +Version:  0.2.30
  +Release:  20040722
   
   #   list of sources
   Source0:  
http://cyberelk.net/tim/data/patchutils/stable/patchutils-%{version}.tar.bz2
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/elm/ elm.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 20:00:26
  Branch: HEAD Handle: 2004072219002500

  Modified files:
openpkg-src/elm elm.spec

  Log:
upgrading package: elm 2.4.117 -> 2.4.118

  Summary:
RevisionChanges Path
1.20+2  -2  openpkg-src/elm/elm.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/elm/elm.spec
  
  $ cvs diff -u -r1.19 -r1.20 elm.spec
  --- openpkg-src/elm/elm.spec  7 Jul 2004 09:57:15 -   1.19
  +++ openpkg-src/elm/elm.spec  22 Jul 2004 18:00:25 -  1.20
  @@ -25,7 +25,7 @@
   
   #   package version
   %define   V_base 2.4
  -%define   V_me   117
  +%define   V_me   118
   
   #   package information
   Name: elm
  @@ -38,7 +38,7 @@
   Group:Mail
   License:  ELM License
   Version:  %{V_base}.%{V_me}
  -Release:  20040707
  +Release:  20040722
   
   #   list of sources
   Source0:  http://www.ozone.fmi.fi/KEH/elm-%{V_base}ME+%{V_me}.tar.gz
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2004.034-php.txt

2004-07-22 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   22-Jul-2004 16:46:35
  Branch: HEAD Handle: 2004072215463500

  Modified files:
openpkg-web/securityOpenPKG-SA-2004.034-php.txt

  Log:
release OpenPKG Security Advisory 2004.034 (php)

  Summary:
RevisionChanges Path
1.2 +23 -16 openpkg-web/security/OpenPKG-SA-2004.034-php.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2004.034-php.txt
  
  $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2004.034-php.txt
  --- openpkg-web/security/OpenPKG-SA-2004.034-php.txt  22 Jul 2004 14:34:45 - 
 1.1
  +++ openpkg-web/security/OpenPKG-SA-2004.034-php.txt  22 Jul 2004 14:46:35 - 
 1.2
  @@ -1,6 +1,6 @@
  -#FIXME, this is a template
  -#FIXME, the first three lines are just dummies
  -#FIXME, to help comparing this against sibling signed documents
  +-BEGIN PGP SIGNED MESSAGE-
  +Hash: SHA1
  +
   
   
   OpenPKG Security AdvisoryThe OpenPKG Project
  @@ -9,29 +9,29 @@
   OpenPKG-SA-2004.034  22-Jul-2004
   
   
  -Package: php, apache (option "with_mod_php" only)
  -Vulnerability:   XSS; remote code execution
  +Package: php, apache [with_mod_php=yes]
  +Vulnerability:   cross-site scripting, remote code execution
   OpenPKG Specific:no
   
  -Affected Releases:   Affected Packages:  Corrected Packages:
  -OpenPKG CURRENT  <= php-4.3.7-20040611   >= php-4.3.8-20040714
  - <= apache-1.3.31-20040713   >= apache-1.3.31-20040714
  -OpenPKG 2.1  noneN.A.
  -OpenPKG 2.0  <= php-4.3.4-2.0.0  >= php-4.3.4-2.0.1
  - <= apache-1.3.29-2.0.4  >= apache-1.3.29-2.0.5
  +Affected Releases:   Affected Packages:Corrected Packages:
  +OpenPKG CURRENT  <= php-4.3.7-20040611 >= php-4.3.8-20040714
  + <= apache-1.3.31-20040713 >= apache-1.3.31-20040714
  +OpenPKG 2.1  none  N.A.
  +OpenPKG 2.0  <= php-4.3.4-2.0.0>= php-4.3.4-2.0.1
  + <= apache-1.3.29-2.0.4>= apache-1.3.29-2.0.5
   
   Dependent Packages:  none
   
   Description:
 According to a PHP [0] security advisory [1] from Stefan Esser the
  -  commonly used memory_limit functionality in PHP 4.x up to 4.3.7 under
  -  certain conditions allows remote attackers to execute arbitrary
  -  code by triggering a memory_limit abort during execution of the
  -  zend_hash_init function. The Common Vulnerabilities and Exposures
  +  commonly used "memory_limit" functionality in PHP 4.x up to 4.3.7
  +  under certain conditions allows remote attackers to execute arbitrary
  +  code by triggering a "memory_limit" abort during execution of the
  +  zend_hash_init() function. The Common Vulnerabilities and Exposures
 (CVE) project assigned the id CAN-2004-0594 [2] to the problem.
   
 According to another security advisory [3] from Stefan Esser the
  -  strip_tags function in PHP 4.x up to 4.3.7 does not filter NUL
  +  strip_tags() function in PHP 4.x up to 4.3.7 does not filter NUL
 characters within tag names, allowing dangerous tags to be processed
 by certain web browsers and facilitate the exploitation of cross-site
 scripting (XSS) vulnerabilities. The Common Vulnerabilities and
  @@ -83,3 +83,10 @@
   for details on how to verify the integrity of this advisory.
   
   
  +-BEGIN PGP SIGNATURE-
  +Comment: OpenPKG <[EMAIL PROTECTED]>
  +
  +iD8DBQFA/9MggHWT4GPEy58RAjUxAJ46ZgHCdPAijcOSW3DYaDXVM1E0ZACgg4oR
  +cX6Hz0LmxJcVgoHQNvF+SBY=
  +=uJ3k
  +-END PGP SIGNATURE-
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-web/ security.txt security.wml openpkg-web/secu...

2004-07-22 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   22-Jul-2004 16:34:46
  Branch: HEAD Handle: 2004072215344401

  Added files:
openpkg-web/securityOpenPKG-SA-2004.034-php.txt
  Modified files:
openpkg-web security.txt security.wml

  Log:
SA-2004.034-php; CAN-2004-0594, CAN-2004-0595

  Summary:
RevisionChanges Path
1.88+2  -0  openpkg-web/security.txt
1.109   +2  -0  openpkg-web/security.wml
1.1 +85 -0  openpkg-web/security/OpenPKG-SA-2004.034-php.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.87 -r1.88 security.txt
  --- openpkg-web/security.txt  20 Jul 2004 07:59:49 -  1.87
  +++ openpkg-web/security.txt  22 Jul 2004 14:34:44 -  1.88
  @@ -1,3 +1,5 @@
  +22-Jul-2004: Security Advisory: S
  +22-Jul-2004: Security Advisory: S
   16-Jul-2004: Security Advisory: S
   08-Jul-2004: Security Advisory: S
   06-Jul-2004: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.108 -r1.109 security.wml
  --- openpkg-web/security.wml  20 Jul 2004 07:59:49 -  1.108
  +++ openpkg-web/security.wml  22 Jul 2004 14:34:44 -  1.109
  @@ -76,6 +76,8 @@
   
   
   
  +  
  +  
 
 
 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2004.034-php.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2004.034-php.txt
  --- /dev/null 2004-07-22 16:34:45 +0200
  +++ OpenPKG-SA-2004.034-php.txt   2004-07-22 16:34:45 +0200
  @@ -0,0 +1,85 @@
  +#FIXME, this is a template
  +#FIXME, the first three lines are just dummies
  +#FIXME, to help comparing this against sibling signed documents
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2004.034  22-Jul-2004
  +
  +
  +Package: php, apache (option "with_mod_php" only)
  +Vulnerability:   XSS; remote code execution
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= php-4.3.7-20040611   >= php-4.3.8-20040714
  + <= apache-1.3.31-20040713   >= apache-1.3.31-20040714
  +OpenPKG 2.1  noneN.A.
  +OpenPKG 2.0  <= php-4.3.4-2.0.0  >= php-4.3.4-2.0.1
  + <= apache-1.3.29-2.0.4  >= apache-1.3.29-2.0.5
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a PHP [0] security advisory [1] from Stefan Esser the
  +  commonly used memory_limit functionality in PHP 4.x up to 4.3.7 under
  +  certain conditions allows remote attackers to execute arbitrary
  +  code by triggering a memory_limit abort during execution of the
  +  zend_hash_init function. The Common Vulnerabilities and Exposures
  +  (CVE) project assigned the id CAN-2004-0594 [2] to the problem.
  +
  +  According to another security advisory [3] from Stefan Esser the
  +  strip_tags function in PHP 4.x up to 4.3.7 does not filter NUL
  +  characters within tag names, allowing dangerous tags to be processed
  +  by certain web browsers and facilitate the exploitation of cross-site
  +  scripting (XSS) vulnerabilities. The Common Vulnerabilities and
  +  Exposures (CVE) project assigned the id CAN-2004-0595 [4] to the
  +  problem.
  +
  +  Please check whether you are affected by running "/bin/rpm
  +  -q php". If you have the "php" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution) [5][6].
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [7], fetch it from the OpenPKG FTP service [8] or a mirror location,
  +  verify its integrity [9], build a corresponding binary RPM from it [5]
  +  and update your OpenPKG installation by applying the binary RPM [6].
  +  For the affected release OpenPKG 2.0, perform the following operations
  +  to permanently fix the security problem (for other releases adjust
  +  accordingly).
  +
  +  $ ftp f

[CVS] OpenPKG: OPENPKG_2_0_SOLID: openpkg-src/apache/ apache.patch.php...

2004-07-22 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 16:29:38
  Branch: OPENPKG_2_0_SOLIDHandle: 2004072215293700

  Added files:  (Branch: OPENPKG_2_0_SOLID)
openpkg-src/apache  apache.patch.php
  Modified files:   (Branch: OPENPKG_2_0_SOLID)
openpkg-src/apache  apache.spec

  Log:
SA-2004.034-php; CAN-2004-0594, CAN-2004-0595

  Summary:
RevisionChanges Path
1.2.2.1 +610 -0 openpkg-src/apache/apache.patch.php
1.211.2.7   +3  -1  openpkg-src/apache/apache.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/apache/apache.patch.php
  
  $ cvs diff -u -r0 -r1.2.2.1 apache.patch.php
  --- /dev/null 2004-07-22 16:29:38 +0200
  +++ apache.patch.php  2004-07-22 16:29:38 +0200
  @@ -0,0 +1,610 @@
  +OpenPKG-SA-2004.034-php; CAN-2004-0594, CAN-2004-0595
  +
  +Index: php-4.3.4/Zend/zend_alloc.c
  +===
  +--- php-4.3.4.orig/Zend/zend_alloc.c 2004-07-14 12:48:39.063013753 +0200
   php-4.3.4/Zend/zend_alloc.c  2004-07-14 12:48:53.975006655 +0200
  +@@ -67,7 +67,7 @@
  + #define _CHECK_MEMORY_LIMIT(s, rs, file, lineno) { AG(allocated_memory) += rs;\
  + if 
(AG(memory_limit) AG(allocated_memory) - rs) { \
  ++if 
(EG(in_execution) && AG(memory_limit)+1048576 > AG(allocated_memory) - rs) { \
  + 
AG(memory_limit) = AG(allocated_memory) + 1048576; \
  + if 
(file) { \
  +
 zend_error(E_ERROR,"Allowed memory size of %d bytes exhausted at %s:%d (tried to 
allocate %d bytes)", php_mem_limit, file, lineno, s); \
  +Index: php-4.3.4/Zend/zend_hash.c
  +===
  +--- php-4.3.4.orig/Zend/zend_hash.c  2004-07-14 13:14:45.475609161 +0200
   php-4.3.4/Zend/zend_hash.c   2004-07-14 13:14:55.865900116 +0200
  +@@ -174,6 +174,7 @@
  + ZEND_API int zend_hash_init(HashTable *ht, uint nSize, hash_func_t pHashFunction, 
dtor_func_t pDestructor, int persistent)
  + {
  + uint i = 3;
  ++Bucket **tmp;
  + 
  + SET_INCONSISTENT(HT_OK);
  + 
  +@@ -183,14 +184,6 @@
  + 
  + ht->nTableSize = 1 << i;
  + ht->nTableMask = ht->nTableSize - 1;
  +-
  +-/* Uses ecalloc() so that Bucket* == NULL */
  +-ht->arBuckets = (Bucket **) pecalloc(ht->nTableSize, sizeof(Bucket *), 
persistent);
  +-
  +-if (!ht->arBuckets) {
  +-return FAILURE;
  +-}
  +-
  + ht->pDestructor = pDestructor;
  + ht->pListHead = NULL;
  + ht->pListTail = NULL;
  +@@ -200,6 +193,16 @@
  + ht->persistent = persistent;
  + ht->nApplyCount = 0;
  + ht->bApplyProtection = 1;
  ++ht->arBuckets = NULL;
  ++
  ++/* Uses ecalloc() so that Bucket* == NULL */
  ++tmp = (Bucket **) pecalloc(ht->nTableSize, sizeof(Bucket *), persistent);
  ++
  ++if (!tmp) {
  ++return FAILURE;
  ++}
  ++ht->arBuckets = tmp;
  ++
  + return SUCCESS;
  + }
  + 
  +Index: php-4.3.4/Zend/zend_variables.c
  +===
  +--- php-4.3.4.orig/Zend/zend_variables.c 2004-07-14 13:14:45.481608752 +0200
   php-4.3.4/Zend/zend_variables.c  2004-07-14 13:14:55.865900116 +0200
  +@@ -114,27 +114,31 @@
  + case IS_CONSTANT_ARRAY: {
  + zval *tmp;
  + HashTable *original_ht = zvalue->value.ht;
  ++HashTable *tmp_ht = NULL;
  + TSRMLS_FETCH();
  + 
  + if (zvalue->value.ht == &EG(symbol_table)) {
  + return SUCCESS; /* do nothing */
  + }
  +-ALLOC_HASHTABLE_REL(zvalue->value.ht);
  +-zend_hash_init(zvalue->value.ht, 0, NULL, 
ZVAL_PTR_DTOR, 0);
  +-zend_hash_copy(zvalue->value.ht, original_ht, 
(copy_ctor_func_t) zval_add_ref, (void *) &tmp, sizeof(zval *));
  ++ALLOC_HASHTABLE_REL(tmp_ht);
  ++zend_hash_init(tmp_ht, 0, NULL, ZVAL_PTR_DTOR, 0);
  ++zend_hash_copy(tmp_h

[CVS] OpenPKG: OPENPKG_2_0_SOLID: openpkg-src/php/ php.patch php.spec

2004-07-22 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 16:29:20
  Branch: OPENPKG_2_0_SOLIDHandle: 2004072215291900

  Added files:  (Branch: OPENPKG_2_0_SOLID)
openpkg-src/php php.patch
  Modified files:   (Branch: OPENPKG_2_0_SOLID)
openpkg-src/php php.spec

  Log:
SA-2004.034-php; CAN-2004-0594, CAN-2004-0595

  Summary:
RevisionChanges Path
1.5.2.1 +610 -0 openpkg-src/php/php.patch
1.75.2.2+3  -1  openpkg-src/php/php.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/php/php.patch
  
  $ cvs diff -u -r0 -r1.5.2.1 php.patch
  --- /dev/null 2004-07-22 16:29:19 +0200
  +++ php.patch 2004-07-22 16:29:19 +0200
  @@ -0,0 +1,610 @@
  +OpenPKG-SA-2004.034-php; CAN-2004-0594, CAN-2004-0595
  +
  +Index: php-4.3.4/Zend/zend_alloc.c
  +===
  +--- php-4.3.4.orig/Zend/zend_alloc.c 2004-07-14 12:48:39.063013753 +0200
   php-4.3.4/Zend/zend_alloc.c  2004-07-14 12:48:53.975006655 +0200
  +@@ -67,7 +67,7 @@
  + #define _CHECK_MEMORY_LIMIT(s, rs, file, lineno) { AG(allocated_memory) += rs;\
  + if 
(AG(memory_limit) AG(allocated_memory) - rs) { \
  ++if 
(EG(in_execution) && AG(memory_limit)+1048576 > AG(allocated_memory) - rs) { \
  + 
AG(memory_limit) = AG(allocated_memory) + 1048576; \
  + if 
(file) { \
  +
 zend_error(E_ERROR,"Allowed memory size of %d bytes exhausted at %s:%d (tried to 
allocate %d bytes)", php_mem_limit, file, lineno, s); \
  +Index: php-4.3.4/Zend/zend_hash.c
  +===
  +--- php-4.3.4.orig/Zend/zend_hash.c  2004-07-14 13:14:45.475609161 +0200
   php-4.3.4/Zend/zend_hash.c   2004-07-14 13:14:55.865900116 +0200
  +@@ -174,6 +174,7 @@
  + ZEND_API int zend_hash_init(HashTable *ht, uint nSize, hash_func_t pHashFunction, 
dtor_func_t pDestructor, int persistent)
  + {
  + uint i = 3;
  ++Bucket **tmp;
  + 
  + SET_INCONSISTENT(HT_OK);
  + 
  +@@ -183,14 +184,6 @@
  + 
  + ht->nTableSize = 1 << i;
  + ht->nTableMask = ht->nTableSize - 1;
  +-
  +-/* Uses ecalloc() so that Bucket* == NULL */
  +-ht->arBuckets = (Bucket **) pecalloc(ht->nTableSize, sizeof(Bucket *), 
persistent);
  +-
  +-if (!ht->arBuckets) {
  +-return FAILURE;
  +-}
  +-
  + ht->pDestructor = pDestructor;
  + ht->pListHead = NULL;
  + ht->pListTail = NULL;
  +@@ -200,6 +193,16 @@
  + ht->persistent = persistent;
  + ht->nApplyCount = 0;
  + ht->bApplyProtection = 1;
  ++ht->arBuckets = NULL;
  ++
  ++/* Uses ecalloc() so that Bucket* == NULL */
  ++tmp = (Bucket **) pecalloc(ht->nTableSize, sizeof(Bucket *), persistent);
  ++
  ++if (!tmp) {
  ++return FAILURE;
  ++}
  ++ht->arBuckets = tmp;
  ++
  + return SUCCESS;
  + }
  + 
  +Index: php-4.3.4/Zend/zend_variables.c
  +===
  +--- php-4.3.4.orig/Zend/zend_variables.c 2004-07-14 13:14:45.481608752 +0200
   php-4.3.4/Zend/zend_variables.c  2004-07-14 13:14:55.865900116 +0200
  +@@ -114,27 +114,31 @@
  + case IS_CONSTANT_ARRAY: {
  + zval *tmp;
  + HashTable *original_ht = zvalue->value.ht;
  ++HashTable *tmp_ht = NULL;
  + TSRMLS_FETCH();
  + 
  + if (zvalue->value.ht == &EG(symbol_table)) {
  + return SUCCESS; /* do nothing */
  + }
  +-ALLOC_HASHTABLE_REL(zvalue->value.ht);
  +-zend_hash_init(zvalue->value.ht, 0, NULL, 
ZVAL_PTR_DTOR, 0);
  +-zend_hash_copy(zvalue->value.ht, original_ht, 
(copy_ctor_func_t) zval_add_ref, (void *) &tmp, sizeof(zval *));
  ++ALLOC_HASHTABLE_REL(tmp_ht);
  ++zend_hash_init(tmp_ht, 0, NULL, ZVAL_PTR_DTOR, 0);
  ++zend_hash_copy(tmp_ht, original_ht, (copy_ctor_func_t) 
zval_add_ref, (

[CVS] OpenPKG: openpkg-src/sudo/ sudo.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 13:53:46
  Branch: HEAD Handle: 2004072212534500

  Modified files:
openpkg-src/sudosudo.spec

  Log:
fix the uid/gid problem at the root and fix one more uid/gid incorrect
usage

  Summary:
RevisionChanges Path
1.57+5  -8  openpkg-src/sudo/sudo.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/sudo/sudo.spec
  
  $ cvs diff -u -r1.56 -r1.57 sudo.spec
  --- openpkg-src/sudo/sudo.spec22 Jul 2004 11:29:59 -  1.56
  +++ openpkg-src/sudo/sudo.spec22 Jul 2004 11:53:45 -  1.57
  @@ -97,7 +97,7 @@
   %endif
   --with-sudoers-mode=0400 \
   --with-sudoers-uid=%{l_suid} \
  ---with-sudoers-gid=%{l_muid} \
  +--with-sudoers-gid=%{l_mgid} \
   --with-sendmail=$true \
   --with-ignore-dot \
   %if "%{with_pam}" == "yes"
  @@ -115,17 +115,14 @@
   %{l_shtool} mkdir -f -p -m 755 \
   $RPM_BUILD_ROOT%{l_prefix}/var/sudo
   %{l_shtool} subst \
  --e "s;-m 4111;-m 4511;" \
  --e "s;-m 0111;-m 0511;" \
  +-e "s;-M 4111;-M 4511;" \
  +-e "s;-M 0111;-M 0511;" \
  +-e "s;-[OG] [^ ]*;;g" \
   Makefile
   %{l_make} %{l_mflags} install \
   prefix=$RPM_BUILD_ROOT%{l_prefix} \
   exec_prefix=$RPM_BUILD_ROOT%{l_prefix} \
  -sysconfdir=$RPM_BUILD_ROOT%{l_prefix}/etc/sudo \
  -install_uid=%{l_suid} \
  -install_gid=%{l_sgid} \
  -sudoers_uid=%{l_muid} \
  -sudoers_gid=%{l_mgid}
  +sysconfdir=$RPM_BUILD_ROOT%{l_prefix}/etc/sudo
   
   #   install run-command script
   %{l_shtool} mkdir -f -p -m 755 \
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/sudo/ sudo.spec

2004-07-22 Thread Christoph Schug
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Christoph Schug
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 13:29:59
  Branch: HEAD Handle: 2004072212295900

  Modified files:
openpkg-src/sudosudo.spec

  Log:
fix build when clock is slow

  Summary:
RevisionChanges Path
1.56+6  -6  openpkg-src/sudo/sudo.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/sudo/sudo.spec
  
  $ cvs diff -u -r1.55 -r1.56 sudo.spec
  --- openpkg-src/sudo/sudo.spec7 Feb 2004 17:59:05 -   1.55
  +++ openpkg-src/sudo/sudo.spec22 Jul 2004 11:29:59 -  1.56
  @@ -34,7 +34,7 @@
   Group:System
   License:  BSD
   Version:  1.6.7p5
  -Release:  20040207
  +Release:  20040722
   
   #   package options
   %option   with_fslyes
  @@ -96,7 +96,7 @@
   --with-logging=file \
   %endif
   --with-sudoers-mode=0400 \
  ---with-sudoers-uid=0 \
  +--with-sudoers-uid=%{l_suid} \
   --with-sudoers-gid=%{l_muid} \
   --with-sendmail=$true \
   --with-ignore-dot \
  @@ -122,10 +122,10 @@
   prefix=$RPM_BUILD_ROOT%{l_prefix} \
   exec_prefix=$RPM_BUILD_ROOT%{l_prefix} \
   sysconfdir=$RPM_BUILD_ROOT%{l_prefix}/etc/sudo \
  -install_uid=`%{l_shtool} echo -e %u` \
  -install_gid=`%{l_shtool} echo -e %g` \
  -sudoers_uid=`%{l_shtool} echo -e %u` \
  -sudoers_gid=`%{l_shtool} echo -e %g`
  +install_uid=%{l_suid} \
  +install_gid=%{l_sgid} \
  +sudoers_uid=%{l_muid} \
  +sudoers_gid=%{l_mgid}
   
   #   install run-command script
   %{l_shtool} mkdir -f -p -m 755 \
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2004.033-samba.txt

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   22-Jul-2004 11:39:34
  Branch: HEAD Handle: 2004072210393300

  Added files:
openpkg-web/securityOpenPKG-SA-2004.033-samba.txt

  Log:
release OpenPKG Security Advisory 2004.033 (samba)

  Summary:
RevisionChanges Path
1.1 +90 -0  openpkg-web/security/OpenPKG-SA-2004.033-samba.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2004.033-samba.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2004.033-samba.txt
  --- /dev/null 2004-07-22 11:39:34 +0200
  +++ OpenPKG-SA-2004.033-samba.txt 2004-07-22 11:39:34 +0200
  @@ -0,0 +1,90 @@
  +-BEGIN PGP SIGNED MESSAGE-
  +Hash: SHA1
  +
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2004.033  22-Jul-2004
  +
  +
  +Package: samba
  +Vulnerability:   arbitrary code execution
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= samba-3.0.4-20040722 >= samba-3.0.5-20040722
  +OpenPKG 2.1  <= samba-3.0.4-2.1.0>= samba-3.0.4-2.1.1
  +OpenPKG 2.0  <= samba-2.2.8a-2.0.0   >= samba-2.2.8a-2.0.1
  +
  +Dependent Packages:  none
  +
  +Description:
  +  Evgeny Demidov discovered that the Samba SMB/CIFS server [1] has a
  +  buffer overflow bug in the Samba Web Administration Tool (SWAT) on
  +  decoding Base64 data during HTTP Basic Authentication. Samba version
  +  between 3.0.2 through 3.0.4 are affected. The Common Vulnerabilities
  +  and Exposures (CVE) project assigned the id CAN-2004-0600 [2] to the
  +  problem.
  +
  +  Another buffer overflow bug has been located in the Samba code
  +  used to support the "mangling method = hash" functionality. The
  +  default setting for this parameter is "mangling method = hash2"
  +  and therefore Samba is not vulnerable by default. Samba versions
  +  between 2.2.0 through 2.2.9 and 3.0.0 through 3.0.4 are affected. The
  +  Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2004-0686 [3] to the problem.
  +
  +  Please check whether you are affected by running "/bin/rpm -q
  +  samba". If you have the "samba" package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [4][5]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [6][7], fetch it from the OpenPKG FTP service [8][9] or a mirror
  +  location, verify its integrity [10], build a corresponding binary
  +  RPM from it [4] and update your OpenPKG installation by applying the
  +  binary RPM [5]. For the current release OpenPKG 2.1, perform the
  +  following operations to permanently fix the security problem (for
  +  other releases adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp> bin
  +  ftp> cd release/2.1/UPD
  +  ftp> get samba-3.0.4-2.1.1.src.rpm
  +  ftp> bye
  +  $ /bin/rpm -v --checksig samba-3.0.4-2.1.1.src.rpm
  +  $ /bin/rpm --rebuild samba-3.0.4-2.1.1.src.rpm
  +  $ su -
  +  # /bin/rpm -Fvh /RPM/PKG/samba-3.0.4-2.1.1.*.rpm
  +
  +
  +References:
  +  [1]  http://www.samba.org/
  +  [2]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0600
  +  [3]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686
  +  [4]  http://www.openpkg.org/tutorial.html#regular-source
  +  [5]  http://www.openpkg.org/tutorial.html#regular-binary
  +  [6]  ftp://ftp.openpkg.org/release/2.1/UPD/samba-3.0.4-2.1.1.src.rpm
  +  [7]  ftp://ftp.openpkg.org/release/2.0/UPD/samba-2.2.8a-2.0.1.src.rpm
  +  [8]  ftp://ftp.openpkg.org/release/2.1/UPD/
  +  [9]  ftp://ftp.openpkg.org/release/2.0/UPD/
  +  [10] http://www.openpkg.org/security.html#signature
  +
  +
  +For security reasons, this advisory was digitally signed with the
  +OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F) of the
  +OpenPKG project which you 

[CVS] OpenPKG: OPENPKG_2_0_SOLID: openpkg-src/samba/ samba.patch samba...

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 11:08:33
  Branch: OPENPKG_2_0_SOLIDHandle: 2004072210083200

  Added files:  (Branch: OPENPKG_2_0_SOLID)
openpkg-src/samba   samba.patch
  Modified files:   (Branch: OPENPKG_2_0_SOLID)
openpkg-src/samba   samba.spec

  Log:
apply security fix (OpenPKG-SA-2004-033-samba; CAN-2004-0600;
CAN-2004-0686) plus an important other vendor bugfix

  Summary:
RevisionChanges Path
1.1.12.1+252 -0 openpkg-src/samba/samba.patch
1.61.2.2+3  -1  openpkg-src/samba/samba.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/samba/samba.patch
  
  $ cvs diff -u -r0 -r1.1.12.1 samba.patch
  --- /dev/null 2004-07-22 11:08:32 +0200
  +++ samba.patch   2004-07-22 11:08:32 +0200
  @@ -0,0 +1,252 @@
  +Important bugfix from 2.2.8a to 2.2.9 which addresses the problem with
  +user password changes after applying the Microsoft hotfix described in
  +KB282741 to Windows NT 4.0/200x/XP clients.
  +
  +Index: source/rpc_server/srv_pipe.c
  +--- source/rpc_server/srv_pipe.c.orig2003-03-14 22:34:48 +0100
   source/rpc_server/srv_pipe.c 2004-07-22 10:56:00 +0200
  +@@ -77,6 +77,7 @@
  + RPC_HDR_RESP hdr_resp;
  + BOOL auth_verify = ((p->ntlmssp_chal_flags & NTLMSSP_NEGOTIATE_SIGN) != 0);
  + BOOL auth_seal   = ((p->ntlmssp_chal_flags & NTLMSSP_NEGOTIATE_SEAL) != 0);
  ++uint32 ss_padding_len = 0;
  + uint32 data_len;
  + uint32 data_space_available;
  + uint32 data_len_left;
  +@@ -140,11 +141,24 @@
  + hdr_resp.alloc_hint = data_len_left;
  + 
  + /*
  ++ * Work out if this PDU will be the last.
  ++ */
  ++
  ++if(p->out_data.data_sent_length + data_len >= prs_offset(&p->out_data.rdata)) {
  ++p->hdr.flags |= RPC_FLG_LAST;
  ++if ((auth_seal || auth_verify) && (data_len_left % 8)) {
  ++ss_padding_len = 8 - (data_len_left % 8);
  ++DEBUG(10,("create_next_pdu: adding sign/seal padding of %u\n",
  ++ss_padding_len ));
  ++}
  ++}
  ++
  ++/*
  +  * Set up the header lengths.
  +  */
  + 
  + if (p->ntlmssp_auth_validated) {
  +-p->hdr.frag_len = RPC_HEADER_LEN + RPC_HDR_RESP_LEN + data_len +
  ++p->hdr.frag_len = RPC_HEADER_LEN + RPC_HDR_RESP_LEN + data_len + 
ss_padding_len +
  + RPC_HDR_AUTH_LEN + RPC_AUTH_NTLMSSP_CHK_LEN;
  + p->hdr.auth_len = RPC_AUTH_NTLMSSP_CHK_LEN;
  + } else {
  +@@ -153,13 +167,6 @@
  + }
  + 
  + /*
  +- * Work out if this PDU will be the last.
  +- */
  +-
  +-if(p->out_data.data_sent_length + data_len >= prs_offset(&p->out_data.rdata))
  +-p->hdr.flags |= RPC_FLG_LAST;
  +-
  +-/*
  +  * Init the parse struct to point at the outgoing
  +  * data.
  +  */
  +@@ -192,6 +199,17 @@
  + return False;
  + }
  + 
  ++/* Copy the sign/seal padding data. */
  ++if (ss_padding_len) {
  ++char pad[8];
  ++memset(pad, '\0', 8);
  ++if (!prs_append_data(&outgoing_pdu, pad, ss_padding_len)) {
  ++DEBUG(0,("create_next_pdu: failed to add %u bytes of pad 
data.\n", (unsigned int)ss_padding_len));
  ++prs_mem_free(&outgoing_pdu);
  ++return False;
  ++}
  ++}
  ++
  + /*
  +  * Set data to point to where we copied the data into.
  +  */
  +@@ -202,18 +220,18 @@
  + uint32 crc32 = 0;
  + 
  + DEBUG(5,("create_next_pdu: sign: %s seal: %s data %d auth %d\n",
  +- BOOLSTR(auth_verify), BOOLSTR(auth_seal), data_len, 
p->hdr.auth_len));
  ++ BOOLSTR(auth_verify), BOOLSTR(auth_seal), data_len + 
ss_padding_len, p->hdr.auth_len));
  + 
  + if (auth_seal) {
  +-crc32 = crc32_calc_buffer(data, data_len);
  +-NTLMSSPcalc_p(p, (uchar*)data, data_len);
  ++crc32 = crc32_calc_buffer(data, data_len + ss_padding_len);
  ++NTLMSSPcalc_p(p, (uchar*)data, data_len + ss_padding_len);
  + }
  + 
  + if (auth_seal || auth_verify) {
  + RPC_HDR_AUTH auth_info;
  + 
  + init_rpc_hdr_auth(&auth_info, NTLMSSP_AUTH_TYPE, 
NTLMSSP_AUTH_LEVEL, 
  +-(auth_verify ? RPC_HDR_AUTH_LEN 

[CVS] OpenPKG: OPENPKG_2_1_SOLID: openpkg-src/samba/ samba.patch samba...

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 10:40:46
  Branch: OPENPKG_2_1_SOLIDHandle: 2004072209404500

  Modified files:   (Branch: OPENPKG_2_1_SOLID)
openpkg-src/samba   samba.patch samba.spec

  Log:
apply security fix (OpenPKG-SA-2004-033-samba; CAN-2004-0600;
CAN-2004-0686)

  Summary:
RevisionChanges Path
1.3.2.2 +178 -0 openpkg-src/samba/samba.patch
1.68.2.3+1  -1  openpkg-src/samba/samba.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/samba/samba.patch
  
  $ cvs diff -u -r1.3.2.1 -r1.3.2.2 samba.patch
  --- openpkg-src/samba/samba.patch 5 Jul 2004 08:38:42 -   1.3.2.1
  +++ openpkg-src/samba/samba.patch 22 Jul 2004 08:40:45 -  1.3.2.2
  @@ -226,3 +226,181 @@
return False;
}

  +--
  +
  +Security Fixed
  +(OpenPKG-SA-2004-033-samba; CAN-2004-0600; CAN-2004-0686)
  +
  +Index: source/include/mangle.h
  +--- source/include/mangle.h.orig 2004-04-04 09:37:24 +0200
   source/include/mangle.h  2004-07-22 10:26:11 +0200
  +@@ -8,7 +8,7 @@
  + BOOL (*is_mangled)(const char *s);
  + BOOL (*is_8_3)(const char *fname, BOOL check_case, BOOL allow_wildcards);
  + void (*reset)(void);
  +-BOOL (*check_cache)(char *s);
  ++BOOL (*check_cache)(char *s, size_t maxlen);
  + void (*name_map)(char *OutName, BOOL need83, BOOL cache83);
  + };
  + #endif /* _MANGLE_H_ */
  +Index: source/lib/util_str.c
  +--- source/lib/util_str.c.orig   2004-04-20 22:42:55 +0200
   source/lib/util_str.c2004-07-22 10:26:11 +0200
  +@@ -1951,7 +1951,9 @@
  + s++; i++;
  + }
  + 
  +-if (*s == '=') n -= 1;
  ++if ((n > 0) && (*s == '=')) {
  ++n -= 1;
  ++}
  + 
  + /* fix up length */
  + decoded.length = n;
  +@@ -1964,9 +1966,15 @@
  + void base64_decode_inplace(char *s)
  + {
  + DATA_BLOB decoded = base64_decode_data_blob(s);
  +-memcpy(s, decoded.data, decoded.length);
  +-/* null terminate */
  +-s[decoded.length] = '\0';
  ++
  ++if ( decoded.length != 0 ) {
  ++memcpy(s, decoded.data, decoded.length);
  ++
  ++/* null terminate */
  ++s[decoded.length] = '\0';
  ++} else {
  ++*s = '\0';
  ++}
  + 
  + data_blob_free(&decoded);
  + }
  +Index: source/smbd/filename.c
  +--- source/smbd/filename.c.orig  2004-04-04 09:37:31 +0200
   source/smbd/filename.c   2004-07-22 10:26:11 +0200
  +@@ -306,7 +306,7 @@
  +  */
  + 
  + if (mangle_is_mangled(start)) {
  +-mangle_check_cache( start );
  ++mangle_check_cache( start, sizeof(pstring) - 1 
- (start - name) );
  + }
  + 
  + DEBUG(5,("New file %s\n",start));
  +@@ -455,7 +455,7 @@
  +  * (JRA).
  +  */
  + if (mangled)
  +-mangled = !mangle_check_cache( name );
  ++mangled = !mangle_check_cache( name, maxlength );
  + 
  + /* open the directory */
  + if (!(cur_dir = OpenDir(conn, path, True))) {
  +Index: source/smbd/mangle.c
  +--- source/smbd/mangle.c.orig2004-04-04 09:37:30 +0200
   source/smbd/mangle.c 2004-07-22 10:26:11 +0200
  +@@ -98,9 +98,9 @@
  +   looking for a matching name if it doesn't. It should succeed most of the time
  +   or there will be a huge performance penalty
  + */
  +-BOOL mangle_check_cache(char *s)
  ++BOOL mangle_check_cache(char *s, size_t maxlen)
  + {
  +-return mangle_fns->check_cache(s);
  ++return mangle_fns->check_cache(s, maxlen);
  + }
  + 
  + /* 
  +Index: source/smbd/mangle_hash.c
  +--- source/smbd/mangle_hash.c.orig   2004-04-04 09:37:29 +0200
   source/smbd/mangle_hash.c2004-07-22 10:27:01 +0200
  +@@ -580,7 +580,7 @@
  +  * ** **
  +  */
  + 
  +-static BOOL check_cache( char *s )
  ++static BOOL check_cache( char *s, size_t maxlen )
  + {
  + ubi_cacheEntryPtr FoundPtr;
  + char *ext_start = NULL;
  +@@ -614,7 +614,7 @@
  + if( !FoundPtr ) {
  + if(saved_ext) {
  + /* Replace the saved_ext as it was truncated. */
  +-(void)pstrcat( s, saved_ext );
  ++(void)safe_strcat( s, saved_ext, maxlen );
  +   

[CVS] OpenPKG: openpkg-src/zope/ zope.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 10:34:30
  Branch: HEAD Handle: 2004072209343000

  Modified files:
openpkg-src/zopezope.spec

  Log:
upgrading package: zope 2.7.1 -> 2.7.2.0

  Summary:
RevisionChanges Path
1.37+10 -6  openpkg-src/zope/zope.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/zope/zope.spec
  
  $ cvs diff -u -r1.36 -r1.37 zope.spec
  --- openpkg-src/zope/zope.spec22 Jun 2004 10:02:25 -  1.36
  +++ openpkg-src/zope/zope.spec22 Jul 2004 08:34:30 -  1.37
  @@ -23,6 +23,10 @@
   ##  SUCH DAMAGE.
   ##
   
  +#   package version
  +%define   V_major  2.7.2
  +%define   V_minor  0
  +
   #   package information
   Name: zope
   Summary:  Content Management System and Application Server
  @@ -33,11 +37,11 @@
   Class:PLUS
   Group:Web
   License:  Zope Public License
  -Version:  2.7.1
  -Release:  20040622
  +Version:  %{V_major}.%{V_minor}
  +Release:  20040722
   
   #   list of sources
  -Source0:  http://zope.org/Products/Zope/%{version}/Zope-%{version}.tgz
  +Source0:  
http://zope.org/Products/Zope/%{V_major}/Zope-%{V_major}-%{V_minor}.tgz
   Source1:  rc.zope
   Source2:  zoperun
   Source3:  zopectl
  @@ -63,13 +67,13 @@
   
   %track
   prog zope = {
  -version   = %{version}
  +version   = %{V_major}-%{V_minor}
   url   = http://zope.org/Products/Zope/
  -regex = Zope-(\d+\.\d+\.\d+)\.tgz
  +regex = Zope-(\d+\.\d+\.\d+(-\d+)?)\.tgz
   }
   
   %prep
  -%setup -q -n Zope-%{version}-0
  +%setup -q -n Zope-%{V_major}-%{V_minor}
   
   %build
   #   build package
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/samba/ samba.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 10:12:02
  Branch: HEAD Handle: 2004072209120100

  Modified files:
openpkg-src/samba   samba.spec

  Log:
upgrading package: samba 3.0.4 -> 3.0.5

  Summary:
RevisionChanges Path
1.72+1  -1  openpkg-src/samba/samba.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/samba/samba.spec
  
  $ cvs diff -u -r1.71 -r1.72 samba.spec
  --- openpkg-src/samba/samba.spec  22 Jul 2004 06:55:45 -  1.71
  +++ openpkg-src/samba/samba.spec  22 Jul 2004 08:12:01 -  1.72
  @@ -33,7 +33,7 @@
   Class:BASE
   Group:Filesystem
   License:  GPL
  -Version:  3.0.4
  +Version:  3.0.5
   Release:  20040722
   
   #   package options
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/libsmbclient/ libsmbclient.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 10:02:49
  Branch: HEAD Handle: 2004072209024900

  Modified files:
openpkg-src/libsmbclient
libsmbclient.spec

  Log:
upgrading package: libsmbclient 3.0.4 -> 3.0.5

  Summary:
RevisionChanges Path
1.4 +2  -2  openpkg-src/libsmbclient/libsmbclient.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/libsmbclient/libsmbclient.spec
  
  $ cvs diff -u -r1.3 -r1.4 libsmbclient.spec
  --- openpkg-src/libsmbclient/libsmbclient.spec16 Jul 2004 12:56:30 - 
 1.3
  +++ openpkg-src/libsmbclient/libsmbclient.spec22 Jul 2004 08:02:49 - 
 1.4
  @@ -33,8 +33,8 @@
   Class:EVAL
   Group:Filesystem
   License:  GPL
  -Version:  3.0.4
  -Release:  20040716
  +Version:  3.0.5
  +Release:  20040722
   
   #   list of sources
   Source0:  http://download.samba.org/samba/ftp/samba-%{version}.tar.gz
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/nessus-tool/ nessus-tool.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 10:02:33
  Branch: HEAD Handle: 2004072209023300

  Modified files:
openpkg-src/nessus-tool nessus-tool.spec

  Log:
upgrading package: nessus-tool 2.1.0 -> 2.1.1

  Summary:
RevisionChanges Path
1.21+2  -2  openpkg-src/nessus-tool/nessus-tool.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/nessus-tool/nessus-tool.spec
  
  $ cvs diff -u -r1.20 -r1.21 nessus-tool.spec
  --- openpkg-src/nessus-tool/nessus-tool.spec  7 Jul 2004 07:13:34 -   1.20
  +++ openpkg-src/nessus-tool/nessus-tool.spec  22 Jul 2004 08:02:33 -  1.21
  @@ -33,8 +33,8 @@
   Class:PLUS
   Group:Security
   License:  GPL
  -Version:  2.1.0
  -Release:  20040707
  +Version:  2.1.1
  +Release:  20040722
   
   #   package options
   %option   with_fsl  yes
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/perl-dbi/ perl-dbi.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 09:57:38
  Branch: HEAD Handle: 2004072208573700

  Modified files:
openpkg-src/perl-dbiperl-dbi.spec

  Log:
modifying package: perl-dbi-5.8.5 20040720 -> 20040722

  Summary:
RevisionChanges Path
1.110   +2  -2  openpkg-src/perl-dbi/perl-dbi.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/perl-dbi/perl-dbi.spec
  
  $ cvs diff -u -r1.109 -r1.110 perl-dbi.spec
  --- openpkg-src/perl-dbi/perl-dbi.spec20 Jul 2004 18:21:49 -  1.109
  +++ openpkg-src/perl-dbi/perl-dbi.spec22 Jul 2004 07:57:37 -  1.110
  @@ -29,7 +29,7 @@
   %define   V_sql_statement  1.09
   %define   V_dbd_anydata0.08
   %define   V_dbd_sprite 0.50
  -%define   V_dbd_sqlite 0.31
  +%define   V_dbd_sqlite 1.00
   %define   V_dbd_mysql  2.9004
   %define   V_dbd_pgsql  1.32
   %define   V_dbd_oracle 1.15
  @@ -46,7 +46,7 @@
   Group:Language
   License:  GPL/Artistic
   Version:  %{V_perl}
  -Release:  20040720
  +Release:  20040722
   
   #   package options
   %option   with_dbd_mysql   no
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/nessus-libs/ nessus-libs.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 09:56:48
  Branch: HEAD Handle: 2004072208564700

  Modified files:
openpkg-src/nessus-libs nessus-libs.spec

  Log:
upgrading package: nessus-libs 2.1.0 -> 2.1.1

  Summary:
RevisionChanges Path
1.26+2  -2  openpkg-src/nessus-libs/nessus-libs.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/nessus-libs/nessus-libs.spec
  
  $ cvs diff -u -r1.25 -r1.26 nessus-libs.spec
  --- openpkg-src/nessus-libs/nessus-libs.spec  7 Jul 2004 07:11:03 -   1.25
  +++ openpkg-src/nessus-libs/nessus-libs.spec  22 Jul 2004 07:56:47 -  1.26
  @@ -33,8 +33,8 @@
   Class:PLUS
   Group:Security
   License:  GPL
  -Version:  2.1.0
  -Release:  20040707
  +Version:  2.1.1
  +Release:  20040722
   
   #   list of sources
   Source0:  
ftp://ftp.nessus.org/pub/nessus/nessus-%{version}/src/nessus-libraries-%{version}.tar.gz
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/pureftpd/ pureftpd.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 09:46:14
  Branch: HEAD Handle: 2004072208461300

  Modified files:
openpkg-src/pureftpdpureftpd.spec

  Log:
vendor tarball was rerolled

  Summary:
RevisionChanges Path
1.65+1  -1  openpkg-src/pureftpd/pureftpd.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/pureftpd/pureftpd.spec
  
  $ cvs diff -u -r1.64 -r1.65 pureftpd.spec
  --- openpkg-src/pureftpd/pureftpd.spec19 Jul 2004 07:34:06 -  1.64
  +++ openpkg-src/pureftpd/pureftpd.spec22 Jul 2004 07:46:13 -  1.65
  @@ -34,7 +34,7 @@
   Group:FTP
   License:  GPL
   Version:  1.0.20
  -Release:  20040719
  +Release:  20040722
   
   #   package options
   %option   with_fslyes
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/dialog/ dialog.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 09:30:36
  Branch: HEAD Handle: 2004072208303600

  Modified files:
openpkg-src/dialog  dialog.spec

  Log:
upgrading package: dialog 0.9b.20040606 -> 1.0.20040721

  Summary:
RevisionChanges Path
1.33+3  -3  openpkg-src/dialog/dialog.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/dialog/dialog.spec
  
  $ cvs diff -u -r1.32 -r1.33 dialog.spec
  --- openpkg-src/dialog/dialog.spec7 Jun 2004 07:05:39 -   1.32
  +++ openpkg-src/dialog/dialog.spec22 Jul 2004 07:30:36 -  1.33
  @@ -24,8 +24,8 @@
   ##
   
   #   version information
  -%define   V_maj 0.9b
  -%define   V_min 20040606
  +%define   V_maj 1.0
  +%define   V_min 20040721
   
   #   package information
   Name: dialog
  @@ -38,7 +38,7 @@
   Group:Terminal
   License:  BSD
   Version:  %{V_maj}.%{V_min}
  -Release:  20040607
  +Release:  20040722
   
   #   list of sources
   Source0:  ftp://invisible-island.net/dialog/dialog-%{V_maj}-%{V_min}.tgz
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/gd/ gd.spec

2004-07-22 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   22-Jul-2004 09:23:10
  Branch: HEAD Handle: 2004072208231000

  Modified files:
openpkg-src/gd  gd.spec

  Log:
upgrading package: gd 2.0.27 -> 2.0.28

  Summary:
RevisionChanges Path
1.74+2  -2  openpkg-src/gd/gd.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/gd/gd.spec
  
  $ cvs diff -u -r1.73 -r1.74 gd.spec
  --- openpkg-src/gd/gd.spec19 Jul 2004 08:36:32 -  1.73
  +++ openpkg-src/gd/gd.spec22 Jul 2004 07:23:10 -  1.74
  @@ -33,8 +33,8 @@
   Class:BASE
   Group:Graphics
   License:  GPL
  -Version:  2.0.27
  -Release:  20040719
  +Version:  2.0.28
  +Release:  20040722
   
   #   package options
   %option   with_xpm  no
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]