[CVS] OpenPKG: openpkg-src/rbldnsd/ rbldnsd.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 19:54:51 Branch: HEAD Handle: 2006021918545100 Modified files: openpkg-src/rbldnsd rbldnsd.spec Log: upgrading package: rbldnsd 0.995 -> 0.996 Summary: RevisionChanges Path 1.11+2 -2 openpkg-src/rbldnsd/rbldnsd.spec patch -p0 <<'@@ .' Index: openpkg-src/rbldnsd/rbldnsd.spec $ cvs diff -u -r1.10 -r1.11 rbldnsd.spec --- openpkg-src/rbldnsd/rbldnsd.spec 1 Jan 2006 13:21:10 - 1.10 +++ openpkg-src/rbldnsd/rbldnsd.spec 19 Feb 2006 18:54:51 - 1.11 @@ -32,8 +32,8 @@ Class:PLUS Group:DNS License: GPL -Version: 0.995 -Release: 20050910 +Version: 0.996 +Release: 20060219 # package options %option with_fslyes @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: openpkg-src/sendmail/ sendmail.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 19:31:02 Branch: HEAD Handle: 2006021918310100 Modified files: openpkg-src/sendmailsendmail.spec Log: pass C compiler and flags to the build process (submitted by: Joerg Lehrke) Summary: RevisionChanges Path 1.127 +3 -2 openpkg-src/sendmail/sendmail.spec patch -p0 <<'@@ .' Index: openpkg-src/sendmail/sendmail.spec $ cvs diff -u -r1.126 -r1.127 sendmail.spec --- openpkg-src/sendmail/sendmail.spec1 Jan 2006 13:22:04 - 1.126 +++ openpkg-src/sendmail/sendmail.spec19 Feb 2006 18:31:01 - 1.127 @@ -33,7 +33,7 @@ Group:Mail License: BSD Version: 8.13.5 -Release: 20050917 +Release: 20060219 # package options %option with_fsl yes @@ -145,7 +145,8 @@ esac # configure Sendmail -( echo "define(\`confMAPDEF', \`-DMAP_REGEX')dnl" +( echo "define(\`confCC', \`%{l_cc} %{l_cflags}')dnl" +echo "define(\`confMAPDEF', \`-DMAP_REGEX')dnl" echo "define(\`confSBINOWN', \`%{l_musr}')dnl" echo "define(\`confSBINGRP', \`%{l_mgrp}')dnl" echo "define(\`confUBINOWN', \`%{l_musr}')dnl" @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: openpkg-web/ security.txt security.wml
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 19-Feb-2006 13:11:48 Branch: HEAD Handle: 2006021912114800 Modified files: openpkg-web security.txt security.wml Log: link SAs into website Summary: RevisionChanges Path 1.121 +2 -0 openpkg-web/security.txt 1.150 +2 -0 openpkg-web/security.wml patch -p0 <<'@@ .' Index: openpkg-web/security.txt $ cvs diff -u -r1.120 -r1.121 security.txt --- openpkg-web/security.txt 18 Feb 2006 12:35:24 - 1.120 +++ openpkg-web/security.txt 19 Feb 2006 12:11:48 - 1.121 @@ -1,3 +1,5 @@ +19-Feb-2006: Security Advisory: S +18-Feb-2006: Security Advisory: S 18-Feb-2006: Security Advisory: S 18-Feb-2006: Security Advisory: S 18-Feb-2006: Security Advisory: S @@ . patch -p0 <<'@@ .' Index: openpkg-web/security.wml $ cvs diff -u -r1.149 -r1.150 security.wml --- openpkg-web/security.wml 18 Feb 2006 12:35:24 - 1.149 +++ openpkg-web/security.wml 19 Feb 2006 12:11:48 - 1.150 @@ -90,6 +90,8 @@ + + @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2006.005-tin.txt
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 19-Feb-2006 13:10:58 Branch: HEAD Handle: 2006021912105800 Added files: openpkg-web/securityOpenPKG-SA-2006.005-tin.txt Log: release OpenPKG Security Advisory 2006.005 (tin) Summary: RevisionChanges Path 1.1 +44 -0 openpkg-web/security/OpenPKG-SA-2006.005-tin.txt patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-2006.005-tin.txt $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2006.005-tin.txt --- /dev/null 2006-02-19 13:10:58 +0100 +++ OpenPKG-SA-2006.005-tin.txt 2006-02-19 13:10:58 +0100 @@ -0,0 +1,44 @@ +-BEGIN PGP SIGNED MESSAGE- +Hash: SHA1 + + + +OpenPKG Security AdvisoryThe OpenPKG Project +http://www.openpkg.org/security.html http://www.openpkg.org [EMAIL PROTECTED] [EMAIL PROTECTED] +OpenPKG-SA-2006.005 19-Feb-2006 + + +Package: tin +Vulnerability: buffer overflow +OpenPKG Specific:no + +Affected Releases: Affected Packages: Corrected Packages: +OpenPKG CURRENT <= tin-1.8.0-20060113 >= tin-1.8.1-20060216 +OpenPKG 2.5 <= tin-1.6.2-2.5.0 >= tin-1.6.2-2.5.1 +OpenPKG 2.4 <= tin-1.6.2-2.4.1 >= tin-1.6.2-2.4.2 +OpenPKG 2.3 <= tin-1.6.2-2.3.1 >= tin-1.6.2-2.3.2 + +Description: + An allocation off-by-one bug exists in the TIN [1] news reader version + 1.8.0 and earlier which can lead to a buffer overflow. + + +References: + [1] http://www.tin.org/ + + +For security reasons, this advisory was digitally signed with the +OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F) of the +OpenPKG project which you can retrieve from http://pgp.openpkg.org and +hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/ +for details on how to verify the integrity of this advisory. + + +-BEGIN PGP SIGNATURE- +Comment: OpenPKG <[EMAIL PROTECTED]> + +iD8DBQFD+GAxgHWT4GPEy58RAmoZAJ92hWIyXxPTqgDW1Q9Bxes8TyfxXACg92EJ +8wpsFu+17HYli7tx59HLOpU= +=ebcm +-END PGP SIGNATURE- @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: openpkg-web/security/ page.pl
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 19-Feb-2006 13:10:00 Branch: HEAD Handle: 2006021912095900 Modified files: openpkg-web/securitypage.pl Log: support HTTPS URLs Summary: RevisionChanges Path 1.42+3 -3 openpkg-web/security/page.pl patch -p0 <<'@@ .' Index: openpkg-web/security/page.pl $ cvs diff -u -r1.41 -r1.42 page.pl --- openpkg-web/security/page.pl 24 Feb 2005 10:58:27 - 1.41 +++ openpkg-web/security/page.pl 19 Feb 2006 12:09:59 - 1.42 @@ -31,15 +31,15 @@ my $L = {}; my $x = $txt; -$x =~ s%^\s*\[(\d+)\]\s+((?:http|ftp|hkp)://\S+)%$L->{$1} = $2, ''%mge; +$x =~ s%^\s*\[(\d+)\]\s+((?:https?|ftp|hkp)://\S+)%$L->{$1} = $2, ''%mge; $txt =~ s/&/&/sg; $txt =~ s//>/sg; -$txt =~ s/((?:http|ftp|hkp):\/\/[^\s]+[^\s\.\)\&])/$1<\/a>/sg; +$txt =~ s/((?:https?|ftp|hkp):\/\/[^\s]+[^\s\.\)\&])/$1<\/a>/sg; $txt =~ s/([\s;]+)([EMAIL PROTECTED])\&]+?)([\s&]+)/$1mailto:$2";>$2<\/a>$3/sg; $txt =~ s/(OpenPKG Security Advisory)/$1<\/b>/sg; $txt =~ s/^((\s*[A-Z][a-zA-Z]+)+:)/$1<\/b>/mg; -$txt =~ s/(\[(\d+)\])(?!\s+(?:http|ftp|hkp):\/\/)/"{$2} || print STDERR "WARNING: reference [$2] not defined\n")."\">".$1."<\/a>"/sge; +$txt =~ s/(\[(\d+)\])(?!\s+(?:https?|ftp|hkp):\/\/)/"{$2} || print STDERR "WARNING: reference [$2] not defined\n")."\">".$1."<\/a>"/sge; my $head = ''; $io = new IO::File "
[CVS] OpenPKG: OPENPKG_2_3_SOLID: openpkg-src/tin/ tin.patch tin.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 13:00:40 Branch: OPENPKG_2_3_SOLIDHandle: 2006021912003901 Modified files: (Branch: OPENPKG_2_3_SOLID) openpkg-src/tin tin.patch tin.spec Log: Security Fix Summary: RevisionChanges Path 1.1.16.2+18 -0 openpkg-src/tin/tin.patch 1.43.2.3+1 -1 openpkg-src/tin/tin.spec patch -p0 <<'@@ .' Index: openpkg-src/tin/tin.patch $ cvs diff -u -r1.1.16.1 -r1.1.16.2 tin.patch --- openpkg-src/tin/tin.patch 5 Sep 2005 14:54:30 - 1.1.16.1 +++ openpkg-src/tin/tin.patch 19 Feb 2006 12:00:39 - 1.1.16.2 @@ -121,3 +121,21 @@ { bracount++; if (bracount > EXTRACT_BASIC_MAX) bracket_length += 3; + +-- + +Security Fix + +Index: src/mail.c +--- src/mail.c 2005-12-02 12:07:36 +0100 src/mail.c 2006-01-19 23:40:13 +0100 +@@ -369,7 +369,7 @@ + space = strlen(ptr) + 1; + groupname = my_malloc(space); + } else { +-while (strlen(ptr) > space) { /* realloc needed? */ ++while (space < strlen(ptr) + 1) { /* realloc needed? */ + space <<= 1; /* double size */ + groupname = my_realloc(groupname, space); + } + @@ . patch -p0 <<'@@ .' Index: openpkg-src/tin/tin.spec $ cvs diff -u -r1.43.2.2 -r1.43.2.3 tin.spec --- openpkg-src/tin/tin.spec 5 Sep 2005 14:54:30 - 1.43.2.2 +++ openpkg-src/tin/tin.spec 19 Feb 2006 12:00:40 - 1.43.2.3 @@ -38,7 +38,7 @@ Group:News License: GPL Version: %{V_major}.%{V_minor} -Release: 2.3.1 +Release: 2.3.2 # list of sources Source0: ftp://ftp.tin.org/pub/news/clients/tin/v%{V_major}/tin-%{version}.tar.bz2 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: OPENPKG_2_4_SOLID: openpkg-src/tin/ tin.patch tin.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 12:59:32 Branch: OPENPKG_2_4_SOLIDHandle: 2006021911593101 Modified files: (Branch: OPENPKG_2_4_SOLID) openpkg-src/tin tin.patch tin.spec Log: Security Fix Summary: RevisionChanges Path 1.1.18.2+18 -0 openpkg-src/tin/tin.patch 1.44.2.3+1 -1 openpkg-src/tin/tin.spec patch -p0 <<'@@ .' Index: openpkg-src/tin/tin.patch $ cvs diff -u -r1.1.18.1 -r1.1.18.2 tin.patch --- openpkg-src/tin/tin.patch 5 Sep 2005 14:51:38 - 1.1.18.1 +++ openpkg-src/tin/tin.patch 19 Feb 2006 11:59:31 - 1.1.18.2 @@ -121,3 +121,21 @@ { bracount++; if (bracount > EXTRACT_BASIC_MAX) bracket_length += 3; + +-- + +Security Fix + +Index: src/mail.c +--- src/mail.c 2005-12-02 12:07:36 +0100 src/mail.c 2006-01-19 23:40:13 +0100 +@@ -369,7 +369,7 @@ + space = strlen(ptr) + 1; + groupname = my_malloc(space); + } else { +-while (strlen(ptr) > space) { /* realloc needed? */ ++while (space < strlen(ptr) + 1) { /* realloc needed? */ + space <<= 1; /* double size */ + groupname = my_realloc(groupname, space); + } + @@ . patch -p0 <<'@@ .' Index: openpkg-src/tin/tin.spec $ cvs diff -u -r1.44.2.2 -r1.44.2.3 tin.spec --- openpkg-src/tin/tin.spec 5 Sep 2005 14:51:38 - 1.44.2.2 +++ openpkg-src/tin/tin.spec 19 Feb 2006 11:59:32 - 1.44.2.3 @@ -37,7 +37,7 @@ Group:News License: GPL Version: %{V_major}.%{V_minor} -Release: 2.4.1 +Release: 2.4.2 # list of sources Source0: ftp://ftp.tin.org/pub/news/clients/tin/v%{V_major}/tin-%{version}.tar.bz2 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: OPENPKG_2_5_SOLID: openpkg-src/tin/ tin.patch tin.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 12:58:13 Branch: OPENPKG_2_5_SOLIDHandle: 2006021911581300 Modified files: (Branch: OPENPKG_2_5_SOLID) openpkg-src/tin tin.patch tin.spec Log: Security Fix Summary: RevisionChanges Path 1.2.2.1 +18 -0 openpkg-src/tin/tin.patch 1.45.2.2+1 -1 openpkg-src/tin/tin.spec patch -p0 <<'@@ .' Index: openpkg-src/tin/tin.patch $ cvs diff -u -r1.2 -r1.2.2.1 tin.patch --- openpkg-src/tin/tin.patch 5 Sep 2005 14:48:02 - 1.2 +++ openpkg-src/tin/tin.patch 19 Feb 2006 11:58:13 - 1.2.2.1 @@ -121,3 +121,21 @@ { bracount++; if (bracount > EXTRACT_BASIC_MAX) bracket_length += 3; + +-- + +Security Fix + +Index: src/mail.c +--- src/mail.c 2005-12-02 12:07:36 +0100 src/mail.c 2006-01-19 23:40:13 +0100 +@@ -369,7 +369,7 @@ + space = strlen(ptr) + 1; + groupname = my_malloc(space); + } else { +-while (strlen(ptr) > space) { /* realloc needed? */ ++while (space < strlen(ptr) + 1) { /* realloc needed? */ + space <<= 1; /* double size */ + groupname = my_realloc(groupname, space); + } + @@ . patch -p0 <<'@@ .' Index: openpkg-src/tin/tin.spec $ cvs diff -u -r1.45.2.1 -r1.45.2.2 tin.spec --- openpkg-src/tin/tin.spec 11 Oct 2005 12:52:11 - 1.45.2.1 +++ openpkg-src/tin/tin.spec 19 Feb 2006 11:58:13 - 1.45.2.2 @@ -37,7 +37,7 @@ Group:News License: GPL Version: %{V_major}.%{V_minor} -Release: 2.5.0 +Release: 2.5.1 # list of sources Source0: ftp://ftp.tin.org/pub/news/clients/tin/v%{V_major}/tin-%{version}.tar.bz2 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: openpkg-src/aide/ aide.patch aide.spec
re else */ - #define READ_BLOCK_SIZE 16384 --#define READ_BLOCK_SIZE 16777216 - - #ifdef WITH_MHASH - #include + /* Lookup syslog facilities by name */ + int syslog_facility_lookup(char *s) @@ . patch -p0 <<'@@ .' Index: openpkg-src/aide/aide.spec $ cvs diff -u -r1.39 -r1.40 aide.spec --- openpkg-src/aide/aide.spec1 Jan 2006 13:11:51 - 1.39 +++ openpkg-src/aide/aide.spec19 Feb 2006 11:38:42 - 1.40 @@ -32,8 +32,8 @@ Class:PLUS Group:Security License: GPL -Version: 0.10 -Release: 20051006 +Version: 0.11 +Release: 20060219 # package options %option with_fsl yes @@ -73,22 +73,8 @@ %prep %setup -q %patch -p0 -case "%{l_platform -t}" in -*-freebsd* ) -%{l_shtool} subst -e 's;^\(#define AIDE_BLKCNT_TYPE\) blkcnt_t.*$;\1 int64_t;' config.h.in -echo "#define HAVE_STRNSTR 1" >>config.h.in -;; -*-sunos* ) -%{l_shtool} subst -e 's;LD_STATIC_FLAG=.-static.;LD_STATIC_FLAG="";' configure -;; -esac %build -# marvelling about its beauty -%{l_shtool} subst \ --e 's;//\(.*\);/*\1*/;g' \ -src/*.c - CC="%{l_cc}" \ CFLAGS="%{l_cflags -O}" \ CPPFLAGS="%{l_cppflags}" \ @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2006.004-postgresql.tx...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 19-Feb-2006 12:37:21 Branch: HEAD Handle: 2006021911372100 Added files: openpkg-web/securityOpenPKG-SA-2006.004-postgresql.txt Log: release OpenPKG Security Advisory 2006.004 (postgresql) Summary: RevisionChanges Path 1.1 +59 -0 openpkg-web/security/OpenPKG-SA-2006.004-postgresql.txt patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-2006.004-postgresql.txt $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2006.004-postgresql.txt --- /dev/null 2006-02-19 12:37:15 +0100 +++ OpenPKG-SA-2006.004-postgresql.txt2006-02-19 12:37:21 +0100 @@ -0,0 +1,59 @@ +-BEGIN PGP SIGNED MESSAGE- +Hash: SHA1 + + + +OpenPKG Security AdvisoryThe OpenPKG Project +http://www.openpkg.org/security.html http://www.openpkg.org [EMAIL PROTECTED] [EMAIL PROTECTED] +OpenPKG-SA-2006.004 19-Feb-2006 + + +Package: postgresql +Vulnerability: privilege escalation +OpenPKG Specific:no + +Affected Releases: Affected Packages: Corrected Packages: +OpenPKG CURRENT <= postgresql-8.1.2-20060211 >= postgresql-8.1.3-20060213 +OpenPKG 2.5 <= postgresql-8.0.4-2.5.0>= postgresql-8.0.4-2.5.1 +OpenPKG 2.4 <= postgresql-8.0.3-2.4.0>= postgresql-8.0.3-2.4.1 +OpenPKG 2.3 <= postgresql-8.0.1-2.3.1>= postgresql-8.0.1-2.3.2 + +Description: + According to vendor security information [0], privilege escalation + vulnerabilitiesd exist in the PostgreSQL RDBMS [1] before version + 8.1.3. The bug allowed any logged-in user to "SET ROLE" to any other + database user id. Due to inadequate validity checking, a user could + exploit the special case that "SET ROLE" normally uses to restore the + previous role setting after an error. This allowed ordinary users to + acquire superuser status, for example. The Common Vulnerabilities + and Exposures (CVE) project assigned the id CVE-2006-0553 [2] to the + problem. + + The escalation of privilege risk exists only in versions 8.1.0 to + 8.1.2. However, in all versions back to 7.3 there is a related bug in + "SET SESSION AUTHORIZATION" that allows unprivileged users to crash + the server, if it has been compiled with Asserts enabled (which is not + the default). + + +References: + [0] http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-3 + [1] http://www.postgresql.org/ + [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0553 + + +For security reasons, this advisory was digitally signed with the +OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F) of the +OpenPKG project which you can retrieve from http://pgp.openpkg.org and +hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/ +for details on how to verify the integrity of this advisory. + + +-BEGIN PGP SIGNATURE- +Comment: OpenPKG <[EMAIL PROTECTED]> + +iD8DBQFD+FhfgHWT4GPEy58RAoF3AKCrvXGfM2EhKrayDMuaTG3DLGL4fQCgyyl/ ++1Qgcz5MZhew1F+8KGz0C1Q= +=5J9V +-END PGP SIGNATURE- @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: OPENPKG_2_3_SOLID: openpkg-src/postgresql/ postgresql.p...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 12:35:16 Branch: OPENPKG_2_3_SOLIDHandle: 2006021911351500 Modified files: (Branch: OPENPKG_2_3_SOLID) openpkg-src/postgresql postgresql.patch postgresql.spec Log: Security Fixes (CVE-2006-0553) Summary: RevisionChanges Path 1.2.2.1 +89 -0 openpkg-src/postgresql/postgresql.patch 1.138.2.3 +1 -1 openpkg-src/postgresql/postgresql.spec patch -p0 <<'@@ .' Index: openpkg-src/postgresql/postgresql.patch $ cvs diff -u -r1.2 -r1.2.2.1 postgresql.patch --- openpkg-src/postgresql/postgresql.patch 16 Feb 2005 16:16:47 - 1.2 +++ openpkg-src/postgresql/postgresql.patch 19 Feb 2006 11:35:15 - 1.2.2.1 @@ -60,3 +60,92 @@ # Force _GNU_SOURCE on; plperl is broken with Perl 5.8.0 otherwise -CPPFLAGS="-D_GNU_SOURCE" +CPPFLAGS="$CPPFLAGS -D_GNU_SOURCE" + +- + +Security Fixes (CVE-2006-0553) + +Index: src/backend/utils/mb/encnames.c +--- src/backend/utils/mb/encnames.c.orig 2004-12-04 19:19:31 +0100 src/backend/utils/mb/encnames.c 2006-02-19 11:53:57 +0100 +@@ -434,7 +434,7 @@ + if (name == NULL || *name == '\0') + return NULL; + +-if (strlen(name) > NAMEDATALEN) ++if (strlen(name) >= NAMEDATALEN) + { + #ifdef FRONTEND + fprintf(stderr, "encoding name too long\n"); +Index: src/backend/utils/misc/guc.c +--- src/backend/utils/misc/guc.c.orig2005-01-01 06:43:08 +0100 src/backend/utils/misc/guc.c 2006-02-19 11:53:57 +0100 +@@ -44,6 +44,7 @@ + #include "optimizer/prep.h" + #include "parser/parse_expr.h" + #include "parser/parse_relation.h" ++#include "parser/scansup.h" + #include "postmaster/bgwriter.h" + #include "postmaster/syslogger.h" + #include "postmaster/postmaster.h" +@@ -1426,7 +1427,7 @@ + {"client_encoding", PGC_USERSET, CLIENT_CONN_LOCALE, + gettext_noop("Sets the client's character set encoding."), + NULL, +-GUC_REPORT ++GUC_IS_NAME | GUC_REPORT + }, + &client_encoding_string, + "SQL_ASCII", assign_client_encoding, NULL +@@ -1506,7 +1507,8 @@ + { + {"default_tablespace", PGC_USERSET, CLIENT_CONN_STATEMENT, + gettext_noop("Sets the default tablespace to create tables and indexes in."), +-gettext_noop("An empty string selects the database's default tablespace.") ++gettext_noop("An empty string selects the database's default tablespace."), ++GUC_IS_NAME + }, + &default_tablespace, + "", assign_default_tablespace, NULL +@@ -1646,7 +1648,7 @@ + {"server_encoding", PGC_INTERNAL, CLIENT_CONN_LOCALE, + gettext_noop("Sets the server (database) character set encoding."), + NULL, +-GUC_REPORT | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE ++GUC_IS_NAME | GUC_REPORT | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE + }, + &server_encoding_string, + "SQL_ASCII", NULL, NULL +@@ -1668,7 +1670,7 @@ + {"session_authorization", PGC_USERSET, UNGROUPED, + gettext_noop("Sets the session user name."), + NULL, +-GUC_REPORT | GUC_NO_SHOW_ALL | GUC_NO_RESET_ALL | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE ++GUC_IS_NAME | GUC_REPORT | GUC_NO_SHOW_ALL | GUC_NO_RESET_ALL | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE + }, + &session_authorization_string, + NULL, assign_session_authorization, show_session_authorization +@@ -3647,6 +3649,12 @@ + newval = guc_strdup(elevel, value); + if (newval == NULL) + return false; ++/* ++ * The only sort of "parsing" check we need to do is ++ * apply truncation if GUC_IS_NAME. ++ */ ++if (conf->gen.flags & GUC_IS_NAME) ++
[CVS] OpenPKG: OPENPKG_2_4_SOLID: openpkg-src/postgresql/ postgresql.p...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 12:28:11 Branch: OPENPKG_2_4_SOLIDHandle: 2006021911281000 Modified files: (Branch: OPENPKG_2_4_SOLID) openpkg-src/postgresql postgresql.patch postgresql.spec Log: Security Fixes (CVE-2006-0553) Summary: RevisionChanges Path 1.2.4.1 +89 -0 openpkg-src/postgresql/postgresql.patch 1.154.2.2 +1 -1 openpkg-src/postgresql/postgresql.spec patch -p0 <<'@@ .' Index: openpkg-src/postgresql/postgresql.patch $ cvs diff -u -r1.2 -r1.2.4.1 postgresql.patch --- openpkg-src/postgresql/postgresql.patch 16 Feb 2005 16:16:47 - 1.2 +++ openpkg-src/postgresql/postgresql.patch 19 Feb 2006 11:28:10 - 1.2.4.1 @@ -60,3 +60,92 @@ # Force _GNU_SOURCE on; plperl is broken with Perl 5.8.0 otherwise -CPPFLAGS="-D_GNU_SOURCE" +CPPFLAGS="$CPPFLAGS -D_GNU_SOURCE" + +- + +Security Fixes (CVE-2006-0553) + +Index: src/backend/utils/mb/encnames.c +--- src/backend/utils/mb/encnames.c.orig 2004-12-04 19:19:31 +0100 src/backend/utils/mb/encnames.c 2006-02-19 11:53:15 +0100 +@@ -434,7 +434,7 @@ + if (name == NULL || *name == '\0') + return NULL; + +-if (strlen(name) > NAMEDATALEN) ++if (strlen(name) >= NAMEDATALEN) + { + #ifdef FRONTEND + fprintf(stderr, "encoding name too long\n"); +Index: src/backend/utils/misc/guc.c +--- src/backend/utils/misc/guc.c.orig2005-03-25 17:17:38 +0100 src/backend/utils/misc/guc.c 2006-02-19 11:53:15 +0100 +@@ -44,6 +44,7 @@ + #include "optimizer/prep.h" + #include "parser/parse_expr.h" + #include "parser/parse_relation.h" ++#include "parser/scansup.h" + #include "postmaster/bgwriter.h" + #include "postmaster/syslogger.h" + #include "postmaster/postmaster.h" +@@ -1426,7 +1427,7 @@ + {"client_encoding", PGC_USERSET, CLIENT_CONN_LOCALE, + gettext_noop("Sets the client's character set encoding."), + NULL, +-GUC_REPORT ++GUC_IS_NAME | GUC_REPORT + }, + &client_encoding_string, + "SQL_ASCII", assign_client_encoding, NULL +@@ -1506,7 +1507,8 @@ + { + {"default_tablespace", PGC_USERSET, CLIENT_CONN_STATEMENT, + gettext_noop("Sets the default tablespace to create tables and indexes in."), +-gettext_noop("An empty string selects the database's default tablespace.") ++gettext_noop("An empty string selects the database's default tablespace."), ++GUC_IS_NAME + }, + &default_tablespace, + "", assign_default_tablespace, NULL +@@ -1646,7 +1648,7 @@ + {"server_encoding", PGC_INTERNAL, CLIENT_CONN_LOCALE, + gettext_noop("Sets the server (database) character set encoding."), + NULL, +-GUC_REPORT | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE ++GUC_IS_NAME | GUC_REPORT | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE + }, + &server_encoding_string, + "SQL_ASCII", NULL, NULL +@@ -1668,7 +1670,7 @@ + {"session_authorization", PGC_USERSET, UNGROUPED, + gettext_noop("Sets the session user name."), + NULL, +-GUC_REPORT | GUC_NO_SHOW_ALL | GUC_NO_RESET_ALL | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE ++GUC_IS_NAME | GUC_REPORT | GUC_NO_SHOW_ALL | GUC_NO_RESET_ALL | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE + }, + &session_authorization_string, + NULL, assign_session_authorization, show_session_authorization +@@ -3647,6 +3649,12 @@ + newval = guc_strdup(elevel, value); + if (newval == NULL) + return false; ++/* ++ * The only sort of "parsing" check we need to do is ++ * apply truncation if GUC_IS_NAME. ++ */ ++if (conf->gen.flags & GUC_IS_NAME) ++
[CVS] OpenPKG: OPENPKG_2_5_SOLID: openpkg-src/postgresql/ postgresql.p...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 12:10:15 Branch: OPENPKG_2_5_SOLIDHandle: 2006021911101400 Modified files: (Branch: OPENPKG_2_5_SOLID) openpkg-src/postgresql postgresql.patch postgresql.spec Log: Security Fixes (CVE-2006-0553) Summary: RevisionChanges Path 1.2.6.1 +89 -0 openpkg-src/postgresql/postgresql.patch 1.167.2.3 +1 -1 openpkg-src/postgresql/postgresql.spec patch -p0 <<'@@ .' Index: openpkg-src/postgresql/postgresql.patch $ cvs diff -u -r1.2 -r1.2.6.1 postgresql.patch --- openpkg-src/postgresql/postgresql.patch 16 Feb 2005 16:16:47 - 1.2 +++ openpkg-src/postgresql/postgresql.patch 19 Feb 2006 11:10:14 - 1.2.6.1 @@ -60,3 +60,92 @@ # Force _GNU_SOURCE on; plperl is broken with Perl 5.8.0 otherwise -CPPFLAGS="-D_GNU_SOURCE" +CPPFLAGS="$CPPFLAGS -D_GNU_SOURCE" + +- + +Security Fixes (CVE-2006-0553) + +Index: src/backend/utils/mb/encnames.c +--- src/backend/utils/mb/encnames.c.orig 2004-12-04 19:19:31 +0100 src/backend/utils/mb/encnames.c 2006-02-19 11:52:57 +0100 +@@ -434,7 +434,7 @@ + if (name == NULL || *name == '\0') + return NULL; + +-if (strlen(name) > NAMEDATALEN) ++if (strlen(name) >= NAMEDATALEN) + { + #ifdef FRONTEND + fprintf(stderr, "encoding name too long\n"); +Index: src/backend/utils/misc/guc.c +--- src/backend/utils/misc/guc.c.orig2005-03-25 17:17:38 +0100 src/backend/utils/misc/guc.c 2006-02-19 11:52:57 +0100 +@@ -44,6 +44,7 @@ + #include "optimizer/prep.h" + #include "parser/parse_expr.h" + #include "parser/parse_relation.h" ++#include "parser/scansup.h" + #include "postmaster/bgwriter.h" + #include "postmaster/syslogger.h" + #include "postmaster/postmaster.h" +@@ -1426,7 +1427,7 @@ + {"client_encoding", PGC_USERSET, CLIENT_CONN_LOCALE, + gettext_noop("Sets the client's character set encoding."), + NULL, +-GUC_REPORT ++GUC_IS_NAME | GUC_REPORT + }, + &client_encoding_string, + "SQL_ASCII", assign_client_encoding, NULL +@@ -1506,7 +1507,8 @@ + { + {"default_tablespace", PGC_USERSET, CLIENT_CONN_STATEMENT, + gettext_noop("Sets the default tablespace to create tables and indexes in."), +-gettext_noop("An empty string selects the database's default tablespace.") ++gettext_noop("An empty string selects the database's default tablespace."), ++GUC_IS_NAME + }, + &default_tablespace, + "", assign_default_tablespace, NULL +@@ -1646,7 +1648,7 @@ + {"server_encoding", PGC_INTERNAL, CLIENT_CONN_LOCALE, + gettext_noop("Sets the server (database) character set encoding."), + NULL, +-GUC_REPORT | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE ++GUC_IS_NAME | GUC_REPORT | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE + }, + &server_encoding_string, + "SQL_ASCII", NULL, NULL +@@ -1668,7 +1670,7 @@ + {"session_authorization", PGC_USERSET, UNGROUPED, + gettext_noop("Sets the session user name."), + NULL, +-GUC_REPORT | GUC_NO_SHOW_ALL | GUC_NO_RESET_ALL | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE ++GUC_IS_NAME | GUC_REPORT | GUC_NO_SHOW_ALL | GUC_NO_RESET_ALL | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE + }, + &session_authorization_string, + NULL, assign_session_authorization, show_session_authorization +@@ -3647,6 +3649,12 @@ + newval = guc_strdup(elevel, value); + if (newval == NULL) + return false; ++/* ++ * The only sort of "parsing" check we need to do is ++ * apply truncation if GUC_IS_NAME. ++ */ ++if (conf->gen.flags & GUC_IS_NAME) ++
[CVS] OpenPKG: openpkg-src/opera/ opera.patch opera.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 11:35:08 Branch: HEAD Handle: 2006021910350701 Added files: openpkg-src/opera opera.patch Modified files: openpkg-src/opera opera.spec Log: fix building under less forgiving non-GNU-bash /bin/sh Summary: RevisionChanges Path 1.1 +12 -0 openpkg-src/opera/opera.patch 1.30+4 -1 openpkg-src/opera/opera.spec patch -p0 <<'@@ .' Index: openpkg-src/opera/opera.patch $ cvs diff -u -r0 -r1.1 opera.patch --- /dev/null 2006-02-19 11:34:52 +0100 +++ opera.patch 2006-02-19 11:35:08 +0100 @@ -0,0 +1,12 @@ +Index: install.sh +--- install.sh.orig 2006-02-01 15:26:54 +0100 install.sh 2006-02-19 11:32:32 +0100 +@@ -1340,7 +1340,7 @@ + then + # System wide configuration files + case "${os}" in +-FreeBSD|OpenBSD|NetBSD) config_dir='/usr/local/etc' ++FreeBSD|OpenBSD|NetBSD) config_dir='/usr/local/etc' ;; + *) config_dir="/etc";; + esac + @@ . patch -p0 <<'@@ .' Index: openpkg-src/opera/opera.spec $ cvs diff -u -r1.29 -r1.30 opera.spec --- openpkg-src/opera/opera.spec 15 Feb 2006 19:38:23 - 1.29 +++ openpkg-src/opera/opera.spec 19 Feb 2006 10:35:08 - 1.30 @@ -42,12 +42,13 @@ Group:Web License: Commercial Version: %{V_openpkg} -Release: 20060215 +Release: 20060219 # list of sources Source0: ftp://ftp.opera.com/pub/opera/unix/freebsd/%{V_bsd_comp}/final/en/static/opera-%{V_bsd_real}-static-qt.i386.freebsd-en.tar.bz2 Source1: ftp://ftp.opera.com/pub/opera/linux/%{V_lnx_comp}/final/en/i386/static/opera-%{V_lnx_real}-static-qt.i386-en.tar.bz2 Source2: ftp://ftp.opera.com/pub/opera/unix/solaris/%{V_sol_comp}/final/en/static/opera-%{V_sol_real}-static-qt-sol8-sparc-local-en.tar.bz2 +Patch0: opera.patch # build information Prefix: %{l_prefix} @@ -91,6 +92,8 @@ * ) echo "Platform \"%{l_platform -t}\" not supported" 1>&2; exit 1 ;; esac %{l_bzip2} -d -c $src | %{l_tar} xf - +cd opera-* +%patch -p0 %build @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: openpkg-src/mhash/ mhash.patch mhash.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 11:24:49 Branch: HEAD Handle: 2006021910244900 Modified files: openpkg-src/mhash mhash.patch mhash.spec Log: fix run-time by installing missing header Summary: RevisionChanges Path 1.2 +17 -5 openpkg-src/mhash/mhash.patch 1.23+1 -1 openpkg-src/mhash/mhash.spec patch -p0 <<'@@ .' Index: openpkg-src/mhash/mhash.patch $ cvs diff -u -r1.1 -r1.2 mhash.patch --- openpkg-src/mhash/mhash.patch 8 Dec 2005 19:10:01 - 1.1 +++ openpkg-src/mhash/mhash.patch 19 Feb 2006 10:24:49 - 1.2 @@ -1,6 +1,18 @@ +Index: include/Makefile.in +--- include/Makefile.in.orig 2006-01-10 05:44:15 +0100 include/Makefile.in 2006-02-19 11:18:48 +0100 +@@ -174,7 +174,7 @@ + target_cpu = @target_cpu@ + target_os = @target_os@ + target_vendor = @target_vendor@ +-nobase_include_HEADERS = mhash.h mutils/mhash.h mutils/mglobal.h mutils/mtypes.h mutils/mutils.h mutils/mhash_config.h ++nobase_include_HEADERS = mhash.h mutils/mhash.h mutils/mglobal.h mutils/mtypes.h mutils/mutils.h mutils/mhash_config.h mutils/mincludes.h + all: all-am + + .SUFFIXES: Index: lib/stdfns.c lib/stdfns.c.orig2005-12-07 04:09:46 +0100 -+++ lib/stdfns.c 2005-12-08 20:03:28 +0100 +--- lib/stdfns.c.orig2006-01-10 04:47:18 +0100 lib/stdfns.c 2006-02-19 11:16:56 +0100 @@ -24,6 +24,7 @@ */ @@ -9,7 +21,7 @@ /** * Some of these are wrappers. The idea is to eventually produce an extremely -@@ -184,11 +185,11 @@ +@@ -222,11 +223,11 @@ { return(0); } @@ -23,7 +35,7 @@ } return(memcmp(s1, s2, n)); -@@ -305,11 +306,11 @@ +@@ -343,11 +344,11 @@ { return(0); } @@ -37,7 +49,7 @@ } return(strcmp((char *) src1, (char *) src2)); } -@@ -328,11 +329,11 @@ +@@ -366,11 +367,11 @@ { return(0); } @@ . patch -p0 <<'@@ .' Index: openpkg-src/mhash/mhash.spec $ cvs diff -u -r1.22 -r1.23 mhash.spec --- openpkg-src/mhash/mhash.spec 10 Jan 2006 09:13:56 - 1.22 +++ openpkg-src/mhash/mhash.spec 19 Feb 2006 10:24:49 - 1.23 @@ -37,7 +37,7 @@ Group:Cryptography License: LGPL Version: %{V_vl}%{V_pl} -Release: 20060110 +Release: 20060219 # list of sources Source0: http://osdn.dl.sourceforge.net/sourceforge/mhash/mhash-%{V_vl}%{V_pl}.tar.gz @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: openpkg-src/snort/ snort.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 11:16:34 Branch: HEAD Handle: 2006021910163400 Modified files: openpkg-src/snort snort.spec Log: upgrade to latest oinkmaster 2.0 Summary: RevisionChanges Path 1.39+3 -3 openpkg-src/snort/snort.spec patch -p0 <<'@@ .' Index: openpkg-src/snort/snort.spec $ cvs diff -u -r1.38 -r1.39 snort.spec --- openpkg-src/snort/snort.spec 1 Jan 2006 13:22:24 - 1.38 +++ openpkg-src/snort/snort.spec 19 Feb 2006 10:16:34 - 1.39 @@ -25,7 +25,7 @@ # package version %define V_snort 2.4.3 %define V_rules 2.4 -%define V_oinkmaster 1.2 +%define V_oinkmaster 2.0 # package information Name: snort @@ -38,7 +38,7 @@ Group:Network License: GPL Version: %{V_snort} -Release: 20051019 +Release: 20060219 # package options %option with_fslyes @@ -206,7 +206,7 @@ %{l_shtool} install -c -m 644 \ -e 's;^\(path = \);\1%{l_prefix}/bin:;' \ -e 's;^# tmpdir = /home/oinkmaster/tmp/;tmpdir = %{l_prefix}/var/snort/tmp;' \ - -e 's;^# \(use_external_bins = 0\);\1;' \ + -e 's;^\(use_external_bins = 0\);\1;' \ -e 's;^\(skipfile snort\.conf\);# \1;' \ oinkmaster.conf $RPM_BUILD_ROOT%{l_prefix}/etc/snort/ ) || exit $? @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: openpkg-src/wine/ wine.patch wine.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 09:26:14 Branch: HEAD Handle: 2006021908261400 Modified files: openpkg-src/winewine.patch wine.spec Log: upgrading package: wine 0.9.6 -> 0.9.8 Summary: RevisionChanges Path 1.17+7 -15 openpkg-src/wine/wine.patch 1.50+2 -2 openpkg-src/wine/wine.spec patch -p0 <<'@@ .' Index: openpkg-src/wine/wine.patch $ cvs diff -u -r1.16 -r1.17 wine.patch --- openpkg-src/wine/wine.patch 12 Jan 2006 09:44:56 - 1.16 +++ openpkg-src/wine/wine.patch 19 Feb 2006 08:26:14 - 1.17 @@ -1,6 +1,6 @@ Index: include/winternl.h include/winternl.h.orig 2006-01-04 17:05:13 +0100 -+++ include/winternl.h 2006-01-12 10:23:21 +0100 +--- include/winternl.h.orig 2006-02-15 17:02:58 +0100 include/winternl.h 2006-02-19 09:01:59 +0100 @@ -22,6 +22,7 @@ #define __WINE_WINTERNL_H @@ -10,8 +10,8 @@ #ifdef __cplusplus extern "C" { Index: programs/Makefile.in programs/Makefile.in.orig2006-01-04 17:05:16 +0100 -+++ programs/Makefile.in 2006-01-12 10:23:21 +0100 +--- programs/Makefile.in.orig2006-02-15 17:02:59 +0100 programs/Makefile.in 2006-02-19 09:01:59 +0100 @@ -35,7 +35,6 @@ winemenubuilder \ winemine \ @@ -19,20 +19,12 @@ -winetest \ winevdm \ winhelp \ - winver -@@ -69,7 +68,6 @@ - winemenubuilder \ - winemine \ - winepath \ --winetest \ - winevdm \ - winhelp \ - winver -@@ -126,7 +124,6 @@ + winver \ +@@ -127,7 +126,6 @@ winemenubuilder.exe$(DLLEXT) \ winemine.exe$(DLLEXT) \ winepath.exe$(DLLEXT) \ -winetest.exe$(DLLEXT) \ winevdm.exe$(DLLEXT) \ winhelp.exe$(DLLEXT) \ - winver.exe$(DLLEXT) + winver.exe$(DLLEXT) \ @@ . patch -p0 <<'@@ .' Index: openpkg-src/wine/wine.spec $ cvs diff -u -r1.49 -r1.50 wine.spec --- openpkg-src/wine/wine.spec22 Jan 2006 19:32:12 - 1.49 +++ openpkg-src/wine/wine.spec19 Feb 2006 08:26:14 - 1.50 @@ -32,8 +32,8 @@ Class:EVAL Group:XWindow License: LGPL -Version: 0.9.6 -Release: 20060122 +Version: 0.9.8 +Release: 20060219 # list of sources Source0: http://ibiblio.org/pub/linux/system/emulators/wine/wine-%{version}.tar.bz2 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: openpkg-src/w3m/ w3m.patch w3m.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 09:21:53 Branch: HEAD Handle: 2006021908215300 Added files: openpkg-src/w3m w3m.patch Modified files: openpkg-src/w3m w3m.spec Log: apply a patch from the FreeBSD ports which closes the pipe for gzipped stream properly; move substitution into patch file, too Summary: RevisionChanges Path 1.4 +24 -0 openpkg-src/w3m/w3m.patch 1.59+3 -3 openpkg-src/w3m/w3m.spec patch -p0 <<'@@ .' Index: openpkg-src/w3m/w3m.patch $ cvs diff -u -r0 -r1.4 w3m.patch --- /dev/null 2006-02-19 09:21:07 +0100 +++ w3m.patch 2006-02-19 09:21:53 +0100 @@ -0,0 +1,24 @@ +Index: Makefile.in +--- Makefile.in.orig 2004-04-26 19:04:48 +0200 Makefile.in 2006-02-19 09:17:44 +0100 +@@ -117,7 +117,7 @@ + + DEFUNS=$(top_srcdir)/main.c $(top_srcdir)/menu.c + SCRIPTSUBDIRS= scripts +-SUBDIRS = $(SCRIPTSUBDIRS) w3mimg libwc po ++SUBDIRS = $(SCRIPTSUBDIRS) w3mimg libwc + .PHONY: $(SUBDIRS) + + all: $(TARGETS) all-scripts $(NLSTARGET) +Index: file.c +--- file.c.orig 2004-04-16 20:47:19 +0200 file.c 2006-02-19 09:16:54 +0100 +@@ -7891,7 +7892,7 @@ + uf->scheme = SCM_LOCAL; + } + UFhalfclose(uf); +-uf->stream = newFileStream(f1, (void (*)())pclose); ++uf->stream = newFileStream(f1, (void (*)())fclose); + } + + static FILE * @@ . patch -p0 <<'@@ .' Index: openpkg-src/w3m/w3m.spec $ cvs diff -u -r1.58 -r1.59 w3m.spec --- openpkg-src/w3m/w3m.spec 1 Jan 2006 13:23:50 - 1.58 +++ openpkg-src/w3m/w3m.spec 19 Feb 2006 08:21:53 - 1.59 @@ -33,10 +33,11 @@ Group:Web License: BSD Version: 0.5.1 -Release: 20050726 +Release: 20060219 # list of sources Source0: http://osdn.dl.sourceforge.net/sourceforge/w3m/w3m-%{version}.tar.gz +Patch0: w3m.patch # build information Prefix: %{l_prefix} @@ -64,6 +65,7 @@ %prep %setup -q +%patch -p0 %build CC="%{l_cc}" \ @@ -105,8 +107,6 @@ --disable-unicode \ --disable-m17n \ --disable-nls -%{l_shtool} subst \ --e 's; [^ ]*po$;;' Makefile %{l_make} %{l_mflags -O} %install @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: openpkg-src/mutt/ mutt.patch mutt.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 09:14:29 Branch: HEAD Handle: 2006021908142800 Added files: openpkg-src/muttmutt.patch Modified files: openpkg-src/muttmutt.spec Log: Fix the 'sign as' function for SMIME with a patch taken over from the FreeBSD ports Summary: RevisionChanges Path 1.5 +11 -0 openpkg-src/mutt/mutt.patch 1.70+3 -1 openpkg-src/mutt/mutt.spec patch -p0 <<'@@ .' Index: openpkg-src/mutt/mutt.patch $ cvs diff -u -r0 -r1.5 mutt.patch --- /dev/null 2006-02-19 09:14:28 +0100 +++ mutt.patch2006-02-19 09:14:28 +0100 @@ -0,0 +1,11 @@ +Index: smime.c +--- smime.c.orig 2005-08-14 14:33:37 +0200 smime.c 2006-02-19 09:11:56 +0100 +@@ -1989,7 +1989,6 @@ + + if ((p = smime_ask_for_key (_("Sign as: "), NULL, 0))) + { +- p[mutt_strlen (p)-1] = '\0'; + mutt_str_replace (&SmimeDefaultKey, p); + + msg->security |= SIGN; @@ . patch -p0 <<'@@ .' Index: openpkg-src/mutt/mutt.spec $ cvs diff -u -r1.69 -r1.70 mutt.spec --- openpkg-src/mutt/mutt.spec28 Jan 2006 11:37:10 - 1.69 +++ openpkg-src/mutt/mutt.spec19 Feb 2006 08:14:28 - 1.70 @@ -38,7 +38,7 @@ Group:Mail License: BSD Version: %{V_mutt}i -Release: 20060128 +Release: 20060219 # build options %option with_comp no @@ -57,6 +57,7 @@ Patch2: ftp://ftp.mutt.org.ua/pub/mutt/mutt-%{V_mutt_patches}/patch-%{V_mutt_patches}.vvv.initials.gz Patch3: ftp://ftp.mutt.org.ua/pub/mutt/mutt-%{V_mutt_patches}/patch-%{V_mutt_patches}.vvv.quote.gz Patch4: http://thomer.com/mutt/patch-%{V_mutt_patches_sidebar}.txt +Patch5: mutt.patch # build information Prefix: %{l_prefix} @@ -144,6 +145,7 @@ %if "%{with_sidebar}" == "yes" %patch -p1 -P 4 %endif +%patch -p0 -P 5 %{l_shtool} subst \ -e 's;\(Mutt/%%s\);\1 %{l_openpkg_release -F "OpenPKG/%%s"};' \ sendlib.c @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: openpkg-src/gcc42/ gcc42.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 19-Feb-2006 09:10:46 Branch: HEAD Handle: 2006021908104600 Modified files: openpkg-src/gcc42 gcc42.spec Log: upgrading package: gcc42 4.2s20060211 -> 4.2s20060218 Summary: RevisionChanges Path 1.4 +2 -2 openpkg-src/gcc42/gcc42.spec patch -p0 <<'@@ .' Index: openpkg-src/gcc42/gcc42.spec $ cvs diff -u -r1.3 -r1.4 gcc42.spec --- openpkg-src/gcc42/gcc42.spec 12 Feb 2006 11:51:48 - 1.3 +++ openpkg-src/gcc42/gcc42.spec 19 Feb 2006 08:10:46 - 1.4 @@ -25,7 +25,7 @@ # package version %define V_full 4.2 %define V_comp 42 -%define V_snap 20060211 +%define V_snap 20060218 # package information Name: gcc42 @@ -38,7 +38,7 @@ Group:Compiler License: GPL Version: %{V_full}s%{V_snap} -Release: 20060212 +Release: 20060219 # package options %option with_cxx yes @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org
[CVS] OpenPKG: openpkg-src/ucarp/ ucarp.patch ucarp.spec
# define __OBSD_IPADDR(x) ((uint32_t) htonl((uint32_t)(x))) + # define INADDR_CARP_GROUP__OBSD_IPADDR(0xe012)/* 224.0.0.18 */ + #endif + #ifndef timercmp +@@ -194,7 +194,7 @@ + int sc_naddrs6; + int sc_advbase; /* seconds */ + int sc_init_counter; +-u_int64_t sc_counter; ++uint64_t sc_counter; + + /* authentication */ + #define CARP_HMAC_PAD 64 @@ . patch -p0 <<'@@ .' Index: openpkg-src/ucarp/ucarp.spec ==== $ cvs diff -u -r1.12 -r1.13 ucarp.spec --- openpkg-src/ucarp/ucarp.spec 1 Jan 2006 13:23:36 - 1.12 +++ openpkg-src/ucarp/ucarp.spec 19 Feb 2006 08:01:47 - 1.13 @@ -32,8 +32,8 @@ Class:EVAL Group:Network License: Specific -Version: 1.1 -Release: 20041110 +Version: 1.2 +Release: 20060219 # package options %option with_fsl yes @@ -80,39 +80,14 @@ %prep %setup -q %patch -p0 -%{l_shtool} subst \ --e 's;u_int\([0-9]*\)_t;uint\1_t;g' \ -src/ip_carp.h \ -src/ucarp.h \ -src/carp.c -case "%{l_platform -t}" in -*-sunos* ) -%{l_shtool} subst \ --e 's;\(->ether_.host\)\(\[[0-9]*\]\);\1.ether_addr_octet\2;g' \ -src/carp.c -%{l_shtool} subst \ --e 's;\(->ether_.host\),;\1.ether_addr_octet,;g' \ -src/garp.c -;; -esac %build -# compensate for nonportable constructs -DEFFLAGS= -LIBFLAGS= -case "%{l_platform -t}" in -*-sunos* ) -DEFFLAGS="-DETHER_ADDR_LEN=6" -LIBFLAGS="-lresolv" -;; -esac - # configure program CC="%{l_cc}" \ CFLAGS="%{l_cflags -O}" \ -CPPFLAGS="%{l_cppflags} $DEFFLAGS" \ +CPPFLAGS="%{l_cppflags}" \ LDFLAGS="%{l_ldflags} %{l_fsl_ldflags}" \ -LIBS="%{l_fsl_libs} -lpcap $LIBFLAGS" \ +LIBS="%{l_fsl_libs} -lpcap" \ ./configure \ --prefix=%{l_prefix} \ --sysconfdir=%{l_prefix}/etc/ucarp \ @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org