[CVS] OpenPKG: openpkg-src/rbldnsd/ rbldnsd.spec

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 19:54:51
  Branch: HEAD Handle: 2006021918545100

  Modified files:
openpkg-src/rbldnsd rbldnsd.spec

  Log:
upgrading package: rbldnsd 0.995 -> 0.996

  Summary:
RevisionChanges Path
1.11+2  -2  openpkg-src/rbldnsd/rbldnsd.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/rbldnsd/rbldnsd.spec
  
  $ cvs diff -u -r1.10 -r1.11 rbldnsd.spec
  --- openpkg-src/rbldnsd/rbldnsd.spec  1 Jan 2006 13:21:10 -   1.10
  +++ openpkg-src/rbldnsd/rbldnsd.spec  19 Feb 2006 18:54:51 -  1.11
  @@ -32,8 +32,8 @@
   Class:PLUS
   Group:DNS
   License:  GPL
  -Version:  0.995
  -Release:  20050910
  +Version:  0.996
  +Release:  20060219
   
   #   package options
   %option   with_fslyes
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-src/sendmail/ sendmail.spec

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 19:31:02
  Branch: HEAD Handle: 2006021918310100

  Modified files:
openpkg-src/sendmailsendmail.spec

  Log:
pass C compiler and flags to the build process (submitted by: Joerg
Lehrke)

  Summary:
RevisionChanges Path
1.127   +3  -2  openpkg-src/sendmail/sendmail.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/sendmail/sendmail.spec
  
  $ cvs diff -u -r1.126 -r1.127 sendmail.spec
  --- openpkg-src/sendmail/sendmail.spec1 Jan 2006 13:22:04 -   
1.126
  +++ openpkg-src/sendmail/sendmail.spec19 Feb 2006 18:31:01 -  
1.127
  @@ -33,7 +33,7 @@
   Group:Mail
   License:  BSD
   Version:  8.13.5
  -Release:  20050917
  +Release:  20060219
   
   #   package options
   %option   with_fsl   yes
  @@ -145,7 +145,8 @@
   esac
   
   #   configure Sendmail
  -(   echo "define(\`confMAPDEF', \`-DMAP_REGEX')dnl"
  +(   echo "define(\`confCC', \`%{l_cc} %{l_cflags}')dnl"
  +echo "define(\`confMAPDEF', \`-DMAP_REGEX')dnl"
   echo "define(\`confSBINOWN', \`%{l_musr}')dnl"
   echo "define(\`confSBINGRP', \`%{l_mgrp}')dnl"
   echo "define(\`confUBINOWN', \`%{l_musr}')dnl"
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-web/ security.txt security.wml

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   19-Feb-2006 13:11:48
  Branch: HEAD Handle: 2006021912114800

  Modified files:
openpkg-web security.txt security.wml

  Log:
link SAs into website

  Summary:
RevisionChanges Path
1.121   +2  -0  openpkg-web/security.txt
1.150   +2  -0  openpkg-web/security.wml
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.120 -r1.121 security.txt
  --- openpkg-web/security.txt  18 Feb 2006 12:35:24 -  1.120
  +++ openpkg-web/security.txt  19 Feb 2006 12:11:48 -  1.121
  @@ -1,3 +1,5 @@
  +19-Feb-2006: Security Advisory: S
  +18-Feb-2006: Security Advisory: S
   18-Feb-2006: Security Advisory: S
   18-Feb-2006: Security Advisory: S
   18-Feb-2006: Security Advisory: S
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.149 -r1.150 security.wml
  --- openpkg-web/security.wml  18 Feb 2006 12:35:24 -  1.149
  +++ openpkg-web/security.wml  19 Feb 2006 12:11:48 -  1.150
  @@ -90,6 +90,8 @@
   
   
   
  +  
  +  
 
 
 
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2006.005-tin.txt

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   19-Feb-2006 13:10:58
  Branch: HEAD Handle: 2006021912105800

  Added files:
openpkg-web/securityOpenPKG-SA-2006.005-tin.txt

  Log:
release OpenPKG Security Advisory 2006.005 (tin)

  Summary:
RevisionChanges Path
1.1 +44 -0  openpkg-web/security/OpenPKG-SA-2006.005-tin.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2006.005-tin.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2006.005-tin.txt
  --- /dev/null 2006-02-19 13:10:58 +0100
  +++ OpenPKG-SA-2006.005-tin.txt   2006-02-19 13:10:58 +0100
  @@ -0,0 +1,44 @@
  +-BEGIN PGP SIGNED MESSAGE-
  +Hash: SHA1
  +
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2006.005  19-Feb-2006
  +
  +
  +Package: tin
  +Vulnerability:   buffer overflow
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  <= tin-1.8.0-20060113   >= tin-1.8.1-20060216
  +OpenPKG 2.5  <= tin-1.6.2-2.5.0  >= tin-1.6.2-2.5.1
  +OpenPKG 2.4  <= tin-1.6.2-2.4.1  >= tin-1.6.2-2.4.2
  +OpenPKG 2.3  <= tin-1.6.2-2.3.1  >= tin-1.6.2-2.3.2
  +
  +Description:
  +  An allocation off-by-one bug exists in the TIN [1] news reader version
  +  1.8.0 and earlier which can lead to a buffer overflow.
  +
  +
  +References:
  +  [1] http://www.tin.org/
  +
  +
  +For security reasons, this advisory was digitally signed with the
  +OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F) of the
  +OpenPKG project which you can retrieve from http://pgp.openpkg.org and
  +hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/
  +for details on how to verify the integrity of this advisory.
  +
  +
  +-BEGIN PGP SIGNATURE-
  +Comment: OpenPKG <[EMAIL PROTECTED]>
  +
  +iD8DBQFD+GAxgHWT4GPEy58RAmoZAJ92hWIyXxPTqgDW1Q9Bxes8TyfxXACg92EJ
  +8wpsFu+17HYli7tx59HLOpU=
  +=ebcm
  +-END PGP SIGNATURE-
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-web/security/ page.pl

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   19-Feb-2006 13:10:00
  Branch: HEAD Handle: 2006021912095900

  Modified files:
openpkg-web/securitypage.pl

  Log:
support HTTPS URLs

  Summary:
RevisionChanges Path
1.42+3  -3  openpkg-web/security/page.pl
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/page.pl
  
  $ cvs diff -u -r1.41 -r1.42 page.pl
  --- openpkg-web/security/page.pl  24 Feb 2005 10:58:27 -  1.41
  +++ openpkg-web/security/page.pl  19 Feb 2006 12:09:59 -  1.42
  @@ -31,15 +31,15 @@
   
   my $L = {};
   my $x = $txt;
  -$x =~ s%^\s*\[(\d+)\]\s+((?:http|ftp|hkp)://\S+)%$L->{$1} = $2, ''%mge;
  +$x =~ s%^\s*\[(\d+)\]\s+((?:https?|ftp|hkp)://\S+)%$L->{$1} = $2, ''%mge;
   $txt =~ s/&/&/sg;
   $txt =~ s//>/sg;
  -$txt =~ s/((?:http|ftp|hkp):\/\/[^\s]+[^\s\.\)\&])/$1<\/a>/sg;
  +$txt =~ s/((?:https?|ftp|hkp):\/\/[^\s]+[^\s\.\)\&])/$1<\/a>/sg;
   $txt =~ s/([\s;]+)([EMAIL PROTECTED])\&]+?)([\s&]+)/$1mailto:$2";>$2<\/a>$3/sg;
   $txt =~ s/(OpenPKG Security Advisory)/$1<\/b>/sg;
   $txt =~ s/^((\s*[A-Z][a-zA-Z]+)+:)/$1<\/b>/mg;
  -$txt =~ s/(\[(\d+)\])(?!\s+(?:http|ftp|hkp):\/\/)/"{$2} 
|| print STDERR "WARNING: reference [$2] not defined\n")."\">".$1."<\/a>"/sge;
  +$txt =~ s/(\[(\d+)\])(?!\s+(?:https?|ftp|hkp):\/\/)/"{$2} || print STDERR "WARNING: reference [$2] not 
defined\n")."\">".$1."<\/a>"/sge;
   
   my $head = '';
   $io = new IO::File "

[CVS] OpenPKG: OPENPKG_2_3_SOLID: openpkg-src/tin/ tin.patch tin.spec

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 13:00:40
  Branch: OPENPKG_2_3_SOLIDHandle: 2006021912003901

  Modified files:   (Branch: OPENPKG_2_3_SOLID)
openpkg-src/tin tin.patch tin.spec

  Log:
Security Fix

  Summary:
RevisionChanges Path
1.1.16.2+18 -0  openpkg-src/tin/tin.patch
1.43.2.3+1  -1  openpkg-src/tin/tin.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/tin/tin.patch
  
  $ cvs diff -u -r1.1.16.1 -r1.1.16.2 tin.patch
  --- openpkg-src/tin/tin.patch 5 Sep 2005 14:54:30 -   1.1.16.1
  +++ openpkg-src/tin/tin.patch 19 Feb 2006 12:00:39 -  1.1.16.2
  @@ -121,3 +121,21 @@
  {
  bracount++;
  if (bracount > EXTRACT_BASIC_MAX) bracket_length += 3;
  +
  
+--
  +
  +Security Fix
  +
  +Index: src/mail.c
  +--- src/mail.c   2005-12-02 12:07:36 +0100
   src/mail.c   2006-01-19 23:40:13 +0100
  +@@ -369,7 +369,7 @@
  + space = strlen(ptr) + 1;
  + groupname = my_malloc(space);
  + } else {
  +-while (strlen(ptr) > space) { /* realloc needed? */
  ++while (space < strlen(ptr) + 1) { /* realloc needed? */
  + space <<= 1; /* double size */
  + groupname = my_realloc(groupname, space);
  + }
  +
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/tin/tin.spec
  
  $ cvs diff -u -r1.43.2.2 -r1.43.2.3 tin.spec
  --- openpkg-src/tin/tin.spec  5 Sep 2005 14:54:30 -   1.43.2.2
  +++ openpkg-src/tin/tin.spec  19 Feb 2006 12:00:40 -  1.43.2.3
  @@ -38,7 +38,7 @@
   Group:News
   License:  GPL
   Version:  %{V_major}.%{V_minor}
  -Release:  2.3.1
  +Release:  2.3.2
   
   #   list of sources
   Source0:  
ftp://ftp.tin.org/pub/news/clients/tin/v%{V_major}/tin-%{version}.tar.bz2
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: OPENPKG_2_4_SOLID: openpkg-src/tin/ tin.patch tin.spec

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 12:59:32
  Branch: OPENPKG_2_4_SOLIDHandle: 2006021911593101

  Modified files:   (Branch: OPENPKG_2_4_SOLID)
openpkg-src/tin tin.patch tin.spec

  Log:
Security Fix

  Summary:
RevisionChanges Path
1.1.18.2+18 -0  openpkg-src/tin/tin.patch
1.44.2.3+1  -1  openpkg-src/tin/tin.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/tin/tin.patch
  
  $ cvs diff -u -r1.1.18.1 -r1.1.18.2 tin.patch
  --- openpkg-src/tin/tin.patch 5 Sep 2005 14:51:38 -   1.1.18.1
  +++ openpkg-src/tin/tin.patch 19 Feb 2006 11:59:31 -  1.1.18.2
  @@ -121,3 +121,21 @@
  {
  bracount++;
  if (bracount > EXTRACT_BASIC_MAX) bracket_length += 3;
  +
  
+--
  +
  +Security Fix
  +
  +Index: src/mail.c
  +--- src/mail.c   2005-12-02 12:07:36 +0100
   src/mail.c   2006-01-19 23:40:13 +0100
  +@@ -369,7 +369,7 @@
  + space = strlen(ptr) + 1;
  + groupname = my_malloc(space);
  + } else {
  +-while (strlen(ptr) > space) { /* realloc needed? */
  ++while (space < strlen(ptr) + 1) { /* realloc needed? */
  + space <<= 1; /* double size */
  + groupname = my_realloc(groupname, space);
  + }
  +
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/tin/tin.spec
  
  $ cvs diff -u -r1.44.2.2 -r1.44.2.3 tin.spec
  --- openpkg-src/tin/tin.spec  5 Sep 2005 14:51:38 -   1.44.2.2
  +++ openpkg-src/tin/tin.spec  19 Feb 2006 11:59:32 -  1.44.2.3
  @@ -37,7 +37,7 @@
   Group:News
   License:  GPL
   Version:  %{V_major}.%{V_minor}
  -Release:  2.4.1
  +Release:  2.4.2
   
   #   list of sources
   Source0:  
ftp://ftp.tin.org/pub/news/clients/tin/v%{V_major}/tin-%{version}.tar.bz2
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: OPENPKG_2_5_SOLID: openpkg-src/tin/ tin.patch tin.spec

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 12:58:13
  Branch: OPENPKG_2_5_SOLIDHandle: 2006021911581300

  Modified files:   (Branch: OPENPKG_2_5_SOLID)
openpkg-src/tin tin.patch tin.spec

  Log:
Security Fix

  Summary:
RevisionChanges Path
1.2.2.1 +18 -0  openpkg-src/tin/tin.patch
1.45.2.2+1  -1  openpkg-src/tin/tin.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/tin/tin.patch
  
  $ cvs diff -u -r1.2 -r1.2.2.1 tin.patch
  --- openpkg-src/tin/tin.patch 5 Sep 2005 14:48:02 -   1.2
  +++ openpkg-src/tin/tin.patch 19 Feb 2006 11:58:13 -  1.2.2.1
  @@ -121,3 +121,21 @@
  {
  bracount++;
  if (bracount > EXTRACT_BASIC_MAX) bracket_length += 3;
  +
  
+--
  +
  +Security Fix
  +
  +Index: src/mail.c
  +--- src/mail.c   2005-12-02 12:07:36 +0100
   src/mail.c   2006-01-19 23:40:13 +0100
  +@@ -369,7 +369,7 @@
  + space = strlen(ptr) + 1;
  + groupname = my_malloc(space);
  + } else {
  +-while (strlen(ptr) > space) { /* realloc needed? */
  ++while (space < strlen(ptr) + 1) { /* realloc needed? */
  + space <<= 1; /* double size */
  + groupname = my_realloc(groupname, space);
  + }
  +
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/tin/tin.spec
  
  $ cvs diff -u -r1.45.2.1 -r1.45.2.2 tin.spec
  --- openpkg-src/tin/tin.spec  11 Oct 2005 12:52:11 -  1.45.2.1
  +++ openpkg-src/tin/tin.spec  19 Feb 2006 11:58:13 -  1.45.2.2
  @@ -37,7 +37,7 @@
   Group:News
   License:  GPL
   Version:  %{V_major}.%{V_minor}
  -Release:  2.5.0
  +Release:  2.5.1
   
   #   list of sources
   Source0:  
ftp://ftp.tin.org/pub/news/clients/tin/v%{V_major}/tin-%{version}.tar.bz2
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-src/aide/ aide.patch aide.spec

2006-02-19 Thread Ralf S. Engelschall
re else */
  - #define READ_BLOCK_SIZE 16384
  --#define READ_BLOCK_SIZE 16777216
  - 
  - #ifdef WITH_MHASH
  - #include 
  + /* Lookup syslog facilities by name */
  + int syslog_facility_lookup(char *s)
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/aide/aide.spec
  
  $ cvs diff -u -r1.39 -r1.40 aide.spec
  --- openpkg-src/aide/aide.spec1 Jan 2006 13:11:51 -   1.39
  +++ openpkg-src/aide/aide.spec19 Feb 2006 11:38:42 -  1.40
  @@ -32,8 +32,8 @@
   Class:PLUS
   Group:Security
   License:  GPL
  -Version:  0.10
  -Release:  20051006
  +Version:  0.11
  +Release:  20060219
   
   #   package options
   %option   with_fsl  yes
  @@ -73,22 +73,8 @@
   %prep
   %setup -q
   %patch -p0
  -case "%{l_platform -t}" in
  -*-freebsd* )
  -%{l_shtool} subst -e 's;^\(#define AIDE_BLKCNT_TYPE\) 
blkcnt_t.*$;\1 int64_t;' config.h.in
  -echo "#define HAVE_STRNSTR 1" >>config.h.in
  -;;
  -*-sunos* )
  -%{l_shtool} subst -e 
's;LD_STATIC_FLAG=.-static.;LD_STATIC_FLAG="";' configure
  -;;
  -esac
   
   %build
  -#   marvelling about its beauty
  -%{l_shtool} subst \
  --e 's;//\(.*\);/*\1*/;g' \
  -src/*.c
  -
   CC="%{l_cc}" \
   CFLAGS="%{l_cflags -O}" \
   CPPFLAGS="%{l_cppflags}" \
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2006.004-postgresql.tx...

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   19-Feb-2006 12:37:21
  Branch: HEAD Handle: 2006021911372100

  Added files:
openpkg-web/securityOpenPKG-SA-2006.004-postgresql.txt

  Log:
release OpenPKG Security Advisory 2006.004 (postgresql)

  Summary:
RevisionChanges Path
1.1 +59 -0  
openpkg-web/security/OpenPKG-SA-2006.004-postgresql.txt
  

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2006.004-postgresql.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2006.004-postgresql.txt
  --- /dev/null 2006-02-19 12:37:15 +0100
  +++ OpenPKG-SA-2006.004-postgresql.txt2006-02-19 12:37:21 +0100
  @@ -0,0 +1,59 @@
  +-BEGIN PGP SIGNED MESSAGE-
  +Hash: SHA1
  +
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2006.004  19-Feb-2006
  +
  +
  +Package: postgresql
  +Vulnerability:   privilege escalation
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:   Corrected Packages:
  +OpenPKG CURRENT  <= postgresql-8.1.2-20060211 >= 
postgresql-8.1.3-20060213
  +OpenPKG 2.5  <= postgresql-8.0.4-2.5.0>= postgresql-8.0.4-2.5.1
  +OpenPKG 2.4  <= postgresql-8.0.3-2.4.0>= postgresql-8.0.3-2.4.1
  +OpenPKG 2.3  <= postgresql-8.0.1-2.3.1>= postgresql-8.0.1-2.3.2
  +
  +Description:
  +  According to vendor security information [0], privilege escalation
  +  vulnerabilitiesd exist in the PostgreSQL RDBMS [1] before version
  +  8.1.3. The bug allowed any logged-in user to "SET ROLE" to any other
  +  database user id. Due to inadequate validity checking, a user could
  +  exploit the special case that "SET ROLE" normally uses to restore the
  +  previous role setting after an error. This allowed ordinary users to
  +  acquire superuser status, for example. The Common Vulnerabilities
  +  and Exposures (CVE) project assigned the id CVE-2006-0553 [2] to the
  +  problem.
  +
  +  The escalation of privilege risk exists only in versions 8.1.0 to
  +  8.1.2. However, in all versions back to 7.3 there is a related bug in
  +  "SET SESSION AUTHORIZATION" that allows unprivileged users to crash
  +  the server, if it has been compiled with Asserts enabled (which is not
  +  the default).
  +
  +
  +References:
  +  [0] http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-3
  +  [1] http://www.postgresql.org/
  +  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0553
  +
  +
  +For security reasons, this advisory was digitally signed with the
  +OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F) of the
  +OpenPKG project which you can retrieve from http://pgp.openpkg.org and
  +hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/
  +for details on how to verify the integrity of this advisory.
  +
  +
  +-BEGIN PGP SIGNATURE-
  +Comment: OpenPKG <[EMAIL PROTECTED]>
  +
  +iD8DBQFD+FhfgHWT4GPEy58RAoF3AKCrvXGfM2EhKrayDMuaTG3DLGL4fQCgyyl/
  ++1Qgcz5MZhew1F+8KGz0C1Q=
  +=5J9V
  +-END PGP SIGNATURE-
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: OPENPKG_2_3_SOLID: openpkg-src/postgresql/ postgresql.p...

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 12:35:16
  Branch: OPENPKG_2_3_SOLIDHandle: 2006021911351500

  Modified files:   (Branch: OPENPKG_2_3_SOLID)
openpkg-src/postgresql  postgresql.patch postgresql.spec

  Log:
Security Fixes (CVE-2006-0553)

  Summary:
RevisionChanges Path
1.2.2.1 +89 -0  openpkg-src/postgresql/postgresql.patch
1.138.2.3   +1  -1  openpkg-src/postgresql/postgresql.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/postgresql/postgresql.patch
  
  $ cvs diff -u -r1.2 -r1.2.2.1 postgresql.patch
  --- openpkg-src/postgresql/postgresql.patch   16 Feb 2005 16:16:47 -  
1.2
  +++ openpkg-src/postgresql/postgresql.patch   19 Feb 2006 11:35:15 -  
1.2.2.1
  @@ -60,3 +60,92 @@
# Force _GNU_SOURCE on; plperl is broken with Perl 5.8.0 otherwise
   -CPPFLAGS="-D_GNU_SOURCE"
   +CPPFLAGS="$CPPFLAGS -D_GNU_SOURCE"
  +
  +-
  +
  +Security Fixes (CVE-2006-0553)
  +
  +Index: src/backend/utils/mb/encnames.c
  +--- src/backend/utils/mb/encnames.c.orig 2004-12-04 19:19:31 +0100
   src/backend/utils/mb/encnames.c  2006-02-19 11:53:57 +0100
  +@@ -434,7 +434,7 @@
  + if (name == NULL || *name == '\0')
  + return NULL;
  + 
  +-if (strlen(name) > NAMEDATALEN)
  ++if (strlen(name) >= NAMEDATALEN)
  + {
  + #ifdef FRONTEND
  + fprintf(stderr, "encoding name too long\n");
  +Index: src/backend/utils/misc/guc.c
  +--- src/backend/utils/misc/guc.c.orig2005-01-01 06:43:08 +0100
   src/backend/utils/misc/guc.c 2006-02-19 11:53:57 +0100
  +@@ -44,6 +44,7 @@
  + #include "optimizer/prep.h"
  + #include "parser/parse_expr.h"
  + #include "parser/parse_relation.h"
  ++#include "parser/scansup.h"
  + #include "postmaster/bgwriter.h"
  + #include "postmaster/syslogger.h"
  + #include "postmaster/postmaster.h"
  +@@ -1426,7 +1427,7 @@
  + {"client_encoding", PGC_USERSET, CLIENT_CONN_LOCALE,
  + gettext_noop("Sets the client's character set 
encoding."),
  + NULL,
  +-GUC_REPORT
  ++GUC_IS_NAME | GUC_REPORT
  + },
  + &client_encoding_string,
  + "SQL_ASCII", assign_client_encoding, NULL
  +@@ -1506,7 +1507,8 @@
  + {
  + {"default_tablespace", PGC_USERSET, CLIENT_CONN_STATEMENT,
  + gettext_noop("Sets the default tablespace to create 
tables and indexes in."),
  +-gettext_noop("An empty string selects the database's 
default tablespace.")
  ++gettext_noop("An empty string selects the database's 
default tablespace."),
  ++GUC_IS_NAME
  + },
  + &default_tablespace,
  + "", assign_default_tablespace, NULL
  +@@ -1646,7 +1648,7 @@
  + {"server_encoding", PGC_INTERNAL, CLIENT_CONN_LOCALE,
  + gettext_noop("Sets the server (database) character set 
encoding."),
  + NULL,
  +-GUC_REPORT | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE
  ++GUC_IS_NAME | GUC_REPORT | GUC_NOT_IN_SAMPLE | 
GUC_DISALLOW_IN_FILE
  + },
  + &server_encoding_string,
  + "SQL_ASCII", NULL, NULL
  +@@ -1668,7 +1670,7 @@
  + {"session_authorization", PGC_USERSET, UNGROUPED,
  + gettext_noop("Sets the session user name."),
  + NULL,
  +-GUC_REPORT | GUC_NO_SHOW_ALL | GUC_NO_RESET_ALL | 
GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE
  ++GUC_IS_NAME | GUC_REPORT | GUC_NO_SHOW_ALL | 
GUC_NO_RESET_ALL | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE
  + },
  + &session_authorization_string,
  + NULL, assign_session_authorization, show_session_authorization
  +@@ -3647,6 +3649,12 @@
  + newval = guc_strdup(elevel, value);
  + if (newval == NULL)
  + return false;
  ++/*
  ++ * The only sort of "parsing" check we 
need to do is
  ++ * apply truncation if GUC_IS_NAME.
  ++ */
  ++if (conf->gen.flags & GUC_IS_NAME)
  ++

[CVS] OpenPKG: OPENPKG_2_4_SOLID: openpkg-src/postgresql/ postgresql.p...

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 12:28:11
  Branch: OPENPKG_2_4_SOLIDHandle: 2006021911281000

  Modified files:   (Branch: OPENPKG_2_4_SOLID)
openpkg-src/postgresql  postgresql.patch postgresql.spec

  Log:
Security Fixes (CVE-2006-0553)

  Summary:
RevisionChanges Path
1.2.4.1 +89 -0  openpkg-src/postgresql/postgresql.patch
1.154.2.2   +1  -1  openpkg-src/postgresql/postgresql.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/postgresql/postgresql.patch
  
  $ cvs diff -u -r1.2 -r1.2.4.1 postgresql.patch
  --- openpkg-src/postgresql/postgresql.patch   16 Feb 2005 16:16:47 -  
1.2
  +++ openpkg-src/postgresql/postgresql.patch   19 Feb 2006 11:28:10 -  
1.2.4.1
  @@ -60,3 +60,92 @@
# Force _GNU_SOURCE on; plperl is broken with Perl 5.8.0 otherwise
   -CPPFLAGS="-D_GNU_SOURCE"
   +CPPFLAGS="$CPPFLAGS -D_GNU_SOURCE"
  +
  +-
  +
  +Security Fixes (CVE-2006-0553)
  +
  +Index: src/backend/utils/mb/encnames.c
  +--- src/backend/utils/mb/encnames.c.orig 2004-12-04 19:19:31 +0100
   src/backend/utils/mb/encnames.c  2006-02-19 11:53:15 +0100
  +@@ -434,7 +434,7 @@
  + if (name == NULL || *name == '\0')
  + return NULL;
  + 
  +-if (strlen(name) > NAMEDATALEN)
  ++if (strlen(name) >= NAMEDATALEN)
  + {
  + #ifdef FRONTEND
  + fprintf(stderr, "encoding name too long\n");
  +Index: src/backend/utils/misc/guc.c
  +--- src/backend/utils/misc/guc.c.orig2005-03-25 17:17:38 +0100
   src/backend/utils/misc/guc.c 2006-02-19 11:53:15 +0100
  +@@ -44,6 +44,7 @@
  + #include "optimizer/prep.h"
  + #include "parser/parse_expr.h"
  + #include "parser/parse_relation.h"
  ++#include "parser/scansup.h"
  + #include "postmaster/bgwriter.h"
  + #include "postmaster/syslogger.h"
  + #include "postmaster/postmaster.h"
  +@@ -1426,7 +1427,7 @@
  + {"client_encoding", PGC_USERSET, CLIENT_CONN_LOCALE,
  + gettext_noop("Sets the client's character set 
encoding."),
  + NULL,
  +-GUC_REPORT
  ++GUC_IS_NAME | GUC_REPORT
  + },
  + &client_encoding_string,
  + "SQL_ASCII", assign_client_encoding, NULL
  +@@ -1506,7 +1507,8 @@
  + {
  + {"default_tablespace", PGC_USERSET, CLIENT_CONN_STATEMENT,
  + gettext_noop("Sets the default tablespace to create 
tables and indexes in."),
  +-gettext_noop("An empty string selects the database's 
default tablespace.")
  ++gettext_noop("An empty string selects the database's 
default tablespace."),
  ++GUC_IS_NAME
  + },
  + &default_tablespace,
  + "", assign_default_tablespace, NULL
  +@@ -1646,7 +1648,7 @@
  + {"server_encoding", PGC_INTERNAL, CLIENT_CONN_LOCALE,
  + gettext_noop("Sets the server (database) character set 
encoding."),
  + NULL,
  +-GUC_REPORT | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE
  ++GUC_IS_NAME | GUC_REPORT | GUC_NOT_IN_SAMPLE | 
GUC_DISALLOW_IN_FILE
  + },
  + &server_encoding_string,
  + "SQL_ASCII", NULL, NULL
  +@@ -1668,7 +1670,7 @@
  + {"session_authorization", PGC_USERSET, UNGROUPED,
  + gettext_noop("Sets the session user name."),
  + NULL,
  +-GUC_REPORT | GUC_NO_SHOW_ALL | GUC_NO_RESET_ALL | 
GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE
  ++GUC_IS_NAME | GUC_REPORT | GUC_NO_SHOW_ALL | 
GUC_NO_RESET_ALL | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE
  + },
  + &session_authorization_string,
  + NULL, assign_session_authorization, show_session_authorization
  +@@ -3647,6 +3649,12 @@
  + newval = guc_strdup(elevel, value);
  + if (newval == NULL)
  + return false;
  ++/*
  ++ * The only sort of "parsing" check we 
need to do is
  ++ * apply truncation if GUC_IS_NAME.
  ++ */
  ++if (conf->gen.flags & GUC_IS_NAME)
  ++

[CVS] OpenPKG: OPENPKG_2_5_SOLID: openpkg-src/postgresql/ postgresql.p...

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 12:10:15
  Branch: OPENPKG_2_5_SOLIDHandle: 2006021911101400

  Modified files:   (Branch: OPENPKG_2_5_SOLID)
openpkg-src/postgresql  postgresql.patch postgresql.spec

  Log:
Security Fixes (CVE-2006-0553)

  Summary:
RevisionChanges Path
1.2.6.1 +89 -0  openpkg-src/postgresql/postgresql.patch
1.167.2.3   +1  -1  openpkg-src/postgresql/postgresql.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/postgresql/postgresql.patch
  
  $ cvs diff -u -r1.2 -r1.2.6.1 postgresql.patch
  --- openpkg-src/postgresql/postgresql.patch   16 Feb 2005 16:16:47 -  
1.2
  +++ openpkg-src/postgresql/postgresql.patch   19 Feb 2006 11:10:14 -  
1.2.6.1
  @@ -60,3 +60,92 @@
# Force _GNU_SOURCE on; plperl is broken with Perl 5.8.0 otherwise
   -CPPFLAGS="-D_GNU_SOURCE"
   +CPPFLAGS="$CPPFLAGS -D_GNU_SOURCE"
  +
  +-
  +
  +Security Fixes (CVE-2006-0553)
  +
  +Index: src/backend/utils/mb/encnames.c
  +--- src/backend/utils/mb/encnames.c.orig 2004-12-04 19:19:31 +0100
   src/backend/utils/mb/encnames.c  2006-02-19 11:52:57 +0100
  +@@ -434,7 +434,7 @@
  + if (name == NULL || *name == '\0')
  + return NULL;
  + 
  +-if (strlen(name) > NAMEDATALEN)
  ++if (strlen(name) >= NAMEDATALEN)
  + {
  + #ifdef FRONTEND
  + fprintf(stderr, "encoding name too long\n");
  +Index: src/backend/utils/misc/guc.c
  +--- src/backend/utils/misc/guc.c.orig2005-03-25 17:17:38 +0100
   src/backend/utils/misc/guc.c 2006-02-19 11:52:57 +0100
  +@@ -44,6 +44,7 @@
  + #include "optimizer/prep.h"
  + #include "parser/parse_expr.h"
  + #include "parser/parse_relation.h"
  ++#include "parser/scansup.h"
  + #include "postmaster/bgwriter.h"
  + #include "postmaster/syslogger.h"
  + #include "postmaster/postmaster.h"
  +@@ -1426,7 +1427,7 @@
  + {"client_encoding", PGC_USERSET, CLIENT_CONN_LOCALE,
  + gettext_noop("Sets the client's character set 
encoding."),
  + NULL,
  +-GUC_REPORT
  ++GUC_IS_NAME | GUC_REPORT
  + },
  + &client_encoding_string,
  + "SQL_ASCII", assign_client_encoding, NULL
  +@@ -1506,7 +1507,8 @@
  + {
  + {"default_tablespace", PGC_USERSET, CLIENT_CONN_STATEMENT,
  + gettext_noop("Sets the default tablespace to create 
tables and indexes in."),
  +-gettext_noop("An empty string selects the database's 
default tablespace.")
  ++gettext_noop("An empty string selects the database's 
default tablespace."),
  ++GUC_IS_NAME
  + },
  + &default_tablespace,
  + "", assign_default_tablespace, NULL
  +@@ -1646,7 +1648,7 @@
  + {"server_encoding", PGC_INTERNAL, CLIENT_CONN_LOCALE,
  + gettext_noop("Sets the server (database) character set 
encoding."),
  + NULL,
  +-GUC_REPORT | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE
  ++GUC_IS_NAME | GUC_REPORT | GUC_NOT_IN_SAMPLE | 
GUC_DISALLOW_IN_FILE
  + },
  + &server_encoding_string,
  + "SQL_ASCII", NULL, NULL
  +@@ -1668,7 +1670,7 @@
  + {"session_authorization", PGC_USERSET, UNGROUPED,
  + gettext_noop("Sets the session user name."),
  + NULL,
  +-GUC_REPORT | GUC_NO_SHOW_ALL | GUC_NO_RESET_ALL | 
GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE
  ++GUC_IS_NAME | GUC_REPORT | GUC_NO_SHOW_ALL | 
GUC_NO_RESET_ALL | GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE
  + },
  + &session_authorization_string,
  + NULL, assign_session_authorization, show_session_authorization
  +@@ -3647,6 +3649,12 @@
  + newval = guc_strdup(elevel, value);
  + if (newval == NULL)
  + return false;
  ++/*
  ++ * The only sort of "parsing" check we 
need to do is
  ++ * apply truncation if GUC_IS_NAME.
  ++ */
  ++if (conf->gen.flags & GUC_IS_NAME)
  ++

[CVS] OpenPKG: openpkg-src/opera/ opera.patch opera.spec

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 11:35:08
  Branch: HEAD Handle: 2006021910350701

  Added files:
openpkg-src/opera   opera.patch
  Modified files:
openpkg-src/opera   opera.spec

  Log:
fix building under less forgiving non-GNU-bash /bin/sh

  Summary:
RevisionChanges Path
1.1 +12 -0  openpkg-src/opera/opera.patch
1.30+4  -1  openpkg-src/opera/opera.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/opera/opera.patch
  
  $ cvs diff -u -r0 -r1.1 opera.patch
  --- /dev/null 2006-02-19 11:34:52 +0100
  +++ opera.patch   2006-02-19 11:35:08 +0100
  @@ -0,0 +1,12 @@
  +Index: install.sh
  +--- install.sh.orig  2006-02-01 15:26:54 +0100
   install.sh   2006-02-19 11:32:32 +0100
  +@@ -1340,7 +1340,7 @@
  + then
  + # System wide configuration files
  + case "${os}" in
  +-FreeBSD|OpenBSD|NetBSD) config_dir='/usr/local/etc'
  ++FreeBSD|OpenBSD|NetBSD) config_dir='/usr/local/etc' ;;
  + *)  config_dir="/etc";;
  + esac
  + 
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/opera/opera.spec
  
  $ cvs diff -u -r1.29 -r1.30 opera.spec
  --- openpkg-src/opera/opera.spec  15 Feb 2006 19:38:23 -  1.29
  +++ openpkg-src/opera/opera.spec  19 Feb 2006 10:35:08 -  1.30
  @@ -42,12 +42,13 @@
   Group:Web
   License:  Commercial
   Version:  %{V_openpkg}
  -Release:  20060215
  +Release:  20060219
   
   #   list of sources
   Source0:  
ftp://ftp.opera.com/pub/opera/unix/freebsd/%{V_bsd_comp}/final/en/static/opera-%{V_bsd_real}-static-qt.i386.freebsd-en.tar.bz2
   Source1:  
ftp://ftp.opera.com/pub/opera/linux/%{V_lnx_comp}/final/en/i386/static/opera-%{V_lnx_real}-static-qt.i386-en.tar.bz2
   Source2:  
ftp://ftp.opera.com/pub/opera/unix/solaris/%{V_sol_comp}/final/en/static/opera-%{V_sol_real}-static-qt-sol8-sparc-local-en.tar.bz2
  +Patch0:   opera.patch
   
   #   build information
   Prefix:   %{l_prefix}
  @@ -91,6 +92,8 @@
   * ) echo "Platform \"%{l_platform -t}\" not supported" 1>&2; exit 1 
;;
   esac
   %{l_bzip2} -d -c $src | %{l_tar} xf -
  +cd opera-*
  +%patch -p0
   
   %build
   
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-src/mhash/ mhash.patch mhash.spec

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 11:24:49
  Branch: HEAD Handle: 2006021910244900

  Modified files:
openpkg-src/mhash   mhash.patch mhash.spec

  Log:
fix run-time by installing missing header

  Summary:
RevisionChanges Path
1.2 +17 -5  openpkg-src/mhash/mhash.patch
1.23+1  -1  openpkg-src/mhash/mhash.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/mhash/mhash.patch
  
  $ cvs diff -u -r1.1 -r1.2 mhash.patch
  --- openpkg-src/mhash/mhash.patch 8 Dec 2005 19:10:01 -   1.1
  +++ openpkg-src/mhash/mhash.patch 19 Feb 2006 10:24:49 -  1.2
  @@ -1,6 +1,18 @@
  +Index: include/Makefile.in
  +--- include/Makefile.in.orig 2006-01-10 05:44:15 +0100
   include/Makefile.in  2006-02-19 11:18:48 +0100
  +@@ -174,7 +174,7 @@
  + target_cpu = @target_cpu@
  + target_os = @target_os@
  + target_vendor = @target_vendor@
  +-nobase_include_HEADERS = mhash.h mutils/mhash.h mutils/mglobal.h 
mutils/mtypes.h mutils/mutils.h mutils/mhash_config.h
  ++nobase_include_HEADERS = mhash.h mutils/mhash.h mutils/mglobal.h 
mutils/mtypes.h mutils/mutils.h mutils/mhash_config.h mutils/mincludes.h
  + all: all-am
  + 
  + .SUFFIXES:
   Index: lib/stdfns.c
   lib/stdfns.c.orig2005-12-07 04:09:46 +0100
  -+++ lib/stdfns.c 2005-12-08 20:03:28 +0100
  +--- lib/stdfns.c.orig2006-01-10 04:47:18 +0100
   lib/stdfns.c 2006-02-19 11:16:56 +0100
   @@ -24,6 +24,7 @@
 */

  @@ -9,7 +21,7 @@

/**
 * Some of these are wrappers. The idea is to eventually produce an 
extremely
  -@@ -184,11 +185,11 @@
  +@@ -222,11 +223,11 @@
{
return(0);
}
  @@ -23,7 +35,7 @@
}

return(memcmp(s1, s2, n));
  -@@ -305,11 +306,11 @@
  +@@ -343,11 +344,11 @@
{
return(0);
}
  @@ -37,7 +49,7 @@
}
return(strcmp((char *) src1, (char *) src2));
}
  -@@ -328,11 +329,11 @@
  +@@ -366,11 +367,11 @@
{
return(0);
}
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/mhash/mhash.spec
  
  $ cvs diff -u -r1.22 -r1.23 mhash.spec
  --- openpkg-src/mhash/mhash.spec  10 Jan 2006 09:13:56 -  1.22
  +++ openpkg-src/mhash/mhash.spec  19 Feb 2006 10:24:49 -  1.23
  @@ -37,7 +37,7 @@
   Group:Cryptography
   License:  LGPL
   Version:  %{V_vl}%{V_pl}
  -Release:  20060110
  +Release:  20060219
   
   #   list of sources
   Source0:  
http://osdn.dl.sourceforge.net/sourceforge/mhash/mhash-%{V_vl}%{V_pl}.tar.gz
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-src/snort/ snort.spec

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 11:16:34
  Branch: HEAD Handle: 2006021910163400

  Modified files:
openpkg-src/snort   snort.spec

  Log:
upgrade to latest oinkmaster 2.0

  Summary:
RevisionChanges Path
1.39+3  -3  openpkg-src/snort/snort.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/snort/snort.spec
  
  $ cvs diff -u -r1.38 -r1.39 snort.spec
  --- openpkg-src/snort/snort.spec  1 Jan 2006 13:22:24 -   1.38
  +++ openpkg-src/snort/snort.spec  19 Feb 2006 10:16:34 -  1.39
  @@ -25,7 +25,7 @@
   #   package version
   %define   V_snort  2.4.3
   %define   V_rules  2.4
  -%define   V_oinkmaster 1.2
  +%define   V_oinkmaster 2.0
   
   #   package information
   Name: snort
  @@ -38,7 +38,7 @@
   Group:Network
   License:  GPL
   Version:  %{V_snort}
  -Release:  20051019
  +Release:  20060219
   
   #   package options
   %option   with_fslyes
  @@ -206,7 +206,7 @@
 %{l_shtool} install -c -m 644 \
 -e 's;^\(path = \);\1%{l_prefix}/bin:;' \
 -e 's;^# tmpdir = /home/oinkmaster/tmp/;tmpdir = 
%{l_prefix}/var/snort/tmp;' \
  -  -e 's;^# \(use_external_bins = 0\);\1;' \
  +  -e 's;^\(use_external_bins = 0\);\1;' \
 -e 's;^\(skipfile snort\.conf\);# \1;' \
 oinkmaster.conf $RPM_BUILD_ROOT%{l_prefix}/etc/snort/
   ) || exit $?
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-src/wine/ wine.patch wine.spec

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 09:26:14
  Branch: HEAD Handle: 2006021908261400

  Modified files:
openpkg-src/winewine.patch wine.spec

  Log:
upgrading package: wine 0.9.6 -> 0.9.8

  Summary:
RevisionChanges Path
1.17+7  -15 openpkg-src/wine/wine.patch
1.50+2  -2  openpkg-src/wine/wine.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/wine/wine.patch
  
  $ cvs diff -u -r1.16 -r1.17 wine.patch
  --- openpkg-src/wine/wine.patch   12 Jan 2006 09:44:56 -  1.16
  +++ openpkg-src/wine/wine.patch   19 Feb 2006 08:26:14 -  1.17
  @@ -1,6 +1,6 @@
   Index: include/winternl.h
   include/winternl.h.orig  2006-01-04 17:05:13 +0100
  -+++ include/winternl.h   2006-01-12 10:23:21 +0100
  +--- include/winternl.h.orig  2006-02-15 17:02:58 +0100
   include/winternl.h   2006-02-19 09:01:59 +0100
   @@ -22,6 +22,7 @@
#define __WINE_WINTERNL_H

  @@ -10,8 +10,8 @@
#ifdef __cplusplus
extern "C" {
   Index: programs/Makefile.in
   programs/Makefile.in.orig2006-01-04 17:05:16 +0100
  -+++ programs/Makefile.in 2006-01-12 10:23:21 +0100
  +--- programs/Makefile.in.orig2006-02-15 17:02:59 +0100
   programs/Makefile.in 2006-02-19 09:01:59 +0100
   @@ -35,7 +35,6 @@
winemenubuilder \
winemine \
  @@ -19,20 +19,12 @@
   -winetest \
winevdm \
winhelp \
  - winver
  -@@ -69,7 +68,6 @@
  - winemenubuilder \
  - winemine \
  - winepath \
  --winetest \
  - winevdm \
  - winhelp \
  - winver
  -@@ -126,7 +124,6 @@
  + winver \
  +@@ -127,7 +126,6 @@
winemenubuilder.exe$(DLLEXT) \
winemine.exe$(DLLEXT) \
winepath.exe$(DLLEXT) \
   -winetest.exe$(DLLEXT) \
winevdm.exe$(DLLEXT) \
winhelp.exe$(DLLEXT) \
  - winver.exe$(DLLEXT)
  + winver.exe$(DLLEXT) \
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/wine/wine.spec
  
  $ cvs diff -u -r1.49 -r1.50 wine.spec
  --- openpkg-src/wine/wine.spec22 Jan 2006 19:32:12 -  1.49
  +++ openpkg-src/wine/wine.spec19 Feb 2006 08:26:14 -  1.50
  @@ -32,8 +32,8 @@
   Class:EVAL
   Group:XWindow
   License:  LGPL
  -Version:  0.9.6
  -Release:  20060122
  +Version:  0.9.8
  +Release:  20060219
   
   #   list of sources
   Source0:  
http://ibiblio.org/pub/linux/system/emulators/wine/wine-%{version}.tar.bz2
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-src/w3m/ w3m.patch w3m.spec

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 09:21:53
  Branch: HEAD Handle: 2006021908215300

  Added files:
openpkg-src/w3m w3m.patch
  Modified files:
openpkg-src/w3m w3m.spec

  Log:
apply a patch from the FreeBSD ports which closes the pipe for gzipped
stream properly; move substitution into patch file, too

  Summary:
RevisionChanges Path
1.4 +24 -0  openpkg-src/w3m/w3m.patch
1.59+3  -3  openpkg-src/w3m/w3m.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/w3m/w3m.patch
  
  $ cvs diff -u -r0 -r1.4 w3m.patch
  --- /dev/null 2006-02-19 09:21:07 +0100
  +++ w3m.patch 2006-02-19 09:21:53 +0100
  @@ -0,0 +1,24 @@
  +Index: Makefile.in
  +--- Makefile.in.orig 2004-04-26 19:04:48 +0200
   Makefile.in  2006-02-19 09:17:44 +0100
  +@@ -117,7 +117,7 @@
  + 
  + DEFUNS=$(top_srcdir)/main.c $(top_srcdir)/menu.c
  + SCRIPTSUBDIRS= scripts
  +-SUBDIRS = $(SCRIPTSUBDIRS) w3mimg libwc po
  ++SUBDIRS = $(SCRIPTSUBDIRS) w3mimg libwc
  + .PHONY: $(SUBDIRS)
  + 
  + all: $(TARGETS) all-scripts $(NLSTARGET)
  +Index: file.c
  +--- file.c.orig  2004-04-16 20:47:19 +0200
   file.c   2006-02-19 09:16:54 +0100
  +@@ -7891,7 +7892,7 @@
  + uf->scheme = SCM_LOCAL;
  + }
  + UFhalfclose(uf);
  +-uf->stream = newFileStream(f1, (void (*)())pclose);
  ++uf->stream = newFileStream(f1, (void (*)())fclose);
  + }
  + 
  + static FILE *
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/w3m/w3m.spec
  
  $ cvs diff -u -r1.58 -r1.59 w3m.spec
  --- openpkg-src/w3m/w3m.spec  1 Jan 2006 13:23:50 -   1.58
  +++ openpkg-src/w3m/w3m.spec  19 Feb 2006 08:21:53 -  1.59
  @@ -33,10 +33,11 @@
   Group:Web
   License:  BSD
   Version:  0.5.1
  -Release:  20050726
  +Release:  20060219
   
   #   list of sources
   Source0:  
http://osdn.dl.sourceforge.net/sourceforge/w3m/w3m-%{version}.tar.gz
  +Patch0:   w3m.patch
   
   #   build information
   Prefix:   %{l_prefix}
  @@ -64,6 +65,7 @@
   
   %prep
   %setup -q
  +%patch -p0
   
   %build
   CC="%{l_cc}" \
  @@ -105,8 +107,6 @@
   --disable-unicode \
   --disable-m17n \
   --disable-nls
  -%{l_shtool} subst \
  --e 's; [^ ]*po$;;' Makefile
   %{l_make} %{l_mflags -O}
   
   %install
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-src/mutt/ mutt.patch mutt.spec

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 09:14:29
  Branch: HEAD Handle: 2006021908142800

  Added files:
openpkg-src/muttmutt.patch
  Modified files:
openpkg-src/muttmutt.spec

  Log:
Fix the 'sign as' function for SMIME with a patch taken over from the
FreeBSD ports

  Summary:
RevisionChanges Path
1.5 +11 -0  openpkg-src/mutt/mutt.patch
1.70+3  -1  openpkg-src/mutt/mutt.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/mutt/mutt.patch
  
  $ cvs diff -u -r0 -r1.5 mutt.patch
  --- /dev/null 2006-02-19 09:14:28 +0100
  +++ mutt.patch2006-02-19 09:14:28 +0100
  @@ -0,0 +1,11 @@
  +Index: smime.c
  +--- smime.c.orig 2005-08-14 14:33:37 +0200
   smime.c  2006-02-19 09:11:56 +0100
  +@@ -1989,7 +1989,6 @@
  + 
  + if ((p = smime_ask_for_key (_("Sign as: "), NULL, 0))) 
  + {
  +-  p[mutt_strlen (p)-1] = '\0';
  +   mutt_str_replace (&SmimeDefaultKey, p);
  + 
  +   msg->security |= SIGN;
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/mutt/mutt.spec
  
  $ cvs diff -u -r1.69 -r1.70 mutt.spec
  --- openpkg-src/mutt/mutt.spec28 Jan 2006 11:37:10 -  1.69
  +++ openpkg-src/mutt/mutt.spec19 Feb 2006 08:14:28 -  1.70
  @@ -38,7 +38,7 @@
   Group:Mail
   License:  BSD
   Version:  %{V_mutt}i
  -Release:  20060128
  +Release:  20060219
   
   #   build options
   %option   with_comp  no
  @@ -57,6 +57,7 @@
   Patch2:   
ftp://ftp.mutt.org.ua/pub/mutt/mutt-%{V_mutt_patches}/patch-%{V_mutt_patches}.vvv.initials.gz
   Patch3:   
ftp://ftp.mutt.org.ua/pub/mutt/mutt-%{V_mutt_patches}/patch-%{V_mutt_patches}.vvv.quote.gz
   Patch4:   http://thomer.com/mutt/patch-%{V_mutt_patches_sidebar}.txt
  +Patch5:   mutt.patch
   
   #   build information
   Prefix:   %{l_prefix}
  @@ -144,6 +145,7 @@
   %if "%{with_sidebar}" == "yes"
   %patch -p1 -P 4
   %endif
  +%patch -p0 -P 5
   %{l_shtool} subst \
   -e 's;\(Mutt/%%s\);\1 %{l_openpkg_release -F "OpenPKG/%%s"};' \
   sendlib.c
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-src/gcc42/ gcc42.spec

2006-02-19 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   19-Feb-2006 09:10:46
  Branch: HEAD Handle: 2006021908104600

  Modified files:
openpkg-src/gcc42   gcc42.spec

  Log:
upgrading package: gcc42 4.2s20060211 -> 4.2s20060218

  Summary:
RevisionChanges Path
1.4 +2  -2  openpkg-src/gcc42/gcc42.spec
  

  patch -p0 <<'@@ .'
  Index: openpkg-src/gcc42/gcc42.spec
  
  $ cvs diff -u -r1.3 -r1.4 gcc42.spec
  --- openpkg-src/gcc42/gcc42.spec  12 Feb 2006 11:51:48 -  1.3
  +++ openpkg-src/gcc42/gcc42.spec  19 Feb 2006 08:10:46 -  1.4
  @@ -25,7 +25,7 @@
   #   package version
   %define   V_full 4.2
   %define   V_comp 42
  -%define   V_snap 20060211
  +%define   V_snap 20060218
   
   #   package information
   Name: gcc42
  @@ -38,7 +38,7 @@
   Group:Compiler
   License:  GPL
   Version:  %{V_full}s%{V_snap}
  -Release:  20060212
  +Release:  20060219
   
   #   package options
   %option   with_cxx   yes
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org


[CVS] OpenPKG: openpkg-src/ucarp/ ucarp.patch ucarp.spec

2006-02-19 Thread Ralf S. Engelschall
# define __OBSD_IPADDR(x) ((uint32_t) htonl((uint32_t)(x)))
  + # define INADDR_CARP_GROUP__OBSD_IPADDR(0xe012)/* 224.0.0.18 */
  + #endif
  + #ifndef timercmp
  +@@ -194,7 +194,7 @@
  + int sc_naddrs6;
  + int sc_advbase; /* seconds */
  + int sc_init_counter;
  +-u_int64_t sc_counter;
  ++uint64_t sc_counter;
  + 
  + /* authentication */
  + #define CARP_HMAC_PAD   64
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/ucarp/ucarp.spec
  ====
  $ cvs diff -u -r1.12 -r1.13 ucarp.spec
  --- openpkg-src/ucarp/ucarp.spec  1 Jan 2006 13:23:36 -   1.12
  +++ openpkg-src/ucarp/ucarp.spec  19 Feb 2006 08:01:47 -  1.13
  @@ -32,8 +32,8 @@
   Class:EVAL
   Group:Network
   License:  Specific
  -Version:  1.1
  -Release:  20041110
  +Version:  1.2
  +Release:  20060219
   
   #   package options
   %option   with_fsl  yes
  @@ -80,39 +80,14 @@
   %prep
   %setup -q
   %patch -p0
  -%{l_shtool} subst \
  --e 's;u_int\([0-9]*\)_t;uint\1_t;g' \
  -src/ip_carp.h \
  -src/ucarp.h \
  -src/carp.c
  -case "%{l_platform -t}" in
  -*-sunos* )
  -%{l_shtool} subst \
  --e 
's;\(->ether_.host\)\(\[[0-9]*\]\);\1.ether_addr_octet\2;g' \
  -src/carp.c
  -%{l_shtool} subst \
  --e 's;\(->ether_.host\),;\1.ether_addr_octet,;g' \
  -src/garp.c
  -;;
  -esac
   
   %build
  -#   compensate for nonportable constructs
  -DEFFLAGS=
  -LIBFLAGS=
  -case "%{l_platform -t}" in
  -*-sunos* )
  -DEFFLAGS="-DETHER_ADDR_LEN=6"
  -LIBFLAGS="-lresolv"
  -;;
  -esac
  -
   #   configure program
   CC="%{l_cc}" \
   CFLAGS="%{l_cflags -O}" \
  -CPPFLAGS="%{l_cppflags} $DEFFLAGS" \
  +CPPFLAGS="%{l_cppflags}" \
   LDFLAGS="%{l_ldflags} %{l_fsl_ldflags}" \
  -LIBS="%{l_fsl_libs} -lpcap $LIBFLAGS" \
  +LIBS="%{l_fsl_libs} -lpcap" \
   ./configure \
   --prefix=%{l_prefix} \
   --sysconfdir=%{l_prefix}/etc/ucarp \
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List openpkg-cvs@openpkg.org