[CVS] OpenPKG: openpkg-re/ todo.txt

2003-03-20 Thread Michael van Elst
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Michael van Elst
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-re   Date:   20-Mar-2003 09:43:51
  Branch: HEAD Handle: 2003032008435100

  Modified files:
openpkg-re  todo.txt

  Log:
explain why imapd doesn't build

  Summary:
RevisionChanges Path
1.83+2  -0  openpkg-re/todo.txt
  

  patch -p0 '@@ .'
  Index: openpkg-re/todo.txt
  
  $ cvs diff -u -r1.82 -r1.83 todo.txt
  --- openpkg-re/todo.txt   20 Mar 2003 07:56:29 -  1.82
  +++ openpkg-re/todo.txt   20 Mar 2003 08:43:51 -  1.83
  @@ -40,6 +40,8 @@
  /usr/include/com_right.h:47: redefinition of `struct error_table'
  acap_err.c: In function `initialize_acap_error_table':
  acap_err.c:28: warning: implicit declaration of function `init_error_table'
  +   INFO: this is not a problem within imapd but a conflict between
  +   freebsd and the kerberos package.
   
o imapd: companion package sieve perlsieve
   
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


Re: [CVS] OpenPKG: openpkg-re/ openpkg-dev

2003-03-20 Thread Thomas Lotterer
On Thu, Mar 20, 2003, Ralf S. Engelschall wrote:

 On Wed, Mar 19, 2003, Thomas Lotterer wrote:
 
  effect a compromise between error and create for nonexisting packages:
  create on enter, cleanup on leave if empty
 
 I would be even more radical: remove all files there which are older
 than 1 day. It's a temporary area while working with packages. Anything
 older than 1 day can be safely removed IMHO.
 
This would require some find/rm combination and that's in fact what i
started with. However, after some testing i found no portable, safe and
fool-proof way to detect if a directory is empty or contains just junk
and the path does not point to some dangerous (errornous) directory like
'/' so i went back a step and replaced a still unsafe screen-sized code
snipped with a single rmdir line.

Deleting files is probably too much magic anyway, so i assume the best
we can do is to provide some cleanup function with a -dry option, of
course.

--
[EMAIL PROTECTED]
Development Team, Operations Northern Europe, Cable  Wireless
__
The OpenPKG Projectwww.openpkg.org
Developer Communication List   [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-re/ todo.txt

2003-03-20 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-re   Date:   20-Mar-2003 12:08:53
  Branch: HEAD Handle: 2003032011085200

  Modified files:
openpkg-re  todo.txt

  Log:
cyclic requirement between perl-www/URI.pm and perl-xml/SOAP/Lite.pm

  Summary:
RevisionChanges Path
1.84+5  -0  openpkg-re/todo.txt
  

  patch -p0 '@@ .'
  Index: openpkg-re/todo.txt
  
  $ cvs diff -u -r1.83 -r1.84 todo.txt
  --- openpkg-re/todo.txt   20 Mar 2003 08:43:51 -  1.83
  +++ openpkg-re/todo.txt   20 Mar 2003 11:08:52 -  1.84
  @@ -80,6 +80,11 @@
  openpkg:  %define versionof() %(%{l_prefix}/bin/rpm -q --qf '%{VERSION}' %1)
  perl-xxx: PreReq: perl = %{versionof perl}  
   
  + o cyclic requirement: %{l_prefix}/lib/perl/site_perl/5.8.0/SOAP/Lite.pm
  +   from perl-xml requires URI.pm which comes with perl-www. Besides the
  +   fact that it is overkill to install perl-www just to get URI.pm,
  +   perl-www requires perl-xml.
  +
o macro expansion issue: a macro should have the ability to determine the current
  RPM operation (query, build, install). It is for instance required for %integrity
  which currently complains under e.g. -qpi. Additionally it is required to
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/kerberos/ kerberos.spec openpkg-web/ news.t...

2003-03-20 Thread Michael van Elst
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Michael van Elst
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src openpkg-web  Date:   20-Mar-2003 12:37:06
  Branch: HEAD Handle: 2003032011370402

  Modified files:
openpkg-src/kerberoskerberos.spec
openpkg-web news.txt

  Log:
MITKRB5-SA-2003-003, MITKRB5-SA-2003-004

  Summary:
RevisionChanges Path
1.13+7  -2  openpkg-src/kerberos/kerberos.spec
1.3734  +1  -0  openpkg-web/news.txt
  

  patch -p0 '@@ .'
  Index: openpkg-src/kerberos/kerberos.spec
  
  $ cvs diff -u -r1.12 -r1.13 kerberos.spec
  --- openpkg-src/kerberos/kerberos.spec5 Mar 2003 15:35:53 -   1.12
  +++ openpkg-src/kerberos/kerberos.spec20 Mar 2003 11:37:06 -  1.13
  @@ -33,10 +33,11 @@
   Group:Cryptography
   License:  MIT
   Version:  1.2.6
  -Release:  20030305
  +Release:  20030320
   
   #   list of sources
   Source0:  
http://www.crypto-publish.org/dist/mit-kerberos5/krb5-%{version}.tar.gz
  +Source1:  
http://web.mit.edu/kerberos/www/advisories/2003-004-krb4_patchkit.tar.gz
   Patch0:   kerberos.patch
   
   #   build information
  @@ -57,6 +58,10 @@
   
   %prep
   %setup -q -n krb5-%{version}
  +%setup -q -n krb5-%{version} -D -a 1
  +( cd src
  +  %{l_patch} -p0  ../2003-004-krb4_patchkit/patch.%{version}
  +) || exit 1
   %patch -p1
   
   %build
  @@ -73,7 +78,7 @@
   rm -rf $RPM_BUILD_ROOT
   ( cd src
 %{l_make} %{l_mflags} install DESTDIR=$RPM_BUILD_ROOT
  -)
  +) || exit 1
   rm -rf $RPM_BUILD_ROOT%{l_prefix}/share/gnats
   strip $RPM_BUILD_ROOT%{l_prefix}/bin/* /dev/null 21 || true
   %{l_rpmtool} files -v -ofiles -r$RPM_BUILD_ROOT %{l_files_std}
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-web/news.txt
  
  $ cvs diff -u -r1.3733 -r1.3734 news.txt
  --- openpkg-web/news.txt  19 Mar 2003 18:45:50 -  1.3733
  +++ openpkg-web/news.txt  20 Mar 2003 11:37:04 -  1.3734
  @@ -1,3 +1,4 @@
  +20-Mar-2003: Upgraded package: Pkerberos-1.2.6-20030320
   19-Mar-2003: Upgraded package: Ptidy-20030318-20030319
   19-Mar-2003: Upgraded package: Pcvsps-2.0b5-20030319
   19-Mar-2003: Upgraded package: Psipcalc-1.1.2-20030319
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/kerberos/ kerberos.spec openpkg-web/ news.t...

2003-03-20 Thread Michael van Elst
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Michael van Elst
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src openpkg-web  Date:   20-Mar-2003 12:48:35
  Branch: HEAD Handle: 2003032011483301

  Modified files:
openpkg-src/kerberoskerberos.spec
openpkg-web news.txt

  Log:
upgrade kerberos 1.2.6 - 1.2.7

  Summary:
RevisionChanges Path
1.14+2  -2  openpkg-src/kerberos/kerberos.spec
1.3735  +1  -0  openpkg-web/news.txt
  

  patch -p0 '@@ .'
  Index: openpkg-src/kerberos/kerberos.spec
  
  $ cvs diff -u -r1.13 -r1.14 kerberos.spec
  --- openpkg-src/kerberos/kerberos.spec20 Mar 2003 11:37:06 -  1.13
  +++ openpkg-src/kerberos/kerberos.spec20 Mar 2003 11:48:34 -  1.14
  @@ -32,11 +32,11 @@
   Distribution: OpenPKG [PLUS]
   Group:Cryptography
   License:  MIT
  -Version:  1.2.6
  +Version:  1.2.7
   Release:  20030320
   
   #   list of sources
  -Source0:  
http://www.crypto-publish.org/dist/mit-kerberos5/krb5-%{version}.tar.gz
  +Source0:  
http://www.mirrors.wiretapped.net/security/cryptography/apps/kerberos/krb5-mit/unix/krb5-%{version}.tar.gz
   Source1:  
http://web.mit.edu/kerberos/www/advisories/2003-004-krb4_patchkit.tar.gz
   Patch0:   kerberos.patch
   
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-web/news.txt
  
  $ cvs diff -u -r1.3734 -r1.3735 news.txt
  --- openpkg-web/news.txt  20 Mar 2003 11:37:04 -  1.3734
  +++ openpkg-web/news.txt  20 Mar 2003 11:48:33 -  1.3735
  @@ -1,3 +1,4 @@
  +20-Mar-2003: Upgraded package: Pkerberos-1.2.7-20030320
   20-Mar-2003: Upgraded package: Pkerberos-1.2.6-20030320
   19-Mar-2003: Upgraded package: Ptidy-20030318-20030319
   19-Mar-2003: Upgraded package: Pcvsps-2.0b5-20030319
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-re/vcheck/ vc.postfix openpkg-src/postfix/ post...

2003-03-20 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src openpkg-web openpkg$ Date:   20-Mar-2003 15:05:37
  Branch: HEAD Handle: 2003032014053402

  Modified files:
openpkg-re/vcheck   vc.postfix
openpkg-src/postfix postfix.spec
openpkg-web news.txt

  Log:
upgrading package: postfix 2.0.6 - 2.0.7

  Summary:
RevisionChanges Path
1.39+1  -1  openpkg-re/vcheck/vc.postfix
1.122   +2  -2  openpkg-src/postfix/postfix.spec
1.3736  +1  -0  openpkg-web/news.txt
  

  patch -p0 '@@ .'
  Index: openpkg-re/vcheck/vc.postfix
  
  $ cvs diff -u -r1.38 -r1.39 vc.postfix
  --- openpkg-re/vcheck/vc.postfix  7 Mar 2003 06:55:16 -   1.38
  +++ openpkg-re/vcheck/vc.postfix  20 Mar 2003 14:05:34 -  1.39
  @@ -2,7 +2,7 @@
   }
   
   prog postfix = {
  -  version   = 2.0.6
  +  version   = 2.0.7
 url   = ftp://ftp.porcupine.org/mirrors/postfix-release/official/
 regex = postfix-(\d+\.\d+\.\d+)\.tar\.gz
   }
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-src/postfix/postfix.spec
  
  $ cvs diff -u -r1.121 -r1.122 postfix.spec
  --- openpkg-src/postfix/postfix.spec  12 Mar 2003 13:46:23 -  1.121
  +++ openpkg-src/postfix/postfix.spec  20 Mar 2003 14:05:36 -  1.122
  @@ -24,7 +24,7 @@
   ##
   
   #   package versions
  -%define   V_postfix  2.0.6
  +%define   V_postfix  2.0.7
   %define   V_tls  0.8.13-2.0.6-0.9.7a
   %define   V_pflogsumm1.0.10
   
  @@ -38,7 +38,7 @@
   Group:Mail
   License:  IPL
   Version:  %{V_postfix}
  -Release:  20030312
  +Release:  20030320
   
   #   package options
   %option   with_tls   no
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-web/news.txt
  
  $ cvs diff -u -r1.3735 -r1.3736 news.txt
  --- openpkg-web/news.txt  20 Mar 2003 11:48:33 -  1.3735
  +++ openpkg-web/news.txt  20 Mar 2003 14:05:35 -  1.3736
  @@ -1,3 +1,4 @@
  +20-Mar-2003: Upgraded package: Ppostfix-2.0.7-20030320
   20-Mar-2003: Upgraded package: Pkerberos-1.2.7-20030320
   20-Mar-2003: Upgraded package: Pkerberos-1.2.6-20030320
   19-Mar-2003: Upgraded package: Ptidy-20030318-20030319
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-re/vcheck/ vc.uvscan openpkg-src/uvscan/ uvscan...

2003-03-20 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src openpkg-web openpkg$ Date:   20-Mar-2003 15:47:28
  Branch: HEAD Handle: 2003032014472602

  Modified files:
openpkg-re/vcheck   vc.uvscan
openpkg-src/uvscan  uvscan.spec
openpkg-web news.txt

  Log:
upgrading package: uvscan 4.1.6.4252 - 4.1.6.4253

  Summary:
RevisionChanges Path
1.61+1  -1  openpkg-re/vcheck/vc.uvscan
1.70+2  -2  openpkg-src/uvscan/uvscan.spec
1.3737  +1  -0  openpkg-web/news.txt
  

  patch -p0 '@@ .'
  Index: openpkg-re/vcheck/vc.uvscan
  
  $ cvs diff -u -r1.60 -r1.61 vc.uvscan
  --- openpkg-re/vcheck/vc.uvscan   13 Mar 2003 17:13:33 -  1.60
  +++ openpkg-re/vcheck/vc.uvscan   20 Mar 2003 14:47:26 -  1.61
  @@ -2,7 +2,7 @@
   }
   
   prog uvscan:datfiles = {
  -  version   = 4252
  +  version   = 4253
 url   = ftp://ftp.nai.com/pub/antivirus/datfiles/4.x/
 regex = dat-(\d+).tar
   }
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-src/uvscan/uvscan.spec
  
  $ cvs diff -u -r1.69 -r1.70 uvscan.spec
  --- openpkg-src/uvscan/uvscan.spec13 Mar 2003 17:13:37 -  1.69
  +++ openpkg-src/uvscan/uvscan.spec20 Mar 2003 14:47:28 -  1.70
  @@ -27,7 +27,7 @@
   %define   V_engine   4.1.6
   %define   V_engine_dist1 4.16
   %define   V_engine_dist2 416
  -%define   V_datfiles 4252
  +%define   V_datfiles 4253
   
   #   package information
   Name: uvscan
  @@ -39,7 +39,7 @@
   Group:Filesystem
   License:  Commercial/Free-Trial
   Version:  %{V_engine}.%{V_datfiles}
  -Release:  20030313
  +Release:  20030320
   
   #   list of sources
   Source0:  ftp://ftp.nai.com/pub/antivirus/datfiles/4.x/dat-%{V_datfiles}.tar
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-web/news.txt
  
  $ cvs diff -u -r1.3736 -r1.3737 news.txt
  --- openpkg-web/news.txt  20 Mar 2003 14:05:35 -  1.3736
  +++ openpkg-web/news.txt  20 Mar 2003 14:47:27 -  1.3737
  @@ -1,3 +1,4 @@
  +20-Mar-2003: Upgraded package: Puvscan-4.1.6.4253-20030320
   20-Mar-2003: Upgraded package: Ppostfix-2.0.7-20030320
   20-Mar-2003: Upgraded package: Pkerberos-1.2.7-20030320
   20-Mar-2003: Upgraded package: Pkerberos-1.2.6-20030320
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-re/vcheck/ vc.perl-tk openpkg-src/perl-tk/ perl...

2003-03-20 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src openpkg-web openpkg$ Date:   20-Mar-2003 15:57:21
  Branch: HEAD Handle: 2003032014571704

  Modified files:
openpkg-re/vcheck   vc.perl-tk
openpkg-src/perl-tk perl-tk.spec
openpkg-web news.txt

  Log:
upgrading package: perl-tk 20030123 - 20030320

  Summary:
RevisionChanges Path
1.10+3  -3  openpkg-re/vcheck/vc.perl-tk
1.18+5  -5  openpkg-src/perl-tk/perl-tk.spec
1.3738  +1  -0  openpkg-web/news.txt
  

  patch -p0 '@@ .'
  Index: openpkg-re/vcheck/vc.perl-tk
  
  $ cvs diff -u -r1.9 -r1.10 vc.perl-tk
  --- openpkg-re/vcheck/vc.perl-tk  14 Jan 2003 08:44:24 -  1.9
  +++ openpkg-re/vcheck/vc.perl-tk  20 Mar 2003 14:57:17 -  1.10
  @@ -17,7 +17,7 @@
 regex = Tk-CheckbuttonGroup-(__VER__)\.tgz
   }
   prog perl-tk:Tk-CollapsableFrame = {
  -  version   = 1.0
  +  version   = 1.1
 url   = http://www.cpan.org/modules/by-module/Tk/
 regex = Tk-CollapsableFrame-(__VER__)\.tar\.gz
   }
  @@ -32,7 +32,7 @@
 regex = Tk-DateEntry-(__VER__)\.tar\.gz
   }
   prog perl-tk:Tk-ExecuteCommand = {
  -  version   = 1.2
  +  version   = 1.4
 url   = http://www.cpan.org/modules/by-module/Tk/
 regex = Tk-ExecuteCommand-(__VER__)\.tar\.gz
   }
  @@ -67,7 +67,7 @@
 regex = Tk-JPEG-(__VER__)\.tar\.gz
   }
   prog perl-tk:Tk-LCD = {
  -  version   = 1.1
  +  version   = 1.2
 url   = http://www.cpan.org/modules/by-module/Tk/
 regex = Tk-LCD-(__VER__)\.tar\.gz
   }
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-src/perl-tk/perl-tk.spec
  
  $ cvs diff -u -r1.17 -r1.18 perl-tk.spec
  --- openpkg-src/perl-tk/perl-tk.spec  23 Jan 2003 14:20:07 -  1.17
  +++ openpkg-src/perl-tk/perl-tk.spec  20 Mar 2003 14:57:21 -  1.18
  @@ -30,16 +30,16 @@
   %define   V_tk_png   2.005
   %define   V_tk_canvasfig 1.014
   %define   V_tk_checkbuttongroup  0.2.1
  -%define   V_tk_collapsableframe  1.0
  +%define   V_tk_collapsableframe  1.1
   %define   V_tk_date  0.40
   %define   V_tk_dateentry 1.35
  -%define   V_tk_executecommand1.2
  +%define   V_tk_executecommand1.4
   %define   V_tk_gbarr 2.06
   %define   V_tk_graph 0.06
   %define   V_tk_histentry 0.40
   %define   V_tk_jcombobox 0.02
   %define   V_tk_ipentry   0.03
  -%define   V_tk_lcd   1.1
  +%define   V_tk_lcd   1.2
   %define   V_tk_mdi   0.2
   %define   V_tk_progressbarmac1.1
   %define   V_tk_multi 1.004
  @@ -64,8 +64,8 @@
   Distribution: OpenPKG [BASE]
   Group:Language
   License:  GPL/Artistic
  -Version:  20030123
  -Release:  20030123
  +Version:  20030320
  +Release:  20030320
   
   #   list of sources
   Source0:  http://www.cpan.org/modules/by-module/Tk/Tk-%{V_tk}.tar.gz
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-web/news.txt
  
  $ cvs diff -u -r1.3737 -r1.3738 news.txt
  --- openpkg-web/news.txt  20 Mar 2003 14:47:27 -  1.3737
  +++ openpkg-web/news.txt  20 Mar 2003 14:57:19 -  1.3738
  @@ -1,3 +1,4 @@
  +20-Mar-2003: Upgraded package: Pperl-tk-20030320-20030320
   20-Mar-2003: Upgraded package: Puvscan-4.1.6.4253-20030320
   20-Mar-2003: Upgraded package: Ppostfix-2.0.7-20030320
   20-Mar-2003: Upgraded package: Pkerberos-1.2.7-20030320
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: OPENPKG_1_2_SOLID: openpkg-src/mutt/ mutt.patch mutt.sp...

2003-03-20 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   20-Mar-2003 16:07:00
  Branch: OPENPKG_1_2_SOLIDHandle: 2003032015065900

  Added files:  (Branch: OPENPKG_1_2_SOLID)
openpkg-src/muttmutt.patch
  Modified files:   (Branch: OPENPKG_1_2_SOLID)
openpkg-src/muttmutt.spec

  Log:
OpenPKG-SA-2003.025-mutt

  Summary:
RevisionChanges Path
1.1.2.1 +82 -0  openpkg-src/mutt/mutt.patch
1.41.2.1.2.2+3  -1  openpkg-src/mutt/mutt.spec
  

  patch -p0 '@@ .'
  Index: openpkg-src/mutt/mutt.patch
  
  $ cvs diff -u -r0 -r1.1.2.1 mutt.patch
  --- /dev/null 2003-03-20 16:07:00.0 +0100
  +++ mutt.patch2003-03-20 16:07:00.0 +0100
  @@ -0,0 +1,82 @@
  +http://www.corest.com/common/showdoc.php?idx=310idxseccion=10
  +
  +http://marc.theaimsgroup.com/?l=bugtraqm=104812904712828w=2
  +Mutt versions 1.4.1 and 1.5.4 have just been released and will soon
  +be available from ftp://ftp.mutt.org/mutt/.
  +
  +Both versions fix a buffer overflow in mutt's IMAP client code which
  +was identified by Core Security Technologies, and fixed by Edmund
  +Grimley Evans.  A more detailed advisory will be published by Core
  +Security.
  +
  +ChangeLog
  +mutt/imap/utf7.c:
  +From: Edmund GRIMLEY EVANS
  +Fix a buffer overflow in utf8_to_utf7
  +
  +--- mutt-1.4/browser.c   Thu Mar 20 15:22:46 2003
   mutt-1.4.1/browser.c Thu Mar 20 15:24:13 2003
  +@@ -192,25 +192,27 @@
  +   break;
  +   
  + case 'f':
  ++{
  ++  char *s;
  + #ifdef USE_IMAP
  +   if (folder-ff-imap)
  +-strfcpy (fn, NONULL(folder-ff-desc), sizeof (fn));
  ++s = NONULL (folder-ff-desc);
  +   else
  + #endif
  +-  strfcpy (fn, folder-ff-name, sizeof(fn));
  +-  if (folder-ff-st != NULL)
  +-  {
  +-strcat (fn, S_ISLNK (folder-ff-st-st_mode) ? @ :   /* 
__STRCAT_CHECKED__ */
  +-(S_ISDIR (folder-ff-st-st_mode) ? / : 
  +- ((folder-ff-st-st_mode  S_IXUSR) != 0 ? * : )));
  +-  }
  ++s = NONULL (folder-ff-name);
  ++
  ++  snprintf (fn, sizeof (fn), %s%s, s,
  ++folder-ff-st ? (S_ISLNK (folder-ff-st-st_mode) ? @ :
 
  ++  (S_ISDIR (folder-ff-st-st_mode) ? / : 
  ++   ((folder-ff-st-st_mode  S_IXUSR) != 0 ? * : 
))) : );
  ++  
  +   mutt_format_s (dest, destlen, fmt, fn);
  +   break;
  +-  
  ++}
  + case 'F':
  +   if (folder-ff-st != NULL)
  +   {
  +-sprintf (permission, %c%c%c%c%c%c%c%c%c%c,
  ++snprintf (permission, sizeof (permission), %c%c%c%c%c%c%c%c%c%c,
  + S_ISDIR(folder-ff-st-st_mode) ? 'd' : (S_ISLNK(folder-ff-st-st_mode) 
? 'l' : '-'),
  + (folder-ff-st-st_mode  S_IRUSR) != 0 ? 'r': '-',
  + (folder-ff-st-st_mode  S_IWUSR) != 0 ? 'w' : '-',
  +@@ -227,8 +229,8 @@
  +   else if (folder-ff-imap)
  +   {
  + /* mark folders with subfolders AND mail */
  +-sprintf (permission, IMAP %c,
  +-  (folder-ff-inferiors  folder-ff-selectable) ? '+' : ' ');
  ++snprintf (permission, sizeof (permission), IMAP %c,
  ++  (folder-ff-inferiors  folder-ff-selectable) ? '+' : ' ');
  + mutt_format_s (dest, destlen, fmt, permission);
  +   }
  + #endif
  +--- mutt-1.4/imap/utf7.c Tue Feb 13 23:06:16 2001
   mutt-1.4.1/imap/utf7.c   Wed Mar 19 22:33:30 2003
  +@@ -149,7 +149,11 @@
  +   int n, i, b = 0, k = 0;
  +   int base64 = 0;
  + 
  +-  p = buf = safe_malloc (u8len * 2 + 1);
  ++  /*
  ++   * In the worst case we convert 2 chars to 7 chars. For example:
  ++   * \x10\x10... - ABA--ABA--
  ++   */
  ++  p = buf = safe_malloc ((u8len / 2) * 7 + 6);
  + 
  +   while (u8len)
  +   {
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-src/mutt/mutt.spec
  
  $ cvs diff -u -r1.41.2.1.2.1 -r1.41.2.1.2.2 mutt.spec
  --- openpkg-src/mutt/mutt.spec18 Jan 2003 17:21:04 -  1.41.2.1.2.1
  +++ openpkg-src/mutt/mutt.spec20 Mar 2003 15:06:59 -  1.41.2.1.2.2
  @@ -36,7 +36,7 @@
   Group:Mail
   License:  BSD
   Version:  %{V_mutt}i
  -Release:  1.2.0
  +Release:  1.2.1
   
   #   build options
   %option   with_comp   no
  @@ -48,6 +48,7 @@
   Source2:  muttrc
   Patch0:   

[CVS] OpenPKG: OPENPKG_1_1_SOLID: openpkg-src/mysql/ my.cnf

2003-03-20 Thread Michael van Elst
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Michael van Elst
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   20-Mar-2003 16:10:48
  Branch: OPENPKG_1_1_SOLIDHandle: 2003032015104700

  Modified files:   (Branch: OPENPKG_1_1_SOLID)
openpkg-src/mysql   my.cnf

  Log:
fix socket path

  Summary:
RevisionChanges Path
1.2.2.3 +1  -1  openpkg-src/mysql/my.cnf
  

  patch -p0 '@@ .'
  Index: openpkg-src/mysql/my.cnf
  
  $ cvs diff -u -r1.2.2.2 -r1.2.2.3 my.cnf
  --- openpkg-src/mysql/my.cnf  19 Mar 2003 07:58:40 -  1.2.2.2
  +++ openpkg-src/mysql/my.cnf  20 Mar 2003 15:10:47 -  1.2.2.3
  @@ -1,7 +1,7 @@
   
   [safe_mysqld]
   datadir  = @l_prefix@/var/mysql
  -socket   = @l_prefix@/var/mysql/mysqld.sock
  +socket   = @l_prefix@/var/mysql/mysql.sock
   set-variable = [EMAIL PROTECTED]@/var/mysql/mysqld.pid
   set-variable = max_connections=1000
   port = 3306
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2003.025-mutt.txt

2003-03-20 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   20-Mar-2003 16:14:35
  Branch: HEAD Handle: 2003032015143500

  Added files:
openpkg-web/securityOpenPKG-SA-2003.025-mutt.txt

  Log:
OpenPKG-SA-2003.025-mutt

  Summary:
RevisionChanges Path
1.1 +71 -0  openpkg-web/security/OpenPKG-SA-2003.025-mutt.txt
  

  patch -p0 '@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.025-mutt.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.025-mutt.txt
  --- /dev/null 2003-03-20 16:14:35.0 +0100
  +++ OpenPKG-SA-2003.025-mutt.txt  2003-03-20 16:14:35.0 +0100
  @@ -0,0 +1,71 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.025  20-Mar-2003
  +
  +
  +Package: mutt
  +Vulnerability:   buffer overflow in IMAP client
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages:  Corrected Packages:
  +OpenPKG CURRENT  = mutt-1.4i-20030103   = mutt-1.4.1i-20030320
  +OpenPKG 1.2  = mutt-1.4i-1.2.0  = mutt-1.4i-1.2.1
  +OpenPKG 1.1  = mutt-1.4i-1.1.0  = mutt-1.4i-1.1.1
  +
  +Dependent Packages:  none
  +
  +Description:
  +  According to a posting on Bugtraq [0] Edmund Grimley Evans fixed a
  +  buffer overflow which exists in the IMAP client code of mutt [1].  The
  +  bug was found by Core Security Technologies [2].
  +
  +  Please check whether you are affected by running prefix/bin/rpm -q
  +  mutt. If you have the mutt package installed and its version is
  +  affected (see above), we recommend that you immediately upgrade it
  +  (see Solution). [3][4]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  +  location, verify its integrity [9], build a corresponding binary RPM
  +  from it [3] and update your OpenPKG installation by applying the binary
  +  RPM [4]. For the current release OpenPKG 1.2, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp bin
  +  ftp cd release/1.2/UPD
  +  ftp get mutt-1.4i-1.2.1.src.rpm
  +  ftp bye
  +  $ prefix/bin/rpm -v --checksig mutt-1.4i-1.2.1.src.rpm
  +  $ prefix/bin/rpm --rebuild mutt-1.4i-1.2.1.src.rpm
  +  $ su -
  +  # prefix/bin/rpm -Fvh prefix/RPM/PKG/mutt-1.4i-1.2.1.*.rpm
  +
  +
  +References:
  +  [0] http://www.securityfocus.com/archive/1/315679
  +  [1] http://www.mutt.org/
  +  [2] http://www.corest.com/common/showdoc.php?idx=310idxseccion=10
  +  [3] http://www.openpkg.org/tutorial.html#regular-source
  +  [4] http://www.openpkg.org/tutorial.html#regular-binary
  +  [5] ftp://ftp.openpkg.org/release/1.1/UPD/mutt-1.4i-1.1.1.src.rpm
  +  [6] ftp://ftp.openpkg.org/release/1.2/UPD/mutt-1.4i-1.2.1.src.rpm
  +  [7] ftp://ftp.openpkg.org/release/1.1/UPD/
  +  [8] ftp://ftp.openpkg.org/release/1.2/UPD/
  +  [9] http://www.openpkg.org/security.html#signature
  +
  +
  +For security reasons, this advisory was digitally signed with
  +the OpenPGP public key OpenPKG [EMAIL PROTECTED] (ID 63C4CB9F)
  +of the OpenPKG project which you can find under the official URL
  +http://www.openpkg.org/openpkg.pgp or on http://keyserver.pgp.com/. To
  +check the integrity of this advisory, verify its digital signature by
  +using GnuPG (http://www.gnupg.org/). For instance, pipe this message to
  +the command gpg --verify --keyserver keyserver.pgp.com.
  +
  +
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-re/vcheck/ vc.lyx openpkg-src/lyx/ lyx.spec ope...

2003-03-20 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src openpkg-web openpkg$ Date:   20-Mar-2003 16:17:42
  Branch: HEAD Handle: 2003032015174002

  Modified files:
openpkg-re/vcheck   vc.lyx
openpkg-src/lyx lyx.spec
openpkg-web news.txt

  Log:
upgrading package: lyx 1.3.0 - 1.3.1

  Summary:
RevisionChanges Path
1.3 +1  -1  openpkg-re/vcheck/vc.lyx
1.3 +2  -2  openpkg-src/lyx/lyx.spec
1.3739  +1  -0  openpkg-web/news.txt
  

  patch -p0 '@@ .'
  Index: openpkg-re/vcheck/vc.lyx
  
  $ cvs diff -u -r1.2 -r1.3 vc.lyx
  --- openpkg-re/vcheck/vc.lyx  5 Mar 2003 16:24:23 -   1.2
  +++ openpkg-re/vcheck/vc.lyx  20 Mar 2003 15:17:40 -  1.3
  @@ -2,7 +2,7 @@
   }
   
   prog lyx = {
  -  version   = 1.3.0
  +  version   = 1.3.1
 url   = ftp://ftp.lyx.org/pub/lyx/stable/
 regex = lyx-(__VER__)\.tar\.gz
   }
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-src/lyx/lyx.spec
  
  $ cvs diff -u -r1.2 -r1.3 lyx.spec
  --- openpkg-src/lyx/lyx.spec  5 Mar 2003 18:51:35 -   1.2
  +++ openpkg-src/lyx/lyx.spec  20 Mar 2003 15:17:42 -  1.3
  @@ -26,7 +26,7 @@
   #   FIXME: mlelstv: JUNK because Qt does not yet build
   
   #   package versions
  -%define   V_lyx1.3.0
  +%define   V_lyx1.3.1
   %define   V_xforms 1.0
   
   #   package information
  @@ -39,7 +39,7 @@
   Group:Print
   License:  GPL2
   Version:  %{V_lyx}
  -Release:  20030305
  +Release:  20030320
   
   #   list of sources
   Source0:  ftp://ftp.lyx.org/pub/lyx/stable/lyx-%{V_lyx}.tar.gz
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-web/news.txt
  
  $ cvs diff -u -r1.3738 -r1.3739 news.txt
  --- openpkg-web/news.txt  20 Mar 2003 14:57:19 -  1.3738
  +++ openpkg-web/news.txt  20 Mar 2003 15:17:40 -  1.3739
  @@ -1,3 +1,4 @@
  +20-Mar-2003: Upgraded package: Plyx-1.3.1-20030320
   20-Mar-2003: Upgraded package: Pperl-tk-20030320-20030320
   20-Mar-2003: Upgraded package: Puvscan-4.1.6.4253-20030320
   20-Mar-2003: Upgraded package: Ppostfix-2.0.7-20030320
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: OPENPKG_1_1_SOLID: openpkg-src/mutt/ mutt.patch mutt.sp...

2003-03-20 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   20-Mar-2003 16:22:06
  Branch: OPENPKG_1_1_SOLIDHandle: 2003032015220600

  Added files:  (Branch: OPENPKG_1_1_SOLID)
openpkg-src/muttmutt.patch
  Modified files:   (Branch: OPENPKG_1_1_SOLID)
openpkg-src/muttmutt.spec

  Log:
OpenPKG-SA-2003.025-mutt

  Summary:
RevisionChanges Path
1.1.4.1 +82 -0  openpkg-src/mutt/mutt.patch
1.36.2.2+3  -1  openpkg-src/mutt/mutt.spec
  

  patch -p0 '@@ .'
  Index: openpkg-src/mutt/mutt.patch
  
  $ cvs diff -u -r0 -r1.1.4.1 mutt.patch
  --- /dev/null 2003-03-20 16:22:06.0 +0100
  +++ mutt.patch2003-03-20 16:22:06.0 +0100
  @@ -0,0 +1,82 @@
  +http://www.corest.com/common/showdoc.php?idx=310idxseccion=10
  +
  +http://marc.theaimsgroup.com/?l=bugtraqm=104812904712828w=2
  +Mutt versions 1.4.1 and 1.5.4 have just been released and will soon
  +be available from ftp://ftp.mutt.org/mutt/.
  +
  +Both versions fix a buffer overflow in mutt's IMAP client code which
  +was identified by Core Security Technologies, and fixed by Edmund
  +Grimley Evans.  A more detailed advisory will be published by Core
  +Security.
  +
  +ChangeLog
  +mutt/imap/utf7.c:
  +From: Edmund GRIMLEY EVANS
  +Fix a buffer overflow in utf8_to_utf7
  +
  +--- mutt-1.4/browser.c   Thu Mar 20 15:22:46 2003
   mutt-1.4.1/browser.c Thu Mar 20 15:24:13 2003
  +@@ -192,25 +192,27 @@
  +   break;
  +   
  + case 'f':
  ++{
  ++  char *s;
  + #ifdef USE_IMAP
  +   if (folder-ff-imap)
  +-strfcpy (fn, NONULL(folder-ff-desc), sizeof (fn));
  ++s = NONULL (folder-ff-desc);
  +   else
  + #endif
  +-  strfcpy (fn, folder-ff-name, sizeof(fn));
  +-  if (folder-ff-st != NULL)
  +-  {
  +-strcat (fn, S_ISLNK (folder-ff-st-st_mode) ? @ :   /* 
__STRCAT_CHECKED__ */
  +-(S_ISDIR (folder-ff-st-st_mode) ? / : 
  +- ((folder-ff-st-st_mode  S_IXUSR) != 0 ? * : )));
  +-  }
  ++s = NONULL (folder-ff-name);
  ++
  ++  snprintf (fn, sizeof (fn), %s%s, s,
  ++folder-ff-st ? (S_ISLNK (folder-ff-st-st_mode) ? @ :
 
  ++  (S_ISDIR (folder-ff-st-st_mode) ? / : 
  ++   ((folder-ff-st-st_mode  S_IXUSR) != 0 ? * : 
))) : );
  ++  
  +   mutt_format_s (dest, destlen, fmt, fn);
  +   break;
  +-  
  ++}
  + case 'F':
  +   if (folder-ff-st != NULL)
  +   {
  +-sprintf (permission, %c%c%c%c%c%c%c%c%c%c,
  ++snprintf (permission, sizeof (permission), %c%c%c%c%c%c%c%c%c%c,
  + S_ISDIR(folder-ff-st-st_mode) ? 'd' : (S_ISLNK(folder-ff-st-st_mode) 
? 'l' : '-'),
  + (folder-ff-st-st_mode  S_IRUSR) != 0 ? 'r': '-',
  + (folder-ff-st-st_mode  S_IWUSR) != 0 ? 'w' : '-',
  +@@ -227,8 +229,8 @@
  +   else if (folder-ff-imap)
  +   {
  + /* mark folders with subfolders AND mail */
  +-sprintf (permission, IMAP %c,
  +-  (folder-ff-inferiors  folder-ff-selectable) ? '+' : ' ');
  ++snprintf (permission, sizeof (permission), IMAP %c,
  ++  (folder-ff-inferiors  folder-ff-selectable) ? '+' : ' ');
  + mutt_format_s (dest, destlen, fmt, permission);
  +   }
  + #endif
  +--- mutt-1.4/imap/utf7.c Tue Feb 13 23:06:16 2001
   mutt-1.4.1/imap/utf7.c   Wed Mar 19 22:33:30 2003
  +@@ -149,7 +149,11 @@
  +   int n, i, b = 0, k = 0;
  +   int base64 = 0;
  + 
  +-  p = buf = safe_malloc (u8len * 2 + 1);
  ++  /*
  ++   * In the worst case we convert 2 chars to 7 chars. For example:
  ++   * \x10\x10... - ABA--ABA--
  ++   */
  ++  p = buf = safe_malloc ((u8len / 2) * 7 + 6);
  + 
  +   while (u8len)
  +   {
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-src/mutt/mutt.spec
  
  $ cvs diff -u -r1.36.2.1 -r1.36.2.2 mutt.spec
  --- openpkg-src/mutt/mutt.spec26 Aug 2002 19:54:18 -  1.36.2.1
  +++ openpkg-src/mutt/mutt.spec20 Mar 2003 15:22:06 -  1.36.2.2
  @@ -44,7 +44,7 @@
   Group:Mail
   License:  BSD
   Version:  %{V_mutt}i
  -Release:  1.1.0
  +Release:  1.1.1
   
   #   list of sources
   Source0:  ftp://ftp.mutt.org/pub/mutt/mutt-%{V_mutt}i.tar.gz
  @@ -52,6 +52,7 @@
   Source2:  muttrc
   Patch0:   

[CVS] OpenPKG: openpkg-re/vcheck/ vc.emacs openpkg-src/emacs/ emacs.sp...

2003-03-20 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src openpkg-web openpkg$ Date:   20-Mar-2003 16:29:25
  Branch: HEAD Handle: 2003032015292202

  Modified files:
openpkg-re/vcheck   vc.emacs
openpkg-src/emacs   emacs.spec
openpkg-web news.txt

  Log:
upgrading package: emacs 21.2 - 21.3

  Summary:
RevisionChanges Path
1.3 +1  -1  openpkg-re/vcheck/vc.emacs
1.33+2  -2  openpkg-src/emacs/emacs.spec
1.3740  +1  -0  openpkg-web/news.txt
  

  patch -p0 '@@ .'
  Index: openpkg-re/vcheck/vc.emacs
  
  $ cvs diff -u -r1.2 -r1.3 vc.emacs
  --- openpkg-re/vcheck/vc.emacs18 Mar 2002 08:37:45 -  1.2
  +++ openpkg-re/vcheck/vc.emacs20 Mar 2003 15:29:22 -  1.3
  @@ -2,7 +2,7 @@
   }
   
   prog emacs = {
  -  version   = 21.2
  +  version   = 21.3
 url   = ftp://ftp.gnu.org/gnu/emacs/
 regex = emacs-(__VER__)\.tar\.gz
   }
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-src/emacs/emacs.spec
  
  $ cvs diff -u -r1.32 -r1.33 emacs.spec
  --- openpkg-src/emacs/emacs.spec  15 Jan 2003 12:57:36 -  1.32
  +++ openpkg-src/emacs/emacs.spec  20 Mar 2003 15:29:24 -  1.33
  @@ -32,8 +32,8 @@
   Distribution: OpenPKG [BASE]
   Group:Editor
   License:  GPL
  -Version:  21.2
  -Release:  20030115
  +Version:  21.3
  +Release:  20030319
   
   #   package options
   %option   with_x11   no
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-web/news.txt
  
  $ cvs diff -u -r1.3739 -r1.3740 news.txt
  --- openpkg-web/news.txt  20 Mar 2003 15:17:40 -  1.3739
  +++ openpkg-web/news.txt  20 Mar 2003 15:29:23 -  1.3740
  @@ -1,3 +1,4 @@
  +20-Mar-2003: Upgraded package: Pemacs-21.3-20030319
   20-Mar-2003: Upgraded package: Plyx-1.3.1-20030320
   20-Mar-2003: Upgraded package: Pperl-tk-20030320-20030320
   20-Mar-2003: Upgraded package: Puvscan-4.1.6.4253-20030320
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: OPENPKG_1_STABLE: openpkg-src/mutt/ mutt.spec

2003-03-20 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   20-Mar-2003 16:32:13
  Branch: OPENPKG_1_STABLE Handle: 2003032015321200

  Modified files:   (Branch: OPENPKG_1_STABLE)
openpkg-src/muttmutt.spec

  Log:
MFC: OpenPKG-SA-2003.025-mutt; comp/nntp are not yet available

  Summary:
RevisionChanges Path
1.41.2.2+2  -2  openpkg-src/mutt/mutt.spec
  

  patch -p0 '@@ .'
  Index: openpkg-src/mutt/mutt.spec
  
  $ cvs diff -u -r1.41.2.1 -r1.41.2.2 mutt.spec
  --- openpkg-src/mutt/mutt.spec18 Jan 2003 14:13:11 -  1.41.2.1
  +++ openpkg-src/mutt/mutt.spec20 Mar 2003 15:32:12 -  1.41.2.2
  @@ -24,7 +24,7 @@
   ##
   
   #   package version
  -%define   V_mutt  1.4
  +%define   V_mutt  1.4.1
   
   #   package information
   Name: mutt
  @@ -36,7 +36,7 @@
   Group:Mail
   License:  BSD
   Version:  %{V_mutt}i
  -Release:  1.20030103
  +Release:  1.20030320
   
   #   build options
   %option   with_comp   no
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/openpkg-tool/ openpkg-build.pl openpkg-tool...

2003-03-20 Thread Michael van Elst
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Michael van Elst
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src openpkg-web  Date:   20-Mar-2003 16:33:54
  Branch: HEAD Handle: 2003032015335301

  Modified files:
openpkg-src/openpkg-tool
openpkg-build.pl openpkg-tool.spec
openpkg-web news.txt

  Log:
Avoid switching (and conflicting) virtual targets on upgrade

  Summary:
RevisionChanges Path
1.63+25 -2  openpkg-src/openpkg-tool/openpkg-build.pl
1.45+2  -2  openpkg-src/openpkg-tool/openpkg-tool.spec
1.3741  +1  -0  openpkg-web/news.txt
  

  patch -p0 '@@ .'
  Index: openpkg-src/openpkg-tool/openpkg-build.pl
  
  $ cvs diff -u -r1.62 -r1.63 openpkg-build.pl
  --- openpkg-src/openpkg-tool/openpkg-build.pl 19 Mar 2003 13:54:10 -  1.62
  +++ openpkg-src/openpkg-tool/openpkg-build.pl 20 Mar 2003 15:33:54 -  1.63
  @@ -1342,7 +1342,7 @@
   my($dep, $env) = @_;
   my($name,$op,@vers);
   my($i,$r,$b,$cond,$version);
  -my($t,$tdef);
  +my($t,$tdef,$why);
   
   ($name, $op, $version) = ($dep-{name}, $dep-{op}, $dep-{val});
   
  @@ -1370,6 +1370,10 @@
   
   $tdef = undef;
   
  +#
  +# search installed target that matches requirement
  +# use it if we are not upgrading (no -U)
  +#
   if ($i  (@vers = get_versions($i, $cond))) {
   foreach (@vers) {
   $t = $i-{$_}-[0];
  @@ -1382,17 +1386,36 @@
   }
   }
   }
  +
  +#
  +# search target in current build list that matches requirement
  +# use it if it exists
  +#
   if ($b  (@vers = get_versions($b, $cond))) {
   return ($b-{$vers[0]}-[0], 1);
   }
   
  +#
  +# search target in repository and install it, if it is newer
  +# than corresponding installed versions
  +# avoid repository packages that would install 'new' (i.e.
  +# are not an upgrade of an existing package)
  +#
   $t = chose_source($env, $name, undef, $r, get_versions($r, $cond));
   if ($t) {
  -if (!$tdef || target_better($env, $t, $env-{installed})) {
  +if (!$tdef || (
  +$why = target_better($env, $t, $env-{installed}) 
  +$why ne 'new'
  +)) {
   return ($t, 0);
   }
   }
   
  +#
  +# if nothing is suitable in repository then fall back to
  +# anything we already have installed but that we skipped
  +# above to look for upgrades.
  +#
   if ($tdef) {
   return ($tdef, 1);
   }
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-src/openpkg-tool/openpkg-tool.spec
  
  $ cvs diff -u -r1.44 -r1.45 openpkg-tool.spec
  --- openpkg-src/openpkg-tool/openpkg-tool.spec19 Mar 2003 09:48:38 - 
 1.44
  +++ openpkg-src/openpkg-tool/openpkg-tool.spec20 Mar 2003 15:33:54 - 
 1.45
  @@ -32,8 +32,8 @@
   Distribution: OpenPKG [PLUS]
   Group:Bootstrapping
   License:  GPL
  -Version:  20030319
  -Release:  20030319
  +Version:  20030320
  +Release:  20030320
   
   #   list of sources
   Source0:  openpkg.sh
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-web/news.txt
  
  $ cvs diff -u -r1.3740 -r1.3741 news.txt
  --- openpkg-web/news.txt  20 Mar 2003 15:29:23 -  1.3740
  +++ openpkg-web/news.txt  20 Mar 2003 15:33:53 -  1.3741
  @@ -1,3 +1,4 @@
  +20-Mar-2003: Upgraded package: Popenpkg-tool-20030320-20030320
   20-Mar-2003: Upgraded package: Pemacs-21.3-20030319
   20-Mar-2003: Upgraded package: Plyx-1.3.1-20030320
   20-Mar-2003: Upgraded package: Pperl-tk-20030320-20030320
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: OPENPKG_1_STABLE: openpkg-src/fsl/ fsl.spec

2003-03-20 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   20-Mar-2003 17:10:55
  Branch: OPENPKG_1_STABLE Handle: 2003032016105500

  Modified files:   (Branch: OPENPKG_1_STABLE)
openpkg-src/fsl fsl.spec

  Log:
MFC: install fsl-l2tool; upgrading package: fsl 1.0.7 - 1.0.8

  Summary:
RevisionChanges Path
1.31.2.3+6  -3  openpkg-src/fsl/fsl.spec
  

  patch -p0 '@@ .'
  Index: openpkg-src/fsl/fsl.spec
  
  $ cvs diff -u -r1.31.2.2 -r1.31.2.3 fsl.spec
  --- openpkg-src/fsl/fsl.spec  28 Jan 2003 13:01:35 -  1.31.2.2
  +++ openpkg-src/fsl/fsl.spec  20 Mar 2003 16:10:55 -  1.31.2.3
  @@ -9,7 +9,7 @@
   ##  the above copyright notice and this permission notice appear in all
   ##  copies.
   ##
  -##  THIS SOFTWARE IS PROVIDED AS IS'' AND ANY EXPRESSED OR IMPLIED
  +##  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
   ##  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
   ##  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
   ##  IN NO EVENT SHALL THE AUTHORS AND COPYRIGHT HOLDERS AND THEIR
  @@ -32,8 +32,8 @@
   Distribution: OpenPKG [CORE]
   Group:System
   License:  MIT-style
  -Version:  1.0.7
  -Release:  1.20030128
  +Version:  1.0.8
  +Release:  1.20030320
   
   #   package options
   %option   with_fsl_debug   no
  @@ -80,6 +80,9 @@
   %install
   rm -rf $RPM_BUILD_ROOT
   %{l_make} %{l_mflags} install DESTDIR=$RPM_BUILD_ROOT
  +%{l_shtool} mkdir -f -p -m 755 $RPM_BUILD_ROOT%{l_prefix}/bin
  +%{l_shtool} install -c -m 755 \
  +lib_l2/l2tool $RPM_BUILD_ROOT%{l_prefix}/bin/fsl-l2tool
   %{l_shtool} mkdir -f -p -m 755 \
   $RPM_BUILD_ROOT%{l_prefix}/etc/fsl
   %{l_shtool} install -c -m 644 \
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: OPENPKG_1_2_SOLID: openpkg-src/fsl/ fsl.spec

2003-03-20 Thread Thomas Lotterer
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   20-Mar-2003 17:17:18
  Branch: OPENPKG_1_2_SOLIDHandle: 2003032016171800

  Modified files:   (Branch: OPENPKG_1_2_SOLID)
openpkg-src/fsl fsl.spec

  Log:
MFS: install fsl-l2tool; upgrading package: fsl 1.0.7 - 1.0.8

  Summary:
RevisionChanges Path
1.31.2.1.2.3+6  -3  openpkg-src/fsl/fsl.spec
  

  patch -p0 '@@ .'
  Index: openpkg-src/fsl/fsl.spec
  
  $ cvs diff -u -r1.31.2.1.2.2 -r1.31.2.1.2.3 fsl.spec
  --- openpkg-src/fsl/fsl.spec  28 Jan 2003 13:03:46 -  1.31.2.1.2.2
  +++ openpkg-src/fsl/fsl.spec  20 Mar 2003 16:17:18 -  1.31.2.1.2.3
  @@ -9,7 +9,7 @@
   ##  the above copyright notice and this permission notice appear in all
   ##  copies.
   ##
  -##  THIS SOFTWARE IS PROVIDED AS IS'' AND ANY EXPRESSED OR IMPLIED
  +##  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
   ##  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
   ##  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
   ##  IN NO EVENT SHALL THE AUTHORS AND COPYRIGHT HOLDERS AND THEIR
  @@ -32,8 +32,8 @@
   Distribution: OpenPKG [CORE]
   Group:System
   License:  MIT-style
  -Version:  1.0.7
  -Release:  1.2.1
  +Version:  1.0.8
  +Release:  1.2.2
   
   #   package options
   %option   with_fsl_debug   no
  @@ -80,6 +80,9 @@
   %install
   rm -rf $RPM_BUILD_ROOT
   %{l_make} %{l_mflags} install DESTDIR=$RPM_BUILD_ROOT
  +%{l_shtool} mkdir -f -p -m 755 $RPM_BUILD_ROOT%{l_prefix}/bin
  +%{l_shtool} install -c -m 755 \
  +lib_l2/l2tool $RPM_BUILD_ROOT%{l_prefix}/bin/fsl-l2tool
   %{l_shtool} mkdir -f -p -m 755 \
   $RPM_BUILD_ROOT%{l_prefix}/etc/fsl
   %{l_shtool} install -c -m 644 \
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-re/vcheck/ vc.xmame openpkg-src/xmame/ xmame.sp...

2003-03-20 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src openpkg-web openpkg$ Date:   20-Mar-2003 20:49:00
  Branch: HEAD Handle: 2003032019485702

  Modified files:
openpkg-re/vcheck   vc.xmame
openpkg-src/xmame   xmame.spec
openpkg-web news.txt

  Log:
upgrading package: xmame 0.66.1 - 0.66.2

  Summary:
RevisionChanges Path
1.6 +1  -1  openpkg-re/vcheck/vc.xmame
1.31+2  -2  openpkg-src/xmame/xmame.spec
1.3747  +1  -0  openpkg-web/news.txt
  

  patch -p0 '@@ .'
  Index: openpkg-re/vcheck/vc.xmame
  
  $ cvs diff -u -r1.5 -r1.6 vc.xmame
  --- openpkg-re/vcheck/vc.xmame18 Mar 2003 13:52:32 -  1.5
  +++ openpkg-re/vcheck/vc.xmame20 Mar 2003 19:48:57 -  1.6
  @@ -2,7 +2,7 @@
   }
   
   prog xmame = {
  -  version   = 0.66.1
  +  version   = 0.66.2
 url   = http://x.mame.net/xmame-doc-7.html
 regex = xmame-(__VER__)\.tar\.bz2
   }
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-src/xmame/xmame.spec
  
  $ cvs diff -u -r1.30 -r1.31 xmame.spec
  --- openpkg-src/xmame/xmame.spec  18 Mar 2003 13:52:34 -  1.30
  +++ openpkg-src/xmame/xmame.spec  20 Mar 2003 19:48:59 -  1.31
  @@ -32,8 +32,8 @@
   Distribution: OpenPKG [EVAL]
   Group:Games
   License:  GPL
  -Version:  0.66.1
  -Release:  20030318
  +Version:  0.66.2
  +Release:  20030320
   
   #   list of sources
   Source0:  http://x.mame.net/download/xmame-%{version}.tar.bz2
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-web/news.txt
  
  $ cvs diff -u -r1.3746 -r1.3747 news.txt
  --- openpkg-web/news.txt  20 Mar 2003 19:19:33 -  1.3746
  +++ openpkg-web/news.txt  20 Mar 2003 19:48:58 -  1.3747
  @@ -1,3 +1,4 @@
  +20-Mar-2003: Upgraded package: Pxmame-0.66.2-20030320
   20-Mar-2003: Upgraded package: Plibtasn1-0.2.3-20030320
   20-Mar-2003: Upgraded package: Pmutt-1.4.1i-20030103
   20-Mar-2003: Upgraded package: Pcoreutils-4.5.11-20030320
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


LDAP error compiling postfix

2003-03-20 Thread Bill Campbell
When I tried building postfix-2.0.7-20030320.src.rpm today with LDAP
support and openldap-2.1.16-20030315, the linking failed with several
undefined references including ldap_enable_cache.

Compiling against openldap-2.1.12-20030212 worked properly.  Looking at
diffs between the openldap-2.1.12 and openldap-2.1.16 it appears that some
functions have been dropped.

This is probably more a postfix issue than openpkg, but I haven't seen
anything on the postfix mailing list about LDAP problems recently.

Bill
--
INTERNET:   [EMAIL PROTECTED]  Bill Campbell; Celestial Software LLC
UUCP:   camco!bill  PO Box 820; 6641 E. Mercer Way
FAX:(206) 232-9186  Mercer Island, WA 98040-0820; (206) 236-1676
URL: http://www.celestial.com/

``Rightful liberty is unobstructed action according to our will within
limits drawn around us by the equal rights of others. I do not add 'within
the limits of the law' because law is often but the tyrant's will, and
always so when it violates the rights of the individual.''
-Thomas Jefferson
__
The OpenPKG Projectwww.openpkg.org
Developer Communication List   [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-re/ openpkg-dev

2003-03-20 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-re   Date:   20-Mar-2003 20:53:01
  Branch: HEAD Handle: 2003032019530100

  Modified files:
openpkg-re  openpkg-dev

  Log:
avoid a sticky HEAD tag

  Summary:
RevisionChanges Path
1.65+5  -1  openpkg-re/openpkg-dev
  

  patch -p0 '@@ .'
  Index: openpkg-re/openpkg-dev
  
  $ cvs diff -u -r1.64 -r1.65 openpkg-dev
  --- openpkg-re/openpkg-dev19 Mar 2003 21:56:24 -  1.64
  +++ openpkg-re/openpkg-dev20 Mar 2003 19:53:01 -  1.65
  @@ -340,7 +340,11 @@
   echo ++ updating to branch ${branch}
   ( HOME=${OPENPKG_WORK}
 export HOME
  -  cvs update -r ${branch}
  +  if [ .${branch} = .HEAD ]; then
  +  cvs update -A
  +  else
  +  cvs update -r ${branch}
  +  fi
   )
   }
   
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-src/openssl/ openssl.patch openssl.spec openpkg...

2003-03-20 Thread Ralf S. Engelschall
   Version:  0.9.7a
  -Release:  20030317
  +Release:  20030320
   
   #   list of sources
   Source0:  ftp://ftp.openssl.org/source/openssl-%{version}.tar.gz
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-web/news.txt
  
  $ cvs diff -u -r1.3747 -r1.3748 news.txt
  --- openpkg-web/news.txt  20 Mar 2003 19:48:58 -  1.3747
  +++ openpkg-web/news.txt  20 Mar 2003 19:54:07 -  1.3748
  @@ -1,3 +1,4 @@
  +20-Mar-2003: Upgraded package: Popenssl-0.9.7a-20030320
   20-Mar-2003: Upgraded package: Pxmame-0.66.2-20030320
   20-Mar-2003: Upgraded package: Plibtasn1-0.2.3-20030320
   20-Mar-2003: Upgraded package: Pmutt-1.4.1i-20030103
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: OPENPKG_1_2_SOLID: openpkg-src/openssl/ openssl.patch o...

2003-03-20 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src  Date:   20-Mar-2003 21:09:40
  Branch: OPENPKG_1_2_SOLIDHandle: 2003032020093900

  Modified files:   (Branch: OPENPKG_1_2_SOLID)
openpkg-src/openssl openssl.patch openssl.spec

  Log:
include OpenSSL security fix (OpenPKG-SA-2003.026-openssl)

  Summary:
RevisionChanges Path
1.7.4.3 +56 -0  openpkg-src/openssl/openssl.patch
1.37.2.1.2.5+1  -1  openpkg-src/openssl/openssl.spec
  

  patch -p0 '@@ .'
  Index: openpkg-src/openssl/openssl.patch
  
  $ cvs diff -u -r1.7.4.2 -r1.7.4.3 openssl.patch
  --- openpkg-src/openssl/openssl.patch 17 Mar 2003 14:54:13 -  1.7.4.2
  +++ openpkg-src/openssl/openssl.patch 20 Mar 2003 20:09:39 -  1.7.4.3
  @@ -173,3 +173,59 @@
}

void RSA_set_default_method(const RSA_METHOD *meth)
  +Index: ssl/s3_srvr.c
  +
  +$ cvs diff -u -r1.104 -r1.105 s3_srvr.c
  +--- ssl/s3_srvr.c28 Feb 2003 15:37:10 -  1.104
   ssl/s3_srvr.c19 Mar 2003 19:19:53 -  1.105
  +@@ -1684,7 +1684,7 @@
  + if (i != SSL_MAX_MASTER_KEY_LENGTH)
  + {
  + al=SSL_AD_DECODE_ERROR;
  +-
SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_RSA_DECRYPT);
  ++/* 
SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_RSA_DECRYPT); */
  + }
  + 
  + if ((al == -1)  !((p[0] == (s-client_version8))  (p[1] == 
(s-client_version  0xff
  +@@ -1700,30 +1700,29 @@
  + (p[0] == (s-version8))  (p[1] == (s-version  
0xff
  + {
  + al=SSL_AD_DECODE_ERROR;
  +-
SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_PROTOCOL_VERSION_NUMBER);
  +-goto f_err;
  ++/* 
SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_PROTOCOL_VERSION_NUMBER); */
  ++
  ++/* The Klima-Pokorny-Rosa extension of 
Bleichenbacher's attack
  ++ * (http://eprint.iacr.org/2003/052/) exploits the 
version
  ++ * number check as a bad version oracle -- an alert 
would
  ++ * reveal that the plaintext corresponding to some 
ciphertext
  ++ * made up by the adversary is properly formatted 
except
  ++ * that the version number is wrong.  To avoid such 
attacks,
  ++ * we should treat this just like any other decryption 
error. */
  ++p[0] = (char)(int) CAN-2003-0131 patch 2003-03-20;
  + }
  + }
  + 
  + if (al != -1)
  + {
  +-#if 0
  +-goto f_err;
  +-#else
  + /* Some decryption failure -- use random value instead as 
countermeasure
  +  * against Bleichenbacher's attack on PKCS #1 v1.5 RSA padding
  +- * (see RFC 2246, section 7.4.7.1).
  +- * But note that due to length and protocol version checking, 
the
  +- * attack is impractical anyway (see section 5 in D. 
Bleichenbacher:
  +- * Chosen Ciphertext Attacks Against Protocols Based on the 
RSA
  +- * Encryption Standard PKCS #1, CRYPTO '98, LNCS 1462, pp. 
1-12).
  +- */
  ++ * (see RFC 2246, section 7.4.7.1). */
  + ERR_clear_error();
  + i = SSL_MAX_MASTER_KEY_LENGTH;
  + p[0] = s-client_version  8;
  + p[1] = s-client_version  0xff;
  + RAND_pseudo_bytes(p+2, i-2); /* should be RAND_bytes, but we 
cannot work around a failure */
  +-#endif
  + }
  + 
  + s-session-master_key_length=
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-src/openssl/openssl.spec
  
  $ cvs diff -u -r1.37.2.1.2.4 -r1.37.2.1.2.5 openssl.spec
  --- openpkg-src/openssl/openssl.spec  17 Mar 2003 14:54:13 -  1.37.2.1.2.4
  +++ openpkg-src/openssl/openssl.spec  20 Mar 2003 20:09:39 -  1.37.2.1.2.5
  @@ -33,7 +33,7 @@
   Group:Cryptography
   License:  BSD-style
   

Re: LDAP error compiling postfix

2003-03-20 Thread Michael van Elst
On Thu, Mar 20, 2003, Bill Campbell wrote:

 When I tried building postfix-2.0.7-20030320.src.rpm today with LDAP
 support and openldap-2.1.16-20030315, the linking failed with several
 undefined references including ldap_enable_cache.

openldap has deprecated the client cache interface. Apparently some people
did not notice, not even the openldap people themselves, who still provide
the manual page :-/


-- 
,eM=.a-. Michael van Elst
   dWWMWM -  :GM==;[EMAIL PROTECTED]
  :WWMWMw=--.  W='  cable  wireless
   9WWMm==-.
-Wmw-  CABLE  WIRELESS
__
The OpenPKG Projectwww.openpkg.org
Developer Communication List   [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-web/ security.txt security.wml

2003-03-20 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   20-Mar-2003 21:17:31
  Branch: HEAD Handle: 2003032020173100

  Modified files:
openpkg-web security.txt security.wml

  Log:
link OpenSSL SA into website

  Summary:
RevisionChanges Path
1.32+1  -0  openpkg-web/security.txt
1.48+1  -0  openpkg-web/security.wml
  

  patch -p0 '@@ .'
  Index: openpkg-web/security.txt
  
  $ cvs diff -u -r1.31 -r1.32 security.txt
  --- openpkg-web/security.txt  20 Mar 2003 16:21:59 -  1.31
  +++ openpkg-web/security.txt  20 Mar 2003 20:17:31 -  1.32
  @@ -1,3 +1,4 @@
  +20-Mar-2003: Security Advisory: SOpenPKG-SA-2003.026-openssl
   20-Mar-2003: Security Advisory: SOpenPKG-SA-2003.025-mutt
   19-Mar-2003: Security Advisory: SOpenPKG-SA-2003.024-ircii
   19-Mar-2003: Security Advisory: SOpenPKG-SA-2003.023-delegate
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-web/security.wml
  
  $ cvs diff -u -r1.47 -r1.48 security.wml
  --- openpkg-web/security.wml  20 Mar 2003 16:21:59 -  1.47
  +++ openpkg-web/security.wml  20 Mar 2003 20:17:31 -  1.48
  @@ -78,6 +78,7 @@
   /define-tag
   box bdwidth=1 bdcolor=#a5a095 bdspace=10 bgcolor=#e5e0d5
   table cellspacing=0 cellpadding=0 border=0
  +  sa 2003.026 openssl
 sa 2003.025 mutt
 sa 2003.024 ircii
 sa 2003.023 delegate
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2003.026-openssl.txt p...

2003-03-20 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   20-Mar-2003 21:17:54
  Branch: HEAD Handle: 2003032020175300

  Added files:
openpkg-web/securityOpenPKG-SA-2003.026-openssl.txt
  Modified files:
openpkg-web/securitypage.pl

  Log:
add first cut for OpenSSL SA

  Summary:
RevisionChanges Path
1.1 +103 -0 openpkg-web/security/OpenPKG-SA-2003.026-openssl.txt
1.10+1  -1  openpkg-web/security/page.pl
  

  patch -p0 '@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.026-openssl.txt
  
  $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.026-openssl.txt
  --- /dev/null 2003-03-20 21:17:54.0 +0100
  +++ OpenPKG-SA-2003.026-openssl.txt   2003-03-20 21:17:54.0 +0100
  @@ -0,0 +1,103 @@
  +
  +
  +OpenPKG Security AdvisoryThe OpenPKG Project
  +http://www.openpkg.org/security.html  http://www.openpkg.org
  [EMAIL PROTECTED] [EMAIL PROTECTED]
  +OpenPKG-SA-2003.026  20-Mar-2003
  +
  +
  +Package: openssl
  +Vulnerability:   information leakage
  +OpenPKG Specific:no
  +
  +Affected Releases:   Affected Packages: Corrected Packages:
  +OpenPKG CURRENT  = openssl-0.9.7a-20030317 = openssl-0.9.7a-20030320
  +OpenPKG 1.2  = openssl-0.9.7-1.2.2 = openssl-0.9.7-1.2.3
  +OpenPKG 1.1  = openssl-0.9.6g-1.1.2= openssl-0.9.6g-1.1.3
  +
  +Affected Releases:   Dependent Packages:
  +
  +OpenPKG CURRENT  apache cadaver cpu curl dsniff easysoap ethereal
  + exim fetchmail imap imapd inn linc links lynx mico
  + mixmaster mozilla mutt nail neon openldap openvpn
  + perl-ssl postfix postgresql qpopper samba sendmail
  + siege sio sitecopy socat stunnel subversion sysmon
  + w3m wget
  +
  +OpenPKG 1.2  apache cpu curl ethereal fetchmail imap inn
  + links lynx mico mutt nail neon openldap perl-ssl
  + postfix postgresql qpopper samba sendmail siege
  + sitecopy socat stunnel sysmon w3m wget
  +
  +OpenPKG 1.1  apache curl fetchmail inn links lynx mutt neon
  + openldap perl-ssl postfix postgresql qpopper samba
  + siege sitecopy socat stunnel sysmon w3m
  +
  +Description:
  +  According to an OpenSSL [0] security advisory [1], Czech cryptologists
  +  Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa have come up with an
  +  extension of the Bleichenbacher attack on RSA with PKCS #1 v1.5
  +  padding as used in SSL 3.0 and TLS 1.0. The attack was documented
  +  in their report Attacking RSA-based Sessions in SSL/TLS [2]. The
  +  Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2003-0147 [3] to the problem.
  +  
  +  Their attack requires the attacker to open millions of SSL/TLS
  +  connections to the server under attack. The server's behaviour when
  +  faced with specially made-up RSA ciphertexts can reveal information
  +  that in effect allows the attacker to perform a single RSA private key
  +  operation on a ciphertext of its choice using the server's RSA key.
  +  Note that the server's RSA key is not compromised in this attack.
  +  
  +  Please check whether you are affected by running prefix/bin/rpm -q
  +  openssl. If you have the openssl package installed and its version
  +  is affected (see above), we recommend that you immediately upgrade it
  +  (see Solution) and it's dependent packages (see above), if any, too.
  +  [4][5]
  +
  +Solution:
  +  Select the updated source RPM appropriate for your OpenPKG release
  +  [6][7], fetch it from the OpenPKG FTP service [8][9] or a mirror
  +  location, verify its integrity [10], build a corresponding binary RPM
  +  from it [4] and update your OpenPKG installation by applying the binary
  +  RPM [5]. For the current release OpenPKG 1.2, perform the following
  +  operations to permanently fix the security problem (for other releases
  +  adjust accordingly).
  +
  +  $ ftp ftp.openpkg.org
  +  ftp bin
  +  ftp cd release/1.2/UPD
  +  ftp get openssl-0.9.7-1.2.3.src.rpm
  +  ftp bye
  +  $ prefix/bin/rpm -v --checksig openssl-0.9.7-1.2.3.src.rpm
  +  $ prefix/bin/rpm --rebuild openssl-0.9.7-1.2.3.src.rpm
  +  $ su

[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2003.026-openssl.txt

2003-03-20 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   20-Mar-2003 21:21:13
  Branch: HEAD Handle: 2003032020211300

  Modified files:
openpkg-web/securityOpenPKG-SA-2003.026-openssl.txt

  Log:
final polishing and signing

  Summary:
RevisionChanges Path
1.2 +13 -3  openpkg-web/security/OpenPKG-SA-2003.026-openssl.txt
  

  patch -p0 '@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.026-openssl.txt
  
  $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2003.026-openssl.txt
  --- openpkg-web/security/OpenPKG-SA-2003.026-openssl.txt  20 Mar 2003 20:17:53 
-  1.1
  +++ openpkg-web/security/OpenPKG-SA-2003.026-openssl.txt  20 Mar 2003 20:21:13 
-  1.2
  @@ -1,3 +1,6 @@
  +-BEGIN PGP SIGNED MESSAGE-
  +Hash: SHA1
  +
   
   
   OpenPKG Security AdvisoryThe OpenPKG Project
  @@ -41,14 +44,14 @@
 in their report Attacking RSA-based Sessions in SSL/TLS [2]. The
 Common Vulnerabilities and Exposures (CVE) project assigned the id
 CAN-2003-0147 [3] to the problem.
  -  
  +
 Their attack requires the attacker to open millions of SSL/TLS
 connections to the server under attack. The server's behaviour when
 faced with specially made-up RSA ciphertexts can reveal information
 that in effect allows the attacker to perform a single RSA private key
 operation on a ciphertext of its choice using the server's RSA key.
 Note that the server's RSA key is not compromised in this attack.
  -  
  +
 Please check whether you are affected by running prefix/bin/rpm -q
 openssl. If you have the openssl package installed and its version
 is affected (see above), we recommend that you immediately upgrade it
  @@ -74,7 +77,7 @@
 $ su -
 # prefix/bin/rpm -Fvh prefix/RPM/PKG/openssl-0.9.7-1.2.3.*.rpm
   
  -  Additionally, you have to rebuild and reinstall all dependent 
  +  Additionally, you have to rebuild and reinstall all dependent
 packages (see above), too. [4][5]
   
   
  @@ -101,3 +104,10 @@
   the command gpg --verify --keyserver keyserver.pgp.com.
   
   
  +-BEGIN PGP SIGNATURE-
  +Comment: OpenPKG [EMAIL PROTECTED]
  +
  +iD8DBQE+eiKhgHWT4GPEy58RAqHmAKCc3shS04jp9yf7nidbRICYwPCjlACgwD0B
  +MS3AX0PNpAWSRzlTmGr6nDg=
  +=6fnm
  +-END PGP SIGNATURE-
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-web/security/ page.pl

2003-03-20 Thread Ralf S. Engelschall
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-web  Date:   20-Mar-2003 21:23:28
  Branch: HEAD Handle: 2003032020232800

  Modified files:
openpkg-web/securitypage.pl

  Log:
break at year boundary

  Summary:
RevisionChanges Path
1.11+6  -1  openpkg-web/security/page.pl
  

  patch -p0 '@@ .'
  Index: openpkg-web/security/page.pl
  
  $ cvs diff -u -r1.10 -r1.11 page.pl
  --- openpkg-web/security/page.pl  20 Mar 2003 20:17:53 -  1.10
  +++ openpkg-web/security/page.pl  20 Mar 2003 20:23:28 -  1.11
  @@ -8,11 +8,16 @@
   
   my @SA = glob(OpenPKG-SA-*.txt);
   
  +my $this_year = 2003;
   my $sidebar = 'uSecurity Advisories:/up';
   foreach my $sa (reverse sort @SA) {
  -my ($base, $name) = ($sa =~ m|^(OpenPKG-SA-(.+))\.txt$|);
  +my ($base, $name, $year) = ($sa =~ m|^(OpenPKG-SA-((\d+)\..+))\.txt$|);
   next if ($name =~ m|^|);
   next if ($name =~ m|^2003\.02[7-9]|);
  +if ($this_year ne $year) {
  +$sidebar .= br\n;
  +$this_year = $year;
  +}
   $sidebar .= a href=\$base.html\$name/abr;
   }
   
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


Re: LDAP error compiling postfix

2003-03-20 Thread Bill Campbell
On Thu, Mar 20, 2003 at 09:13:07PM +0100, Michael van Elst wrote:
On Thu, Mar 20, 2003, Bill Campbell wrote:

 When I tried building postfix-2.0.7-20030320.src.rpm today with LDAP
 support and openldap-2.1.16-20030315, the linking failed with several
 undefined references including ldap_enable_cache.

openldap has deprecated the client cache interface. Apparently some people
did not notice, not even the openldap people themselves, who still provide
the manual page :-/

Here's what I got back on the postfix mailing list:

On Thu, 20 Mar 2003, Bill Campbell wrote:

 I ran into some undefined references compiling postfix-2.0.7 with
 openldap-2.1.16.  It links properly with openldap-2.1.12.

 One of the undefined references is ``ldap_enable_cache''.  Diffs between
 the two openldap versions lead me to believe that this and some other
 functions have been dropped from openldap.

 FWIW, I'm building slightly modified SRPMS from openpkg.org (I'm adding
 whoson and LDAP support to their release.


This is a known issue for OpenLDAP 2.1.13 and later. I have provided a
patch to Lamont Jones of HP, who will hopefully release an updated
dict_ldap.c to Wietse in the near future...

For now I would suggest that you stick with OpenLDAP 2.1.12.

-- 
   Viktor.


Bill
--
INTERNET:   [EMAIL PROTECTED]  Bill Campbell; Celestial Software LLC
UUCP:   camco!bill  PO Box 820; 6641 E. Mercer Way
FAX:(206) 232-9186  Mercer Island, WA 98040-0820; (206) 236-1676
URL: http://www.celestial.com/

It is practically impossible to teach good programming style to
students that have had prior exposure to BASIC: as potential
programmers they are mentally mutilated beyond hope of
regeneration.
-- Dijkstra
__
The OpenPKG Projectwww.openpkg.org
Developer Communication List   [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-re/vcheck/ vc.kerberos

2003-03-20 Thread Michael van Elst
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Michael van Elst
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-re   Date:   20-Mar-2003 22:55:56
  Branch: HEAD Handle: 200303202100

  Modified files:
openpkg-re/vcheck   vc.kerberos

  Log:
upgrade 1.2.6 - 1.2.7

  Summary:
RevisionChanges Path
1.3 +2  -2  openpkg-re/vcheck/vc.kerberos
  

  patch -p0 '@@ .'
  Index: openpkg-re/vcheck/vc.kerberos
  
  $ cvs diff -u -r1.2 -r1.3 vc.kerberos
  --- openpkg-re/vcheck/vc.kerberos 23 Sep 2002 11:20:27 -  1.2
  +++ openpkg-re/vcheck/vc.kerberos 20 Mar 2003 21:55:55 -  1.3
  @@ -2,7 +2,7 @@
   }
   
   prog kerberos = {
  -  version   = 1.2.6
  -  url   = http://www.crypto-publish.org/mit-kerberos5/index.html
  +  version   = 1.2.7
  +  url   = 
http://www.mirrors.wiretapped.net/security/cryptography/apps/kerberos/krb5-mit/unix/
 regex = krb5-(__VER__)\.tar\.gz
   }
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[CVS] OpenPKG: openpkg-re/vcheck/ vc.powerdns openpkg-src/powerdns/ po...

2003-03-20 Thread Michael van Elst
  OpenPKG CVS Repository
  http://cvs.openpkg.org/
  

  Server: cvs.openpkg.org  Name:   Michael van Elst
  Root:   /e/openpkg/cvs   Email:  [EMAIL PROTECTED]
  Module: openpkg-src openpkg-web openpkg$ Date:   20-Mar-2003 23:27:00
  Branch: HEAD Handle: 2003032022265702

  Modified files:
openpkg-re/vcheck   vc.powerdns
openpkg-src/powerdnspowerdns.spec
openpkg-web news.txt

  Log:
upgrade 2.9.6 - 2.9.7, verbose logging is broken

  Summary:
RevisionChanges Path
1.2 +1  -1  openpkg-re/vcheck/vc.powerdns
1.6 +3  -4  openpkg-src/powerdns/powerdns.spec
1.3749  +1  -0  openpkg-web/news.txt
  

  patch -p0 '@@ .'
  Index: openpkg-re/vcheck/vc.powerdns
  
  $ cvs diff -u -r1.1 -r1.2 vc.powerdns
  --- openpkg-re/vcheck/vc.powerdns 27 Feb 2003 16:25:32 -  1.1
  +++ openpkg-re/vcheck/vc.powerdns 20 Mar 2003 22:26:57 -  1.2
  @@ -2,7 +2,7 @@
   }
   
   prog powerdns = {
  -  version   = 2.9.6
  +  version   = 2.9.7
 url   = http://downloads.powerdns.com/releases/
 regex = pdns-(__VER__)\.tar\.gz
   }
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-src/powerdns/powerdns.spec
  
  $ cvs diff -u -r1.5 -r1.6 powerdns.spec
  --- openpkg-src/powerdns/powerdns.spec12 Mar 2003 22:40:21 -  1.5
  +++ openpkg-src/powerdns/powerdns.spec20 Mar 2003 22:26:59 -  1.6
  @@ -34,8 +34,8 @@
   Distribution: OpenPKG [JUNK]
   Group:unknown
   License:  GPL
  -Version:  2.9.6
  -Release:  20030312
  +Version:  2.9.7
  +Release:  20030320
   
   #   list of sources
   Source0:  http://downloads.powerdns.com/releases/pdns-%{version}.tar.gz
  @@ -129,8 +129,7 @@
   %endif
   --with-modules=$MODULES \
   --with-dynmodules= \
  ---disable-shared \
  ---enable-verbose-logging
  +--disable-shared
%{l_make} %{l_mflags -O} \
   CXXFLAGS=%{l_cxxflags -O} -DDLLIMPORT= -DHAVE_NAMESPACE_STD \
   CPPFLAGS=%{l_cppflags} -DDLLIMPORT= -DHAVE_NAMESPACE_STD
  @@ .
  patch -p0 '@@ .'
  Index: openpkg-web/news.txt
  
  $ cvs diff -u -r1.3748 -r1.3749 news.txt
  --- openpkg-web/news.txt  20 Mar 2003 19:54:07 -  1.3748
  +++ openpkg-web/news.txt  20 Mar 2003 22:26:58 -  1.3749
  @@ -1,3 +1,4 @@
  +20-Mar-2003: Upgraded package: Ppowerdns-2.9.7-20030320
   20-Mar-2003: Upgraded package: Popenssl-0.9.7a-20030320
   20-Mar-2003: Upgraded package: Pxmame-0.66.2-20030320
   20-Mar-2003: Upgraded package: Plibtasn1-0.2.3-20030320
  @@ .
__
The OpenPKG Projectwww.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]


[OpenPKG] Version Tracking Report (2003-03-21 07:19)

2003-03-20 Thread OpenPKG Version Tracker
 OpenPKG Version Tracking Report
 ===

 Reporting Time:2003-03-21 07:19
 Tracking Duration: 0:18:13 (H:M:S)
 Tracking Input:726 sources (495 packages)
 Tracking Result:   702 up-to-date, 6 out-dated, 18 error

 The following 6 sources were determined to be out-dated because newer
 vendor versions were found. Upgrade the corresponding OpenPKG packages.

 - - -
 Package   Old Version   New Version  
 - - -
 gawk  3.1.1 3.1.2
 gcc33 20030310  20030317  [1]
 hevea 2002.09.172003.03.17[2]
 inn   2.3.4 2.3.5
 tidy  030318030319[3]
 vim:patchlevel6.1.410   6.1.411
 - - -
 [1] gcc33: rse: gcc 20030317: internal compiler error: Segmentation fault
 [2] hevea: rse: 2002.11.06 fails: Reference to unbound regexp name `as' at char 1009
 [3] tidy: rse: 030319 broken under build-time

 The following 18 sources could not be successfully checked because
 an error occurred while processing. Keep at least an eye on them.

 - - -
 Package   Old Version   Error
 - - -
 bash:patches  205b-004  2nd connection failed o..
 dia   0.90  2nd connection failed o..
 findutils 4.1.7 regex didn't match (p [1]
 gdk-pixbuf0.19.0connection failed or ti..
 gtk   1.2.102nd connection failed o..
 gtk2  2.2.1 2nd connection failed o..
 imlib 1.9.14connection failed or ti..
 libidl0.8.0 2nd connection failed o..
 linc  1.0.1 2nd connection failed o..
 mixmaster 2.9.0 connection failed or ti..
 nntpcache 3.0.1 connection failed or ti..
 orbit22.6.0 2nd connection failed o..
 qt3.1.2 regex didn't match (pro..
 rdist 7.0.0-alpha10 connection failed or ti..
 rxvt  2.7.9 regex didn't match (pro..
 siege 2.55  connection failed or ti..
 smtpfeed  1.18  connection failed or ti..
 valgrind  1.9.3 regex didn't match (pro..
 - - -
 [1] findutils: rse: after re-organisation on gnu.org, it was not uploaded again

 The remaining 702 sources were successfully determined to be still
 up to date. No action is required on your part. Just be happy ;)

  OpenPKG Version Tracker
  [EMAIL PROTECTED]
__
The OpenPKG Projectwww.openpkg.org
Developer Communication List   [EMAIL PROTECTED]