[CVS] OpenPKG: openpkg-re/ todo.txt
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Michael van Elst Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-re Date: 20-Mar-2003 09:43:51 Branch: HEAD Handle: 2003032008435100 Modified files: openpkg-re todo.txt Log: explain why imapd doesn't build Summary: RevisionChanges Path 1.83+2 -0 openpkg-re/todo.txt patch -p0 '@@ .' Index: openpkg-re/todo.txt $ cvs diff -u -r1.82 -r1.83 todo.txt --- openpkg-re/todo.txt 20 Mar 2003 07:56:29 - 1.82 +++ openpkg-re/todo.txt 20 Mar 2003 08:43:51 - 1.83 @@ -40,6 +40,8 @@ /usr/include/com_right.h:47: redefinition of `struct error_table' acap_err.c: In function `initialize_acap_error_table': acap_err.c:28: warning: implicit declaration of function `init_error_table' + INFO: this is not a problem within imapd but a conflict between + freebsd and the kerberos package. o imapd: companion package sieve perlsieve @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
Re: [CVS] OpenPKG: openpkg-re/ openpkg-dev
On Thu, Mar 20, 2003, Ralf S. Engelschall wrote: On Wed, Mar 19, 2003, Thomas Lotterer wrote: effect a compromise between error and create for nonexisting packages: create on enter, cleanup on leave if empty I would be even more radical: remove all files there which are older than 1 day. It's a temporary area while working with packages. Anything older than 1 day can be safely removed IMHO. This would require some find/rm combination and that's in fact what i started with. However, after some testing i found no portable, safe and fool-proof way to detect if a directory is empty or contains just junk and the path does not point to some dangerous (errornous) directory like '/' so i went back a step and replaced a still unsafe screen-sized code snipped with a single rmdir line. Deleting files is probably too much magic anyway, so i assume the best we can do is to provide some cleanup function with a -dry option, of course. -- [EMAIL PROTECTED] Development Team, Operations Northern Europe, Cable Wireless __ The OpenPKG Projectwww.openpkg.org Developer Communication List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-re/ todo.txt
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-re Date: 20-Mar-2003 12:08:53 Branch: HEAD Handle: 2003032011085200 Modified files: openpkg-re todo.txt Log: cyclic requirement between perl-www/URI.pm and perl-xml/SOAP/Lite.pm Summary: RevisionChanges Path 1.84+5 -0 openpkg-re/todo.txt patch -p0 '@@ .' Index: openpkg-re/todo.txt $ cvs diff -u -r1.83 -r1.84 todo.txt --- openpkg-re/todo.txt 20 Mar 2003 08:43:51 - 1.83 +++ openpkg-re/todo.txt 20 Mar 2003 11:08:52 - 1.84 @@ -80,6 +80,11 @@ openpkg: %define versionof() %(%{l_prefix}/bin/rpm -q --qf '%{VERSION}' %1) perl-xxx: PreReq: perl = %{versionof perl} + o cyclic requirement: %{l_prefix}/lib/perl/site_perl/5.8.0/SOAP/Lite.pm + from perl-xml requires URI.pm which comes with perl-www. Besides the + fact that it is overkill to install perl-www just to get URI.pm, + perl-www requires perl-xml. + o macro expansion issue: a macro should have the ability to determine the current RPM operation (query, build, install). It is for instance required for %integrity which currently complains under e.g. -qpi. Additionally it is required to @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/kerberos/ kerberos.spec openpkg-web/ news.t...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Michael van Elst Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web Date: 20-Mar-2003 12:37:06 Branch: HEAD Handle: 2003032011370402 Modified files: openpkg-src/kerberoskerberos.spec openpkg-web news.txt Log: MITKRB5-SA-2003-003, MITKRB5-SA-2003-004 Summary: RevisionChanges Path 1.13+7 -2 openpkg-src/kerberos/kerberos.spec 1.3734 +1 -0 openpkg-web/news.txt patch -p0 '@@ .' Index: openpkg-src/kerberos/kerberos.spec $ cvs diff -u -r1.12 -r1.13 kerberos.spec --- openpkg-src/kerberos/kerberos.spec5 Mar 2003 15:35:53 - 1.12 +++ openpkg-src/kerberos/kerberos.spec20 Mar 2003 11:37:06 - 1.13 @@ -33,10 +33,11 @@ Group:Cryptography License: MIT Version: 1.2.6 -Release: 20030305 +Release: 20030320 # list of sources Source0: http://www.crypto-publish.org/dist/mit-kerberos5/krb5-%{version}.tar.gz +Source1: http://web.mit.edu/kerberos/www/advisories/2003-004-krb4_patchkit.tar.gz Patch0: kerberos.patch # build information @@ -57,6 +58,10 @@ %prep %setup -q -n krb5-%{version} +%setup -q -n krb5-%{version} -D -a 1 +( cd src + %{l_patch} -p0 ../2003-004-krb4_patchkit/patch.%{version} +) || exit 1 %patch -p1 %build @@ -73,7 +78,7 @@ rm -rf $RPM_BUILD_ROOT ( cd src %{l_make} %{l_mflags} install DESTDIR=$RPM_BUILD_ROOT -) +) || exit 1 rm -rf $RPM_BUILD_ROOT%{l_prefix}/share/gnats strip $RPM_BUILD_ROOT%{l_prefix}/bin/* /dev/null 21 || true %{l_rpmtool} files -v -ofiles -r$RPM_BUILD_ROOT %{l_files_std} @@ . patch -p0 '@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.3733 -r1.3734 news.txt --- openpkg-web/news.txt 19 Mar 2003 18:45:50 - 1.3733 +++ openpkg-web/news.txt 20 Mar 2003 11:37:04 - 1.3734 @@ -1,3 +1,4 @@ +20-Mar-2003: Upgraded package: Pkerberos-1.2.6-20030320 19-Mar-2003: Upgraded package: Ptidy-20030318-20030319 19-Mar-2003: Upgraded package: Pcvsps-2.0b5-20030319 19-Mar-2003: Upgraded package: Psipcalc-1.1.2-20030319 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/kerberos/ kerberos.spec openpkg-web/ news.t...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Michael van Elst Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web Date: 20-Mar-2003 12:48:35 Branch: HEAD Handle: 2003032011483301 Modified files: openpkg-src/kerberoskerberos.spec openpkg-web news.txt Log: upgrade kerberos 1.2.6 - 1.2.7 Summary: RevisionChanges Path 1.14+2 -2 openpkg-src/kerberos/kerberos.spec 1.3735 +1 -0 openpkg-web/news.txt patch -p0 '@@ .' Index: openpkg-src/kerberos/kerberos.spec $ cvs diff -u -r1.13 -r1.14 kerberos.spec --- openpkg-src/kerberos/kerberos.spec20 Mar 2003 11:37:06 - 1.13 +++ openpkg-src/kerberos/kerberos.spec20 Mar 2003 11:48:34 - 1.14 @@ -32,11 +32,11 @@ Distribution: OpenPKG [PLUS] Group:Cryptography License: MIT -Version: 1.2.6 +Version: 1.2.7 Release: 20030320 # list of sources -Source0: http://www.crypto-publish.org/dist/mit-kerberos5/krb5-%{version}.tar.gz +Source0: http://www.mirrors.wiretapped.net/security/cryptography/apps/kerberos/krb5-mit/unix/krb5-%{version}.tar.gz Source1: http://web.mit.edu/kerberos/www/advisories/2003-004-krb4_patchkit.tar.gz Patch0: kerberos.patch @@ . patch -p0 '@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.3734 -r1.3735 news.txt --- openpkg-web/news.txt 20 Mar 2003 11:37:04 - 1.3734 +++ openpkg-web/news.txt 20 Mar 2003 11:48:33 - 1.3735 @@ -1,3 +1,4 @@ +20-Mar-2003: Upgraded package: Pkerberos-1.2.7-20030320 20-Mar-2003: Upgraded package: Pkerberos-1.2.6-20030320 19-Mar-2003: Upgraded package: Ptidy-20030318-20030319 19-Mar-2003: Upgraded package: Pcvsps-2.0b5-20030319 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-re/vcheck/ vc.postfix openpkg-src/postfix/ post...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web openpkg$ Date: 20-Mar-2003 15:05:37 Branch: HEAD Handle: 2003032014053402 Modified files: openpkg-re/vcheck vc.postfix openpkg-src/postfix postfix.spec openpkg-web news.txt Log: upgrading package: postfix 2.0.6 - 2.0.7 Summary: RevisionChanges Path 1.39+1 -1 openpkg-re/vcheck/vc.postfix 1.122 +2 -2 openpkg-src/postfix/postfix.spec 1.3736 +1 -0 openpkg-web/news.txt patch -p0 '@@ .' Index: openpkg-re/vcheck/vc.postfix $ cvs diff -u -r1.38 -r1.39 vc.postfix --- openpkg-re/vcheck/vc.postfix 7 Mar 2003 06:55:16 - 1.38 +++ openpkg-re/vcheck/vc.postfix 20 Mar 2003 14:05:34 - 1.39 @@ -2,7 +2,7 @@ } prog postfix = { - version = 2.0.6 + version = 2.0.7 url = ftp://ftp.porcupine.org/mirrors/postfix-release/official/ regex = postfix-(\d+\.\d+\.\d+)\.tar\.gz } @@ . patch -p0 '@@ .' Index: openpkg-src/postfix/postfix.spec $ cvs diff -u -r1.121 -r1.122 postfix.spec --- openpkg-src/postfix/postfix.spec 12 Mar 2003 13:46:23 - 1.121 +++ openpkg-src/postfix/postfix.spec 20 Mar 2003 14:05:36 - 1.122 @@ -24,7 +24,7 @@ ## # package versions -%define V_postfix 2.0.6 +%define V_postfix 2.0.7 %define V_tls 0.8.13-2.0.6-0.9.7a %define V_pflogsumm1.0.10 @@ -38,7 +38,7 @@ Group:Mail License: IPL Version: %{V_postfix} -Release: 20030312 +Release: 20030320 # package options %option with_tls no @@ . patch -p0 '@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.3735 -r1.3736 news.txt --- openpkg-web/news.txt 20 Mar 2003 11:48:33 - 1.3735 +++ openpkg-web/news.txt 20 Mar 2003 14:05:35 - 1.3736 @@ -1,3 +1,4 @@ +20-Mar-2003: Upgraded package: Ppostfix-2.0.7-20030320 20-Mar-2003: Upgraded package: Pkerberos-1.2.7-20030320 20-Mar-2003: Upgraded package: Pkerberos-1.2.6-20030320 19-Mar-2003: Upgraded package: Ptidy-20030318-20030319 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-re/vcheck/ vc.uvscan openpkg-src/uvscan/ uvscan...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web openpkg$ Date: 20-Mar-2003 15:47:28 Branch: HEAD Handle: 2003032014472602 Modified files: openpkg-re/vcheck vc.uvscan openpkg-src/uvscan uvscan.spec openpkg-web news.txt Log: upgrading package: uvscan 4.1.6.4252 - 4.1.6.4253 Summary: RevisionChanges Path 1.61+1 -1 openpkg-re/vcheck/vc.uvscan 1.70+2 -2 openpkg-src/uvscan/uvscan.spec 1.3737 +1 -0 openpkg-web/news.txt patch -p0 '@@ .' Index: openpkg-re/vcheck/vc.uvscan $ cvs diff -u -r1.60 -r1.61 vc.uvscan --- openpkg-re/vcheck/vc.uvscan 13 Mar 2003 17:13:33 - 1.60 +++ openpkg-re/vcheck/vc.uvscan 20 Mar 2003 14:47:26 - 1.61 @@ -2,7 +2,7 @@ } prog uvscan:datfiles = { - version = 4252 + version = 4253 url = ftp://ftp.nai.com/pub/antivirus/datfiles/4.x/ regex = dat-(\d+).tar } @@ . patch -p0 '@@ .' Index: openpkg-src/uvscan/uvscan.spec $ cvs diff -u -r1.69 -r1.70 uvscan.spec --- openpkg-src/uvscan/uvscan.spec13 Mar 2003 17:13:37 - 1.69 +++ openpkg-src/uvscan/uvscan.spec20 Mar 2003 14:47:28 - 1.70 @@ -27,7 +27,7 @@ %define V_engine 4.1.6 %define V_engine_dist1 4.16 %define V_engine_dist2 416 -%define V_datfiles 4252 +%define V_datfiles 4253 # package information Name: uvscan @@ -39,7 +39,7 @@ Group:Filesystem License: Commercial/Free-Trial Version: %{V_engine}.%{V_datfiles} -Release: 20030313 +Release: 20030320 # list of sources Source0: ftp://ftp.nai.com/pub/antivirus/datfiles/4.x/dat-%{V_datfiles}.tar @@ . patch -p0 '@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.3736 -r1.3737 news.txt --- openpkg-web/news.txt 20 Mar 2003 14:05:35 - 1.3736 +++ openpkg-web/news.txt 20 Mar 2003 14:47:27 - 1.3737 @@ -1,3 +1,4 @@ +20-Mar-2003: Upgraded package: Puvscan-4.1.6.4253-20030320 20-Mar-2003: Upgraded package: Ppostfix-2.0.7-20030320 20-Mar-2003: Upgraded package: Pkerberos-1.2.7-20030320 20-Mar-2003: Upgraded package: Pkerberos-1.2.6-20030320 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-re/vcheck/ vc.perl-tk openpkg-src/perl-tk/ perl...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web openpkg$ Date: 20-Mar-2003 15:57:21 Branch: HEAD Handle: 2003032014571704 Modified files: openpkg-re/vcheck vc.perl-tk openpkg-src/perl-tk perl-tk.spec openpkg-web news.txt Log: upgrading package: perl-tk 20030123 - 20030320 Summary: RevisionChanges Path 1.10+3 -3 openpkg-re/vcheck/vc.perl-tk 1.18+5 -5 openpkg-src/perl-tk/perl-tk.spec 1.3738 +1 -0 openpkg-web/news.txt patch -p0 '@@ .' Index: openpkg-re/vcheck/vc.perl-tk $ cvs diff -u -r1.9 -r1.10 vc.perl-tk --- openpkg-re/vcheck/vc.perl-tk 14 Jan 2003 08:44:24 - 1.9 +++ openpkg-re/vcheck/vc.perl-tk 20 Mar 2003 14:57:17 - 1.10 @@ -17,7 +17,7 @@ regex = Tk-CheckbuttonGroup-(__VER__)\.tgz } prog perl-tk:Tk-CollapsableFrame = { - version = 1.0 + version = 1.1 url = http://www.cpan.org/modules/by-module/Tk/ regex = Tk-CollapsableFrame-(__VER__)\.tar\.gz } @@ -32,7 +32,7 @@ regex = Tk-DateEntry-(__VER__)\.tar\.gz } prog perl-tk:Tk-ExecuteCommand = { - version = 1.2 + version = 1.4 url = http://www.cpan.org/modules/by-module/Tk/ regex = Tk-ExecuteCommand-(__VER__)\.tar\.gz } @@ -67,7 +67,7 @@ regex = Tk-JPEG-(__VER__)\.tar\.gz } prog perl-tk:Tk-LCD = { - version = 1.1 + version = 1.2 url = http://www.cpan.org/modules/by-module/Tk/ regex = Tk-LCD-(__VER__)\.tar\.gz } @@ . patch -p0 '@@ .' Index: openpkg-src/perl-tk/perl-tk.spec $ cvs diff -u -r1.17 -r1.18 perl-tk.spec --- openpkg-src/perl-tk/perl-tk.spec 23 Jan 2003 14:20:07 - 1.17 +++ openpkg-src/perl-tk/perl-tk.spec 20 Mar 2003 14:57:21 - 1.18 @@ -30,16 +30,16 @@ %define V_tk_png 2.005 %define V_tk_canvasfig 1.014 %define V_tk_checkbuttongroup 0.2.1 -%define V_tk_collapsableframe 1.0 +%define V_tk_collapsableframe 1.1 %define V_tk_date 0.40 %define V_tk_dateentry 1.35 -%define V_tk_executecommand1.2 +%define V_tk_executecommand1.4 %define V_tk_gbarr 2.06 %define V_tk_graph 0.06 %define V_tk_histentry 0.40 %define V_tk_jcombobox 0.02 %define V_tk_ipentry 0.03 -%define V_tk_lcd 1.1 +%define V_tk_lcd 1.2 %define V_tk_mdi 0.2 %define V_tk_progressbarmac1.1 %define V_tk_multi 1.004 @@ -64,8 +64,8 @@ Distribution: OpenPKG [BASE] Group:Language License: GPL/Artistic -Version: 20030123 -Release: 20030123 +Version: 20030320 +Release: 20030320 # list of sources Source0: http://www.cpan.org/modules/by-module/Tk/Tk-%{V_tk}.tar.gz @@ . patch -p0 '@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.3737 -r1.3738 news.txt --- openpkg-web/news.txt 20 Mar 2003 14:47:27 - 1.3737 +++ openpkg-web/news.txt 20 Mar 2003 14:57:19 - 1.3738 @@ -1,3 +1,4 @@ +20-Mar-2003: Upgraded package: Pperl-tk-20030320-20030320 20-Mar-2003: Upgraded package: Puvscan-4.1.6.4253-20030320 20-Mar-2003: Upgraded package: Ppostfix-2.0.7-20030320 20-Mar-2003: Upgraded package: Pkerberos-1.2.7-20030320 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: OPENPKG_1_2_SOLID: openpkg-src/mutt/ mutt.patch mutt.sp...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 20-Mar-2003 16:07:00 Branch: OPENPKG_1_2_SOLIDHandle: 2003032015065900 Added files: (Branch: OPENPKG_1_2_SOLID) openpkg-src/muttmutt.patch Modified files: (Branch: OPENPKG_1_2_SOLID) openpkg-src/muttmutt.spec Log: OpenPKG-SA-2003.025-mutt Summary: RevisionChanges Path 1.1.2.1 +82 -0 openpkg-src/mutt/mutt.patch 1.41.2.1.2.2+3 -1 openpkg-src/mutt/mutt.spec patch -p0 '@@ .' Index: openpkg-src/mutt/mutt.patch $ cvs diff -u -r0 -r1.1.2.1 mutt.patch --- /dev/null 2003-03-20 16:07:00.0 +0100 +++ mutt.patch2003-03-20 16:07:00.0 +0100 @@ -0,0 +1,82 @@ +http://www.corest.com/common/showdoc.php?idx=310idxseccion=10 + +http://marc.theaimsgroup.com/?l=bugtraqm=104812904712828w=2 +Mutt versions 1.4.1 and 1.5.4 have just been released and will soon +be available from ftp://ftp.mutt.org/mutt/. + +Both versions fix a buffer overflow in mutt's IMAP client code which +was identified by Core Security Technologies, and fixed by Edmund +Grimley Evans. A more detailed advisory will be published by Core +Security. + +ChangeLog +mutt/imap/utf7.c: +From: Edmund GRIMLEY EVANS +Fix a buffer overflow in utf8_to_utf7 + +--- mutt-1.4/browser.c Thu Mar 20 15:22:46 2003 mutt-1.4.1/browser.c Thu Mar 20 15:24:13 2003 +@@ -192,25 +192,27 @@ + break; + + case 'f': ++{ ++ char *s; + #ifdef USE_IMAP + if (folder-ff-imap) +-strfcpy (fn, NONULL(folder-ff-desc), sizeof (fn)); ++s = NONULL (folder-ff-desc); + else + #endif +- strfcpy (fn, folder-ff-name, sizeof(fn)); +- if (folder-ff-st != NULL) +- { +-strcat (fn, S_ISLNK (folder-ff-st-st_mode) ? @ : /* __STRCAT_CHECKED__ */ +-(S_ISDIR (folder-ff-st-st_mode) ? / : +- ((folder-ff-st-st_mode S_IXUSR) != 0 ? * : ))); +- } ++s = NONULL (folder-ff-name); ++ ++ snprintf (fn, sizeof (fn), %s%s, s, ++folder-ff-st ? (S_ISLNK (folder-ff-st-st_mode) ? @ : ++ (S_ISDIR (folder-ff-st-st_mode) ? / : ++ ((folder-ff-st-st_mode S_IXUSR) != 0 ? * : ))) : ); ++ + mutt_format_s (dest, destlen, fmt, fn); + break; +- ++} + case 'F': + if (folder-ff-st != NULL) + { +-sprintf (permission, %c%c%c%c%c%c%c%c%c%c, ++snprintf (permission, sizeof (permission), %c%c%c%c%c%c%c%c%c%c, + S_ISDIR(folder-ff-st-st_mode) ? 'd' : (S_ISLNK(folder-ff-st-st_mode) ? 'l' : '-'), + (folder-ff-st-st_mode S_IRUSR) != 0 ? 'r': '-', + (folder-ff-st-st_mode S_IWUSR) != 0 ? 'w' : '-', +@@ -227,8 +229,8 @@ + else if (folder-ff-imap) + { + /* mark folders with subfolders AND mail */ +-sprintf (permission, IMAP %c, +- (folder-ff-inferiors folder-ff-selectable) ? '+' : ' '); ++snprintf (permission, sizeof (permission), IMAP %c, ++ (folder-ff-inferiors folder-ff-selectable) ? '+' : ' '); + mutt_format_s (dest, destlen, fmt, permission); + } + #endif +--- mutt-1.4/imap/utf7.c Tue Feb 13 23:06:16 2001 mutt-1.4.1/imap/utf7.c Wed Mar 19 22:33:30 2003 +@@ -149,7 +149,11 @@ + int n, i, b = 0, k = 0; + int base64 = 0; + +- p = buf = safe_malloc (u8len * 2 + 1); ++ /* ++ * In the worst case we convert 2 chars to 7 chars. For example: ++ * \x10\x10... - ABA--ABA-- ++ */ ++ p = buf = safe_malloc ((u8len / 2) * 7 + 6); + + while (u8len) + { @@ . patch -p0 '@@ .' Index: openpkg-src/mutt/mutt.spec $ cvs diff -u -r1.41.2.1.2.1 -r1.41.2.1.2.2 mutt.spec --- openpkg-src/mutt/mutt.spec18 Jan 2003 17:21:04 - 1.41.2.1.2.1 +++ openpkg-src/mutt/mutt.spec20 Mar 2003 15:06:59 - 1.41.2.1.2.2 @@ -36,7 +36,7 @@ Group:Mail License: BSD Version: %{V_mutt}i -Release: 1.2.0 +Release: 1.2.1 # build options %option with_comp no @@ -48,6 +48,7 @@ Source2: muttrc Patch0:
[CVS] OpenPKG: OPENPKG_1_1_SOLID: openpkg-src/mysql/ my.cnf
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Michael van Elst Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 20-Mar-2003 16:10:48 Branch: OPENPKG_1_1_SOLIDHandle: 2003032015104700 Modified files: (Branch: OPENPKG_1_1_SOLID) openpkg-src/mysql my.cnf Log: fix socket path Summary: RevisionChanges Path 1.2.2.3 +1 -1 openpkg-src/mysql/my.cnf patch -p0 '@@ .' Index: openpkg-src/mysql/my.cnf $ cvs diff -u -r1.2.2.2 -r1.2.2.3 my.cnf --- openpkg-src/mysql/my.cnf 19 Mar 2003 07:58:40 - 1.2.2.2 +++ openpkg-src/mysql/my.cnf 20 Mar 2003 15:10:47 - 1.2.2.3 @@ -1,7 +1,7 @@ [safe_mysqld] datadir = @l_prefix@/var/mysql -socket = @l_prefix@/var/mysql/mysqld.sock +socket = @l_prefix@/var/mysql/mysql.sock set-variable = [EMAIL PROTECTED]@/var/mysql/mysqld.pid set-variable = max_connections=1000 port = 3306 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2003.025-mutt.txt
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 20-Mar-2003 16:14:35 Branch: HEAD Handle: 2003032015143500 Added files: openpkg-web/securityOpenPKG-SA-2003.025-mutt.txt Log: OpenPKG-SA-2003.025-mutt Summary: RevisionChanges Path 1.1 +71 -0 openpkg-web/security/OpenPKG-SA-2003.025-mutt.txt patch -p0 '@@ .' Index: openpkg-web/security/OpenPKG-SA-2003.025-mutt.txt $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.025-mutt.txt --- /dev/null 2003-03-20 16:14:35.0 +0100 +++ OpenPKG-SA-2003.025-mutt.txt 2003-03-20 16:14:35.0 +0100 @@ -0,0 +1,71 @@ + + +OpenPKG Security AdvisoryThe OpenPKG Project +http://www.openpkg.org/security.html http://www.openpkg.org [EMAIL PROTECTED] [EMAIL PROTECTED] +OpenPKG-SA-2003.025 20-Mar-2003 + + +Package: mutt +Vulnerability: buffer overflow in IMAP client +OpenPKG Specific:no + +Affected Releases: Affected Packages: Corrected Packages: +OpenPKG CURRENT = mutt-1.4i-20030103 = mutt-1.4.1i-20030320 +OpenPKG 1.2 = mutt-1.4i-1.2.0 = mutt-1.4i-1.2.1 +OpenPKG 1.1 = mutt-1.4i-1.1.0 = mutt-1.4i-1.1.1 + +Dependent Packages: none + +Description: + According to a posting on Bugtraq [0] Edmund Grimley Evans fixed a + buffer overflow which exists in the IMAP client code of mutt [1]. The + bug was found by Core Security Technologies [2]. + + Please check whether you are affected by running prefix/bin/rpm -q + mutt. If you have the mutt package installed and its version is + affected (see above), we recommend that you immediately upgrade it + (see Solution). [3][4] + +Solution: + Select the updated source RPM appropriate for your OpenPKG release + [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror + location, verify its integrity [9], build a corresponding binary RPM + from it [3] and update your OpenPKG installation by applying the binary + RPM [4]. For the current release OpenPKG 1.2, perform the following + operations to permanently fix the security problem (for other releases + adjust accordingly). + + $ ftp ftp.openpkg.org + ftp bin + ftp cd release/1.2/UPD + ftp get mutt-1.4i-1.2.1.src.rpm + ftp bye + $ prefix/bin/rpm -v --checksig mutt-1.4i-1.2.1.src.rpm + $ prefix/bin/rpm --rebuild mutt-1.4i-1.2.1.src.rpm + $ su - + # prefix/bin/rpm -Fvh prefix/RPM/PKG/mutt-1.4i-1.2.1.*.rpm + + +References: + [0] http://www.securityfocus.com/archive/1/315679 + [1] http://www.mutt.org/ + [2] http://www.corest.com/common/showdoc.php?idx=310idxseccion=10 + [3] http://www.openpkg.org/tutorial.html#regular-source + [4] http://www.openpkg.org/tutorial.html#regular-binary + [5] ftp://ftp.openpkg.org/release/1.1/UPD/mutt-1.4i-1.1.1.src.rpm + [6] ftp://ftp.openpkg.org/release/1.2/UPD/mutt-1.4i-1.2.1.src.rpm + [7] ftp://ftp.openpkg.org/release/1.1/UPD/ + [8] ftp://ftp.openpkg.org/release/1.2/UPD/ + [9] http://www.openpkg.org/security.html#signature + + +For security reasons, this advisory was digitally signed with +the OpenPGP public key OpenPKG [EMAIL PROTECTED] (ID 63C4CB9F) +of the OpenPKG project which you can find under the official URL +http://www.openpkg.org/openpkg.pgp or on http://keyserver.pgp.com/. To +check the integrity of this advisory, verify its digital signature by +using GnuPG (http://www.gnupg.org/). For instance, pipe this message to +the command gpg --verify --keyserver keyserver.pgp.com. + + @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-re/vcheck/ vc.lyx openpkg-src/lyx/ lyx.spec ope...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web openpkg$ Date: 20-Mar-2003 16:17:42 Branch: HEAD Handle: 2003032015174002 Modified files: openpkg-re/vcheck vc.lyx openpkg-src/lyx lyx.spec openpkg-web news.txt Log: upgrading package: lyx 1.3.0 - 1.3.1 Summary: RevisionChanges Path 1.3 +1 -1 openpkg-re/vcheck/vc.lyx 1.3 +2 -2 openpkg-src/lyx/lyx.spec 1.3739 +1 -0 openpkg-web/news.txt patch -p0 '@@ .' Index: openpkg-re/vcheck/vc.lyx $ cvs diff -u -r1.2 -r1.3 vc.lyx --- openpkg-re/vcheck/vc.lyx 5 Mar 2003 16:24:23 - 1.2 +++ openpkg-re/vcheck/vc.lyx 20 Mar 2003 15:17:40 - 1.3 @@ -2,7 +2,7 @@ } prog lyx = { - version = 1.3.0 + version = 1.3.1 url = ftp://ftp.lyx.org/pub/lyx/stable/ regex = lyx-(__VER__)\.tar\.gz } @@ . patch -p0 '@@ .' Index: openpkg-src/lyx/lyx.spec $ cvs diff -u -r1.2 -r1.3 lyx.spec --- openpkg-src/lyx/lyx.spec 5 Mar 2003 18:51:35 - 1.2 +++ openpkg-src/lyx/lyx.spec 20 Mar 2003 15:17:42 - 1.3 @@ -26,7 +26,7 @@ # FIXME: mlelstv: JUNK because Qt does not yet build # package versions -%define V_lyx1.3.0 +%define V_lyx1.3.1 %define V_xforms 1.0 # package information @@ -39,7 +39,7 @@ Group:Print License: GPL2 Version: %{V_lyx} -Release: 20030305 +Release: 20030320 # list of sources Source0: ftp://ftp.lyx.org/pub/lyx/stable/lyx-%{V_lyx}.tar.gz @@ . patch -p0 '@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.3738 -r1.3739 news.txt --- openpkg-web/news.txt 20 Mar 2003 14:57:19 - 1.3738 +++ openpkg-web/news.txt 20 Mar 2003 15:17:40 - 1.3739 @@ -1,3 +1,4 @@ +20-Mar-2003: Upgraded package: Plyx-1.3.1-20030320 20-Mar-2003: Upgraded package: Pperl-tk-20030320-20030320 20-Mar-2003: Upgraded package: Puvscan-4.1.6.4253-20030320 20-Mar-2003: Upgraded package: Ppostfix-2.0.7-20030320 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: OPENPKG_1_1_SOLID: openpkg-src/mutt/ mutt.patch mutt.sp...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 20-Mar-2003 16:22:06 Branch: OPENPKG_1_1_SOLIDHandle: 2003032015220600 Added files: (Branch: OPENPKG_1_1_SOLID) openpkg-src/muttmutt.patch Modified files: (Branch: OPENPKG_1_1_SOLID) openpkg-src/muttmutt.spec Log: OpenPKG-SA-2003.025-mutt Summary: RevisionChanges Path 1.1.4.1 +82 -0 openpkg-src/mutt/mutt.patch 1.36.2.2+3 -1 openpkg-src/mutt/mutt.spec patch -p0 '@@ .' Index: openpkg-src/mutt/mutt.patch $ cvs diff -u -r0 -r1.1.4.1 mutt.patch --- /dev/null 2003-03-20 16:22:06.0 +0100 +++ mutt.patch2003-03-20 16:22:06.0 +0100 @@ -0,0 +1,82 @@ +http://www.corest.com/common/showdoc.php?idx=310idxseccion=10 + +http://marc.theaimsgroup.com/?l=bugtraqm=104812904712828w=2 +Mutt versions 1.4.1 and 1.5.4 have just been released and will soon +be available from ftp://ftp.mutt.org/mutt/. + +Both versions fix a buffer overflow in mutt's IMAP client code which +was identified by Core Security Technologies, and fixed by Edmund +Grimley Evans. A more detailed advisory will be published by Core +Security. + +ChangeLog +mutt/imap/utf7.c: +From: Edmund GRIMLEY EVANS +Fix a buffer overflow in utf8_to_utf7 + +--- mutt-1.4/browser.c Thu Mar 20 15:22:46 2003 mutt-1.4.1/browser.c Thu Mar 20 15:24:13 2003 +@@ -192,25 +192,27 @@ + break; + + case 'f': ++{ ++ char *s; + #ifdef USE_IMAP + if (folder-ff-imap) +-strfcpy (fn, NONULL(folder-ff-desc), sizeof (fn)); ++s = NONULL (folder-ff-desc); + else + #endif +- strfcpy (fn, folder-ff-name, sizeof(fn)); +- if (folder-ff-st != NULL) +- { +-strcat (fn, S_ISLNK (folder-ff-st-st_mode) ? @ : /* __STRCAT_CHECKED__ */ +-(S_ISDIR (folder-ff-st-st_mode) ? / : +- ((folder-ff-st-st_mode S_IXUSR) != 0 ? * : ))); +- } ++s = NONULL (folder-ff-name); ++ ++ snprintf (fn, sizeof (fn), %s%s, s, ++folder-ff-st ? (S_ISLNK (folder-ff-st-st_mode) ? @ : ++ (S_ISDIR (folder-ff-st-st_mode) ? / : ++ ((folder-ff-st-st_mode S_IXUSR) != 0 ? * : ))) : ); ++ + mutt_format_s (dest, destlen, fmt, fn); + break; +- ++} + case 'F': + if (folder-ff-st != NULL) + { +-sprintf (permission, %c%c%c%c%c%c%c%c%c%c, ++snprintf (permission, sizeof (permission), %c%c%c%c%c%c%c%c%c%c, + S_ISDIR(folder-ff-st-st_mode) ? 'd' : (S_ISLNK(folder-ff-st-st_mode) ? 'l' : '-'), + (folder-ff-st-st_mode S_IRUSR) != 0 ? 'r': '-', + (folder-ff-st-st_mode S_IWUSR) != 0 ? 'w' : '-', +@@ -227,8 +229,8 @@ + else if (folder-ff-imap) + { + /* mark folders with subfolders AND mail */ +-sprintf (permission, IMAP %c, +- (folder-ff-inferiors folder-ff-selectable) ? '+' : ' '); ++snprintf (permission, sizeof (permission), IMAP %c, ++ (folder-ff-inferiors folder-ff-selectable) ? '+' : ' '); + mutt_format_s (dest, destlen, fmt, permission); + } + #endif +--- mutt-1.4/imap/utf7.c Tue Feb 13 23:06:16 2001 mutt-1.4.1/imap/utf7.c Wed Mar 19 22:33:30 2003 +@@ -149,7 +149,11 @@ + int n, i, b = 0, k = 0; + int base64 = 0; + +- p = buf = safe_malloc (u8len * 2 + 1); ++ /* ++ * In the worst case we convert 2 chars to 7 chars. For example: ++ * \x10\x10... - ABA--ABA-- ++ */ ++ p = buf = safe_malloc ((u8len / 2) * 7 + 6); + + while (u8len) + { @@ . patch -p0 '@@ .' Index: openpkg-src/mutt/mutt.spec $ cvs diff -u -r1.36.2.1 -r1.36.2.2 mutt.spec --- openpkg-src/mutt/mutt.spec26 Aug 2002 19:54:18 - 1.36.2.1 +++ openpkg-src/mutt/mutt.spec20 Mar 2003 15:22:06 - 1.36.2.2 @@ -44,7 +44,7 @@ Group:Mail License: BSD Version: %{V_mutt}i -Release: 1.1.0 +Release: 1.1.1 # list of sources Source0: ftp://ftp.mutt.org/pub/mutt/mutt-%{V_mutt}i.tar.gz @@ -52,6 +52,7 @@ Source2: muttrc Patch0:
[CVS] OpenPKG: openpkg-re/vcheck/ vc.emacs openpkg-src/emacs/ emacs.sp...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web openpkg$ Date: 20-Mar-2003 16:29:25 Branch: HEAD Handle: 2003032015292202 Modified files: openpkg-re/vcheck vc.emacs openpkg-src/emacs emacs.spec openpkg-web news.txt Log: upgrading package: emacs 21.2 - 21.3 Summary: RevisionChanges Path 1.3 +1 -1 openpkg-re/vcheck/vc.emacs 1.33+2 -2 openpkg-src/emacs/emacs.spec 1.3740 +1 -0 openpkg-web/news.txt patch -p0 '@@ .' Index: openpkg-re/vcheck/vc.emacs $ cvs diff -u -r1.2 -r1.3 vc.emacs --- openpkg-re/vcheck/vc.emacs18 Mar 2002 08:37:45 - 1.2 +++ openpkg-re/vcheck/vc.emacs20 Mar 2003 15:29:22 - 1.3 @@ -2,7 +2,7 @@ } prog emacs = { - version = 21.2 + version = 21.3 url = ftp://ftp.gnu.org/gnu/emacs/ regex = emacs-(__VER__)\.tar\.gz } @@ . patch -p0 '@@ .' Index: openpkg-src/emacs/emacs.spec $ cvs diff -u -r1.32 -r1.33 emacs.spec --- openpkg-src/emacs/emacs.spec 15 Jan 2003 12:57:36 - 1.32 +++ openpkg-src/emacs/emacs.spec 20 Mar 2003 15:29:24 - 1.33 @@ -32,8 +32,8 @@ Distribution: OpenPKG [BASE] Group:Editor License: GPL -Version: 21.2 -Release: 20030115 +Version: 21.3 +Release: 20030319 # package options %option with_x11 no @@ . patch -p0 '@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.3739 -r1.3740 news.txt --- openpkg-web/news.txt 20 Mar 2003 15:17:40 - 1.3739 +++ openpkg-web/news.txt 20 Mar 2003 15:29:23 - 1.3740 @@ -1,3 +1,4 @@ +20-Mar-2003: Upgraded package: Pemacs-21.3-20030319 20-Mar-2003: Upgraded package: Plyx-1.3.1-20030320 20-Mar-2003: Upgraded package: Pperl-tk-20030320-20030320 20-Mar-2003: Upgraded package: Puvscan-4.1.6.4253-20030320 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: OPENPKG_1_STABLE: openpkg-src/mutt/ mutt.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 20-Mar-2003 16:32:13 Branch: OPENPKG_1_STABLE Handle: 2003032015321200 Modified files: (Branch: OPENPKG_1_STABLE) openpkg-src/muttmutt.spec Log: MFC: OpenPKG-SA-2003.025-mutt; comp/nntp are not yet available Summary: RevisionChanges Path 1.41.2.2+2 -2 openpkg-src/mutt/mutt.spec patch -p0 '@@ .' Index: openpkg-src/mutt/mutt.spec $ cvs diff -u -r1.41.2.1 -r1.41.2.2 mutt.spec --- openpkg-src/mutt/mutt.spec18 Jan 2003 14:13:11 - 1.41.2.1 +++ openpkg-src/mutt/mutt.spec20 Mar 2003 15:32:12 - 1.41.2.2 @@ -24,7 +24,7 @@ ## # package version -%define V_mutt 1.4 +%define V_mutt 1.4.1 # package information Name: mutt @@ -36,7 +36,7 @@ Group:Mail License: BSD Version: %{V_mutt}i -Release: 1.20030103 +Release: 1.20030320 # build options %option with_comp no @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/openpkg-tool/ openpkg-build.pl openpkg-tool...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Michael van Elst Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web Date: 20-Mar-2003 16:33:54 Branch: HEAD Handle: 2003032015335301 Modified files: openpkg-src/openpkg-tool openpkg-build.pl openpkg-tool.spec openpkg-web news.txt Log: Avoid switching (and conflicting) virtual targets on upgrade Summary: RevisionChanges Path 1.63+25 -2 openpkg-src/openpkg-tool/openpkg-build.pl 1.45+2 -2 openpkg-src/openpkg-tool/openpkg-tool.spec 1.3741 +1 -0 openpkg-web/news.txt patch -p0 '@@ .' Index: openpkg-src/openpkg-tool/openpkg-build.pl $ cvs diff -u -r1.62 -r1.63 openpkg-build.pl --- openpkg-src/openpkg-tool/openpkg-build.pl 19 Mar 2003 13:54:10 - 1.62 +++ openpkg-src/openpkg-tool/openpkg-build.pl 20 Mar 2003 15:33:54 - 1.63 @@ -1342,7 +1342,7 @@ my($dep, $env) = @_; my($name,$op,@vers); my($i,$r,$b,$cond,$version); -my($t,$tdef); +my($t,$tdef,$why); ($name, $op, $version) = ($dep-{name}, $dep-{op}, $dep-{val}); @@ -1370,6 +1370,10 @@ $tdef = undef; +# +# search installed target that matches requirement +# use it if we are not upgrading (no -U) +# if ($i (@vers = get_versions($i, $cond))) { foreach (@vers) { $t = $i-{$_}-[0]; @@ -1382,17 +1386,36 @@ } } } + +# +# search target in current build list that matches requirement +# use it if it exists +# if ($b (@vers = get_versions($b, $cond))) { return ($b-{$vers[0]}-[0], 1); } +# +# search target in repository and install it, if it is newer +# than corresponding installed versions +# avoid repository packages that would install 'new' (i.e. +# are not an upgrade of an existing package) +# $t = chose_source($env, $name, undef, $r, get_versions($r, $cond)); if ($t) { -if (!$tdef || target_better($env, $t, $env-{installed})) { +if (!$tdef || ( +$why = target_better($env, $t, $env-{installed}) +$why ne 'new' +)) { return ($t, 0); } } +# +# if nothing is suitable in repository then fall back to +# anything we already have installed but that we skipped +# above to look for upgrades. +# if ($tdef) { return ($tdef, 1); } @@ . patch -p0 '@@ .' Index: openpkg-src/openpkg-tool/openpkg-tool.spec $ cvs diff -u -r1.44 -r1.45 openpkg-tool.spec --- openpkg-src/openpkg-tool/openpkg-tool.spec19 Mar 2003 09:48:38 - 1.44 +++ openpkg-src/openpkg-tool/openpkg-tool.spec20 Mar 2003 15:33:54 - 1.45 @@ -32,8 +32,8 @@ Distribution: OpenPKG [PLUS] Group:Bootstrapping License: GPL -Version: 20030319 -Release: 20030319 +Version: 20030320 +Release: 20030320 # list of sources Source0: openpkg.sh @@ . patch -p0 '@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.3740 -r1.3741 news.txt --- openpkg-web/news.txt 20 Mar 2003 15:29:23 - 1.3740 +++ openpkg-web/news.txt 20 Mar 2003 15:33:53 - 1.3741 @@ -1,3 +1,4 @@ +20-Mar-2003: Upgraded package: Popenpkg-tool-20030320-20030320 20-Mar-2003: Upgraded package: Pemacs-21.3-20030319 20-Mar-2003: Upgraded package: Plyx-1.3.1-20030320 20-Mar-2003: Upgraded package: Pperl-tk-20030320-20030320 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: OPENPKG_1_STABLE: openpkg-src/fsl/ fsl.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 20-Mar-2003 17:10:55 Branch: OPENPKG_1_STABLE Handle: 2003032016105500 Modified files: (Branch: OPENPKG_1_STABLE) openpkg-src/fsl fsl.spec Log: MFC: install fsl-l2tool; upgrading package: fsl 1.0.7 - 1.0.8 Summary: RevisionChanges Path 1.31.2.3+6 -3 openpkg-src/fsl/fsl.spec patch -p0 '@@ .' Index: openpkg-src/fsl/fsl.spec $ cvs diff -u -r1.31.2.2 -r1.31.2.3 fsl.spec --- openpkg-src/fsl/fsl.spec 28 Jan 2003 13:01:35 - 1.31.2.2 +++ openpkg-src/fsl/fsl.spec 20 Mar 2003 16:10:55 - 1.31.2.3 @@ -9,7 +9,7 @@ ## the above copyright notice and this permission notice appear in all ## copies. ## -## THIS SOFTWARE IS PROVIDED AS IS'' AND ANY EXPRESSED OR IMPLIED +## THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED ## WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF ## MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. ## IN NO EVENT SHALL THE AUTHORS AND COPYRIGHT HOLDERS AND THEIR @@ -32,8 +32,8 @@ Distribution: OpenPKG [CORE] Group:System License: MIT-style -Version: 1.0.7 -Release: 1.20030128 +Version: 1.0.8 +Release: 1.20030320 # package options %option with_fsl_debug no @@ -80,6 +80,9 @@ %install rm -rf $RPM_BUILD_ROOT %{l_make} %{l_mflags} install DESTDIR=$RPM_BUILD_ROOT +%{l_shtool} mkdir -f -p -m 755 $RPM_BUILD_ROOT%{l_prefix}/bin +%{l_shtool} install -c -m 755 \ +lib_l2/l2tool $RPM_BUILD_ROOT%{l_prefix}/bin/fsl-l2tool %{l_shtool} mkdir -f -p -m 755 \ $RPM_BUILD_ROOT%{l_prefix}/etc/fsl %{l_shtool} install -c -m 644 \ @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: OPENPKG_1_2_SOLID: openpkg-src/fsl/ fsl.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 20-Mar-2003 17:17:18 Branch: OPENPKG_1_2_SOLIDHandle: 2003032016171800 Modified files: (Branch: OPENPKG_1_2_SOLID) openpkg-src/fsl fsl.spec Log: MFS: install fsl-l2tool; upgrading package: fsl 1.0.7 - 1.0.8 Summary: RevisionChanges Path 1.31.2.1.2.3+6 -3 openpkg-src/fsl/fsl.spec patch -p0 '@@ .' Index: openpkg-src/fsl/fsl.spec $ cvs diff -u -r1.31.2.1.2.2 -r1.31.2.1.2.3 fsl.spec --- openpkg-src/fsl/fsl.spec 28 Jan 2003 13:03:46 - 1.31.2.1.2.2 +++ openpkg-src/fsl/fsl.spec 20 Mar 2003 16:17:18 - 1.31.2.1.2.3 @@ -9,7 +9,7 @@ ## the above copyright notice and this permission notice appear in all ## copies. ## -## THIS SOFTWARE IS PROVIDED AS IS'' AND ANY EXPRESSED OR IMPLIED +## THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED ## WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF ## MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. ## IN NO EVENT SHALL THE AUTHORS AND COPYRIGHT HOLDERS AND THEIR @@ -32,8 +32,8 @@ Distribution: OpenPKG [CORE] Group:System License: MIT-style -Version: 1.0.7 -Release: 1.2.1 +Version: 1.0.8 +Release: 1.2.2 # package options %option with_fsl_debug no @@ -80,6 +80,9 @@ %install rm -rf $RPM_BUILD_ROOT %{l_make} %{l_mflags} install DESTDIR=$RPM_BUILD_ROOT +%{l_shtool} mkdir -f -p -m 755 $RPM_BUILD_ROOT%{l_prefix}/bin +%{l_shtool} install -c -m 755 \ +lib_l2/l2tool $RPM_BUILD_ROOT%{l_prefix}/bin/fsl-l2tool %{l_shtool} mkdir -f -p -m 755 \ $RPM_BUILD_ROOT%{l_prefix}/etc/fsl %{l_shtool} install -c -m 644 \ @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-re/vcheck/ vc.xmame openpkg-src/xmame/ xmame.sp...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web openpkg$ Date: 20-Mar-2003 20:49:00 Branch: HEAD Handle: 2003032019485702 Modified files: openpkg-re/vcheck vc.xmame openpkg-src/xmame xmame.spec openpkg-web news.txt Log: upgrading package: xmame 0.66.1 - 0.66.2 Summary: RevisionChanges Path 1.6 +1 -1 openpkg-re/vcheck/vc.xmame 1.31+2 -2 openpkg-src/xmame/xmame.spec 1.3747 +1 -0 openpkg-web/news.txt patch -p0 '@@ .' Index: openpkg-re/vcheck/vc.xmame $ cvs diff -u -r1.5 -r1.6 vc.xmame --- openpkg-re/vcheck/vc.xmame18 Mar 2003 13:52:32 - 1.5 +++ openpkg-re/vcheck/vc.xmame20 Mar 2003 19:48:57 - 1.6 @@ -2,7 +2,7 @@ } prog xmame = { - version = 0.66.1 + version = 0.66.2 url = http://x.mame.net/xmame-doc-7.html regex = xmame-(__VER__)\.tar\.bz2 } @@ . patch -p0 '@@ .' Index: openpkg-src/xmame/xmame.spec $ cvs diff -u -r1.30 -r1.31 xmame.spec --- openpkg-src/xmame/xmame.spec 18 Mar 2003 13:52:34 - 1.30 +++ openpkg-src/xmame/xmame.spec 20 Mar 2003 19:48:59 - 1.31 @@ -32,8 +32,8 @@ Distribution: OpenPKG [EVAL] Group:Games License: GPL -Version: 0.66.1 -Release: 20030318 +Version: 0.66.2 +Release: 20030320 # list of sources Source0: http://x.mame.net/download/xmame-%{version}.tar.bz2 @@ . patch -p0 '@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.3746 -r1.3747 news.txt --- openpkg-web/news.txt 20 Mar 2003 19:19:33 - 1.3746 +++ openpkg-web/news.txt 20 Mar 2003 19:48:58 - 1.3747 @@ -1,3 +1,4 @@ +20-Mar-2003: Upgraded package: Pxmame-0.66.2-20030320 20-Mar-2003: Upgraded package: Plibtasn1-0.2.3-20030320 20-Mar-2003: Upgraded package: Pmutt-1.4.1i-20030103 20-Mar-2003: Upgraded package: Pcoreutils-4.5.11-20030320 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
LDAP error compiling postfix
When I tried building postfix-2.0.7-20030320.src.rpm today with LDAP support and openldap-2.1.16-20030315, the linking failed with several undefined references including ldap_enable_cache. Compiling against openldap-2.1.12-20030212 worked properly. Looking at diffs between the openldap-2.1.12 and openldap-2.1.16 it appears that some functions have been dropped. This is probably more a postfix issue than openpkg, but I haven't seen anything on the postfix mailing list about LDAP problems recently. Bill -- INTERNET: [EMAIL PROTECTED] Bill Campbell; Celestial Software LLC UUCP: camco!bill PO Box 820; 6641 E. Mercer Way FAX:(206) 232-9186 Mercer Island, WA 98040-0820; (206) 236-1676 URL: http://www.celestial.com/ ``Rightful liberty is unobstructed action according to our will within limits drawn around us by the equal rights of others. I do not add 'within the limits of the law' because law is often but the tyrant's will, and always so when it violates the rights of the individual.'' -Thomas Jefferson __ The OpenPKG Projectwww.openpkg.org Developer Communication List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-re/ openpkg-dev
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-re Date: 20-Mar-2003 20:53:01 Branch: HEAD Handle: 2003032019530100 Modified files: openpkg-re openpkg-dev Log: avoid a sticky HEAD tag Summary: RevisionChanges Path 1.65+5 -1 openpkg-re/openpkg-dev patch -p0 '@@ .' Index: openpkg-re/openpkg-dev $ cvs diff -u -r1.64 -r1.65 openpkg-dev --- openpkg-re/openpkg-dev19 Mar 2003 21:56:24 - 1.64 +++ openpkg-re/openpkg-dev20 Mar 2003 19:53:01 - 1.65 @@ -340,7 +340,11 @@ echo ++ updating to branch ${branch} ( HOME=${OPENPKG_WORK} export HOME - cvs update -r ${branch} + if [ .${branch} = .HEAD ]; then + cvs update -A + else + cvs update -r ${branch} + fi ) } @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/openssl/ openssl.patch openssl.spec openpkg...
Version: 0.9.7a -Release: 20030317 +Release: 20030320 # list of sources Source0: ftp://ftp.openssl.org/source/openssl-%{version}.tar.gz @@ . patch -p0 '@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.3747 -r1.3748 news.txt --- openpkg-web/news.txt 20 Mar 2003 19:48:58 - 1.3747 +++ openpkg-web/news.txt 20 Mar 2003 19:54:07 - 1.3748 @@ -1,3 +1,4 @@ +20-Mar-2003: Upgraded package: Popenssl-0.9.7a-20030320 20-Mar-2003: Upgraded package: Pxmame-0.66.2-20030320 20-Mar-2003: Upgraded package: Plibtasn1-0.2.3-20030320 20-Mar-2003: Upgraded package: Pmutt-1.4.1i-20030103 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: OPENPKG_1_2_SOLID: openpkg-src/openssl/ openssl.patch o...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 20-Mar-2003 21:09:40 Branch: OPENPKG_1_2_SOLIDHandle: 2003032020093900 Modified files: (Branch: OPENPKG_1_2_SOLID) openpkg-src/openssl openssl.patch openssl.spec Log: include OpenSSL security fix (OpenPKG-SA-2003.026-openssl) Summary: RevisionChanges Path 1.7.4.3 +56 -0 openpkg-src/openssl/openssl.patch 1.37.2.1.2.5+1 -1 openpkg-src/openssl/openssl.spec patch -p0 '@@ .' Index: openpkg-src/openssl/openssl.patch $ cvs diff -u -r1.7.4.2 -r1.7.4.3 openssl.patch --- openpkg-src/openssl/openssl.patch 17 Mar 2003 14:54:13 - 1.7.4.2 +++ openpkg-src/openssl/openssl.patch 20 Mar 2003 20:09:39 - 1.7.4.3 @@ -173,3 +173,59 @@ } void RSA_set_default_method(const RSA_METHOD *meth) +Index: ssl/s3_srvr.c + +$ cvs diff -u -r1.104 -r1.105 s3_srvr.c +--- ssl/s3_srvr.c28 Feb 2003 15:37:10 - 1.104 ssl/s3_srvr.c19 Mar 2003 19:19:53 - 1.105 +@@ -1684,7 +1684,7 @@ + if (i != SSL_MAX_MASTER_KEY_LENGTH) + { + al=SSL_AD_DECODE_ERROR; +- SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_RSA_DECRYPT); ++/* SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_RSA_DECRYPT); */ + } + + if ((al == -1) !((p[0] == (s-client_version8)) (p[1] == (s-client_version 0xff +@@ -1700,30 +1700,29 @@ + (p[0] == (s-version8)) (p[1] == (s-version 0xff + { + al=SSL_AD_DECODE_ERROR; +- SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_PROTOCOL_VERSION_NUMBER); +-goto f_err; ++/* SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_PROTOCOL_VERSION_NUMBER); */ ++ ++/* The Klima-Pokorny-Rosa extension of Bleichenbacher's attack ++ * (http://eprint.iacr.org/2003/052/) exploits the version ++ * number check as a bad version oracle -- an alert would ++ * reveal that the plaintext corresponding to some ciphertext ++ * made up by the adversary is properly formatted except ++ * that the version number is wrong. To avoid such attacks, ++ * we should treat this just like any other decryption error. */ ++p[0] = (char)(int) CAN-2003-0131 patch 2003-03-20; + } + } + + if (al != -1) + { +-#if 0 +-goto f_err; +-#else + /* Some decryption failure -- use random value instead as countermeasure + * against Bleichenbacher's attack on PKCS #1 v1.5 RSA padding +- * (see RFC 2246, section 7.4.7.1). +- * But note that due to length and protocol version checking, the +- * attack is impractical anyway (see section 5 in D. Bleichenbacher: +- * Chosen Ciphertext Attacks Against Protocols Based on the RSA +- * Encryption Standard PKCS #1, CRYPTO '98, LNCS 1462, pp. 1-12). +- */ ++ * (see RFC 2246, section 7.4.7.1). */ + ERR_clear_error(); + i = SSL_MAX_MASTER_KEY_LENGTH; + p[0] = s-client_version 8; + p[1] = s-client_version 0xff; + RAND_pseudo_bytes(p+2, i-2); /* should be RAND_bytes, but we cannot work around a failure */ +-#endif + } + + s-session-master_key_length= @@ . patch -p0 '@@ .' Index: openpkg-src/openssl/openssl.spec $ cvs diff -u -r1.37.2.1.2.4 -r1.37.2.1.2.5 openssl.spec --- openpkg-src/openssl/openssl.spec 17 Mar 2003 14:54:13 - 1.37.2.1.2.4 +++ openpkg-src/openssl/openssl.spec 20 Mar 2003 20:09:39 - 1.37.2.1.2.5 @@ -33,7 +33,7 @@ Group:Cryptography License: BSD-style
Re: LDAP error compiling postfix
On Thu, Mar 20, 2003, Bill Campbell wrote: When I tried building postfix-2.0.7-20030320.src.rpm today with LDAP support and openldap-2.1.16-20030315, the linking failed with several undefined references including ldap_enable_cache. openldap has deprecated the client cache interface. Apparently some people did not notice, not even the openldap people themselves, who still provide the manual page :-/ -- ,eM=.a-. Michael van Elst dWWMWM - :GM==;[EMAIL PROTECTED] :WWMWMw=--. W=' cable wireless 9WWMm==-. -Wmw- CABLE WIRELESS __ The OpenPKG Projectwww.openpkg.org Developer Communication List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-web/ security.txt security.wml
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 20-Mar-2003 21:17:31 Branch: HEAD Handle: 2003032020173100 Modified files: openpkg-web security.txt security.wml Log: link OpenSSL SA into website Summary: RevisionChanges Path 1.32+1 -0 openpkg-web/security.txt 1.48+1 -0 openpkg-web/security.wml patch -p0 '@@ .' Index: openpkg-web/security.txt $ cvs diff -u -r1.31 -r1.32 security.txt --- openpkg-web/security.txt 20 Mar 2003 16:21:59 - 1.31 +++ openpkg-web/security.txt 20 Mar 2003 20:17:31 - 1.32 @@ -1,3 +1,4 @@ +20-Mar-2003: Security Advisory: SOpenPKG-SA-2003.026-openssl 20-Mar-2003: Security Advisory: SOpenPKG-SA-2003.025-mutt 19-Mar-2003: Security Advisory: SOpenPKG-SA-2003.024-ircii 19-Mar-2003: Security Advisory: SOpenPKG-SA-2003.023-delegate @@ . patch -p0 '@@ .' Index: openpkg-web/security.wml $ cvs diff -u -r1.47 -r1.48 security.wml --- openpkg-web/security.wml 20 Mar 2003 16:21:59 - 1.47 +++ openpkg-web/security.wml 20 Mar 2003 20:17:31 - 1.48 @@ -78,6 +78,7 @@ /define-tag box bdwidth=1 bdcolor=#a5a095 bdspace=10 bgcolor=#e5e0d5 table cellspacing=0 cellpadding=0 border=0 + sa 2003.026 openssl sa 2003.025 mutt sa 2003.024 ircii sa 2003.023 delegate @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2003.026-openssl.txt p...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 20-Mar-2003 21:17:54 Branch: HEAD Handle: 2003032020175300 Added files: openpkg-web/securityOpenPKG-SA-2003.026-openssl.txt Modified files: openpkg-web/securitypage.pl Log: add first cut for OpenSSL SA Summary: RevisionChanges Path 1.1 +103 -0 openpkg-web/security/OpenPKG-SA-2003.026-openssl.txt 1.10+1 -1 openpkg-web/security/page.pl patch -p0 '@@ .' Index: openpkg-web/security/OpenPKG-SA-2003.026-openssl.txt $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.026-openssl.txt --- /dev/null 2003-03-20 21:17:54.0 +0100 +++ OpenPKG-SA-2003.026-openssl.txt 2003-03-20 21:17:54.0 +0100 @@ -0,0 +1,103 @@ + + +OpenPKG Security AdvisoryThe OpenPKG Project +http://www.openpkg.org/security.html http://www.openpkg.org [EMAIL PROTECTED] [EMAIL PROTECTED] +OpenPKG-SA-2003.026 20-Mar-2003 + + +Package: openssl +Vulnerability: information leakage +OpenPKG Specific:no + +Affected Releases: Affected Packages: Corrected Packages: +OpenPKG CURRENT = openssl-0.9.7a-20030317 = openssl-0.9.7a-20030320 +OpenPKG 1.2 = openssl-0.9.7-1.2.2 = openssl-0.9.7-1.2.3 +OpenPKG 1.1 = openssl-0.9.6g-1.1.2= openssl-0.9.6g-1.1.3 + +Affected Releases: Dependent Packages: + +OpenPKG CURRENT apache cadaver cpu curl dsniff easysoap ethereal + exim fetchmail imap imapd inn linc links lynx mico + mixmaster mozilla mutt nail neon openldap openvpn + perl-ssl postfix postgresql qpopper samba sendmail + siege sio sitecopy socat stunnel subversion sysmon + w3m wget + +OpenPKG 1.2 apache cpu curl ethereal fetchmail imap inn + links lynx mico mutt nail neon openldap perl-ssl + postfix postgresql qpopper samba sendmail siege + sitecopy socat stunnel sysmon w3m wget + +OpenPKG 1.1 apache curl fetchmail inn links lynx mutt neon + openldap perl-ssl postfix postgresql qpopper samba + siege sitecopy socat stunnel sysmon w3m + +Description: + According to an OpenSSL [0] security advisory [1], Czech cryptologists + Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa have come up with an + extension of the Bleichenbacher attack on RSA with PKCS #1 v1.5 + padding as used in SSL 3.0 and TLS 1.0. The attack was documented + in their report Attacking RSA-based Sessions in SSL/TLS [2]. The + Common Vulnerabilities and Exposures (CVE) project assigned the id + CAN-2003-0147 [3] to the problem. + + Their attack requires the attacker to open millions of SSL/TLS + connections to the server under attack. The server's behaviour when + faced with specially made-up RSA ciphertexts can reveal information + that in effect allows the attacker to perform a single RSA private key + operation on a ciphertext of its choice using the server's RSA key. + Note that the server's RSA key is not compromised in this attack. + + Please check whether you are affected by running prefix/bin/rpm -q + openssl. If you have the openssl package installed and its version + is affected (see above), we recommend that you immediately upgrade it + (see Solution) and it's dependent packages (see above), if any, too. + [4][5] + +Solution: + Select the updated source RPM appropriate for your OpenPKG release + [6][7], fetch it from the OpenPKG FTP service [8][9] or a mirror + location, verify its integrity [10], build a corresponding binary RPM + from it [4] and update your OpenPKG installation by applying the binary + RPM [5]. For the current release OpenPKG 1.2, perform the following + operations to permanently fix the security problem (for other releases + adjust accordingly). + + $ ftp ftp.openpkg.org + ftp bin + ftp cd release/1.2/UPD + ftp get openssl-0.9.7-1.2.3.src.rpm + ftp bye + $ prefix/bin/rpm -v --checksig openssl-0.9.7-1.2.3.src.rpm + $ prefix/bin/rpm --rebuild openssl-0.9.7-1.2.3.src.rpm + $ su
[CVS] OpenPKG: openpkg-web/security/ OpenPKG-SA-2003.026-openssl.txt
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 20-Mar-2003 21:21:13 Branch: HEAD Handle: 2003032020211300 Modified files: openpkg-web/securityOpenPKG-SA-2003.026-openssl.txt Log: final polishing and signing Summary: RevisionChanges Path 1.2 +13 -3 openpkg-web/security/OpenPKG-SA-2003.026-openssl.txt patch -p0 '@@ .' Index: openpkg-web/security/OpenPKG-SA-2003.026-openssl.txt $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2003.026-openssl.txt --- openpkg-web/security/OpenPKG-SA-2003.026-openssl.txt 20 Mar 2003 20:17:53 - 1.1 +++ openpkg-web/security/OpenPKG-SA-2003.026-openssl.txt 20 Mar 2003 20:21:13 - 1.2 @@ -1,3 +1,6 @@ +-BEGIN PGP SIGNED MESSAGE- +Hash: SHA1 + OpenPKG Security AdvisoryThe OpenPKG Project @@ -41,14 +44,14 @@ in their report Attacking RSA-based Sessions in SSL/TLS [2]. The Common Vulnerabilities and Exposures (CVE) project assigned the id CAN-2003-0147 [3] to the problem. - + Their attack requires the attacker to open millions of SSL/TLS connections to the server under attack. The server's behaviour when faced with specially made-up RSA ciphertexts can reveal information that in effect allows the attacker to perform a single RSA private key operation on a ciphertext of its choice using the server's RSA key. Note that the server's RSA key is not compromised in this attack. - + Please check whether you are affected by running prefix/bin/rpm -q openssl. If you have the openssl package installed and its version is affected (see above), we recommend that you immediately upgrade it @@ -74,7 +77,7 @@ $ su - # prefix/bin/rpm -Fvh prefix/RPM/PKG/openssl-0.9.7-1.2.3.*.rpm - Additionally, you have to rebuild and reinstall all dependent + Additionally, you have to rebuild and reinstall all dependent packages (see above), too. [4][5] @@ -101,3 +104,10 @@ the command gpg --verify --keyserver keyserver.pgp.com. +-BEGIN PGP SIGNATURE- +Comment: OpenPKG [EMAIL PROTECTED] + +iD8DBQE+eiKhgHWT4GPEy58RAqHmAKCc3shS04jp9yf7nidbRICYwPCjlACgwD0B +MS3AX0PNpAWSRzlTmGr6nDg= +=6fnm +-END PGP SIGNATURE- @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-web/security/ page.pl
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 20-Mar-2003 21:23:28 Branch: HEAD Handle: 2003032020232800 Modified files: openpkg-web/securitypage.pl Log: break at year boundary Summary: RevisionChanges Path 1.11+6 -1 openpkg-web/security/page.pl patch -p0 '@@ .' Index: openpkg-web/security/page.pl $ cvs diff -u -r1.10 -r1.11 page.pl --- openpkg-web/security/page.pl 20 Mar 2003 20:17:53 - 1.10 +++ openpkg-web/security/page.pl 20 Mar 2003 20:23:28 - 1.11 @@ -8,11 +8,16 @@ my @SA = glob(OpenPKG-SA-*.txt); +my $this_year = 2003; my $sidebar = 'uSecurity Advisories:/up'; foreach my $sa (reverse sort @SA) { -my ($base, $name) = ($sa =~ m|^(OpenPKG-SA-(.+))\.txt$|); +my ($base, $name, $year) = ($sa =~ m|^(OpenPKG-SA-((\d+)\..+))\.txt$|); next if ($name =~ m|^|); next if ($name =~ m|^2003\.02[7-9]|); +if ($this_year ne $year) { +$sidebar .= br\n; +$this_year = $year; +} $sidebar .= a href=\$base.html\$name/abr; } @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
Re: LDAP error compiling postfix
On Thu, Mar 20, 2003 at 09:13:07PM +0100, Michael van Elst wrote: On Thu, Mar 20, 2003, Bill Campbell wrote: When I tried building postfix-2.0.7-20030320.src.rpm today with LDAP support and openldap-2.1.16-20030315, the linking failed with several undefined references including ldap_enable_cache. openldap has deprecated the client cache interface. Apparently some people did not notice, not even the openldap people themselves, who still provide the manual page :-/ Here's what I got back on the postfix mailing list: On Thu, 20 Mar 2003, Bill Campbell wrote: I ran into some undefined references compiling postfix-2.0.7 with openldap-2.1.16. It links properly with openldap-2.1.12. One of the undefined references is ``ldap_enable_cache''. Diffs between the two openldap versions lead me to believe that this and some other functions have been dropped from openldap. FWIW, I'm building slightly modified SRPMS from openpkg.org (I'm adding whoson and LDAP support to their release. This is a known issue for OpenLDAP 2.1.13 and later. I have provided a patch to Lamont Jones of HP, who will hopefully release an updated dict_ldap.c to Wietse in the near future... For now I would suggest that you stick with OpenLDAP 2.1.12. -- Viktor. Bill -- INTERNET: [EMAIL PROTECTED] Bill Campbell; Celestial Software LLC UUCP: camco!bill PO Box 820; 6641 E. Mercer Way FAX:(206) 232-9186 Mercer Island, WA 98040-0820; (206) 236-1676 URL: http://www.celestial.com/ It is practically impossible to teach good programming style to students that have had prior exposure to BASIC: as potential programmers they are mentally mutilated beyond hope of regeneration. -- Dijkstra __ The OpenPKG Projectwww.openpkg.org Developer Communication List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-re/vcheck/ vc.kerberos
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Michael van Elst Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-re Date: 20-Mar-2003 22:55:56 Branch: HEAD Handle: 200303202100 Modified files: openpkg-re/vcheck vc.kerberos Log: upgrade 1.2.6 - 1.2.7 Summary: RevisionChanges Path 1.3 +2 -2 openpkg-re/vcheck/vc.kerberos patch -p0 '@@ .' Index: openpkg-re/vcheck/vc.kerberos $ cvs diff -u -r1.2 -r1.3 vc.kerberos --- openpkg-re/vcheck/vc.kerberos 23 Sep 2002 11:20:27 - 1.2 +++ openpkg-re/vcheck/vc.kerberos 20 Mar 2003 21:55:55 - 1.3 @@ -2,7 +2,7 @@ } prog kerberos = { - version = 1.2.6 - url = http://www.crypto-publish.org/mit-kerberos5/index.html + version = 1.2.7 + url = http://www.mirrors.wiretapped.net/security/cryptography/apps/kerberos/krb5-mit/unix/ regex = krb5-(__VER__)\.tar\.gz } @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-re/vcheck/ vc.powerdns openpkg-src/powerdns/ po...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Michael van Elst Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web openpkg$ Date: 20-Mar-2003 23:27:00 Branch: HEAD Handle: 2003032022265702 Modified files: openpkg-re/vcheck vc.powerdns openpkg-src/powerdnspowerdns.spec openpkg-web news.txt Log: upgrade 2.9.6 - 2.9.7, verbose logging is broken Summary: RevisionChanges Path 1.2 +1 -1 openpkg-re/vcheck/vc.powerdns 1.6 +3 -4 openpkg-src/powerdns/powerdns.spec 1.3749 +1 -0 openpkg-web/news.txt patch -p0 '@@ .' Index: openpkg-re/vcheck/vc.powerdns $ cvs diff -u -r1.1 -r1.2 vc.powerdns --- openpkg-re/vcheck/vc.powerdns 27 Feb 2003 16:25:32 - 1.1 +++ openpkg-re/vcheck/vc.powerdns 20 Mar 2003 22:26:57 - 1.2 @@ -2,7 +2,7 @@ } prog powerdns = { - version = 2.9.6 + version = 2.9.7 url = http://downloads.powerdns.com/releases/ regex = pdns-(__VER__)\.tar\.gz } @@ . patch -p0 '@@ .' Index: openpkg-src/powerdns/powerdns.spec $ cvs diff -u -r1.5 -r1.6 powerdns.spec --- openpkg-src/powerdns/powerdns.spec12 Mar 2003 22:40:21 - 1.5 +++ openpkg-src/powerdns/powerdns.spec20 Mar 2003 22:26:59 - 1.6 @@ -34,8 +34,8 @@ Distribution: OpenPKG [JUNK] Group:unknown License: GPL -Version: 2.9.6 -Release: 20030312 +Version: 2.9.7 +Release: 20030320 # list of sources Source0: http://downloads.powerdns.com/releases/pdns-%{version}.tar.gz @@ -129,8 +129,7 @@ %endif --with-modules=$MODULES \ --with-dynmodules= \ ---disable-shared \ ---enable-verbose-logging +--disable-shared %{l_make} %{l_mflags -O} \ CXXFLAGS=%{l_cxxflags -O} -DDLLIMPORT= -DHAVE_NAMESPACE_STD \ CPPFLAGS=%{l_cppflags} -DDLLIMPORT= -DHAVE_NAMESPACE_STD @@ . patch -p0 '@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.3748 -r1.3749 news.txt --- openpkg-web/news.txt 20 Mar 2003 19:54:07 - 1.3748 +++ openpkg-web/news.txt 20 Mar 2003 22:26:58 - 1.3749 @@ -1,3 +1,4 @@ +20-Mar-2003: Upgraded package: Ppowerdns-2.9.7-20030320 20-Mar-2003: Upgraded package: Popenssl-0.9.7a-20030320 20-Mar-2003: Upgraded package: Pxmame-0.66.2-20030320 20-Mar-2003: Upgraded package: Plibtasn1-0.2.3-20030320 @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[OpenPKG] Version Tracking Report (2003-03-21 07:19)
OpenPKG Version Tracking Report === Reporting Time:2003-03-21 07:19 Tracking Duration: 0:18:13 (H:M:S) Tracking Input:726 sources (495 packages) Tracking Result: 702 up-to-date, 6 out-dated, 18 error The following 6 sources were determined to be out-dated because newer vendor versions were found. Upgrade the corresponding OpenPKG packages. - - - Package Old Version New Version - - - gawk 3.1.1 3.1.2 gcc33 20030310 20030317 [1] hevea 2002.09.172003.03.17[2] inn 2.3.4 2.3.5 tidy 030318030319[3] vim:patchlevel6.1.410 6.1.411 - - - [1] gcc33: rse: gcc 20030317: internal compiler error: Segmentation fault [2] hevea: rse: 2002.11.06 fails: Reference to unbound regexp name `as' at char 1009 [3] tidy: rse: 030319 broken under build-time The following 18 sources could not be successfully checked because an error occurred while processing. Keep at least an eye on them. - - - Package Old Version Error - - - bash:patches 205b-004 2nd connection failed o.. dia 0.90 2nd connection failed o.. findutils 4.1.7 regex didn't match (p [1] gdk-pixbuf0.19.0connection failed or ti.. gtk 1.2.102nd connection failed o.. gtk2 2.2.1 2nd connection failed o.. imlib 1.9.14connection failed or ti.. libidl0.8.0 2nd connection failed o.. linc 1.0.1 2nd connection failed o.. mixmaster 2.9.0 connection failed or ti.. nntpcache 3.0.1 connection failed or ti.. orbit22.6.0 2nd connection failed o.. qt3.1.2 regex didn't match (pro.. rdist 7.0.0-alpha10 connection failed or ti.. rxvt 2.7.9 regex didn't match (pro.. siege 2.55 connection failed or ti.. smtpfeed 1.18 connection failed or ti.. valgrind 1.9.3 regex didn't match (pro.. - - - [1] findutils: rse: after re-organisation on gnu.org, it was not uploaded again The remaining 702 sources were successfully determined to be still up to date. No action is required on your part. Just be happy ;) OpenPKG Version Tracker [EMAIL PROTECTED] __ The OpenPKG Projectwww.openpkg.org Developer Communication List [EMAIL PROTECTED]