[Frugalware-git] homepage-ng: news_fr.xml
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=7c93a67b6c942001eac6789f9e2d9e003e56970a commit 7c93a67b6c942001eac6789f9e2d9e003e56970a Author: Michel Hermier [EMAIL PROTECTED] Date: Tue Aug 26 08:23:40 2008 +0200 news_fr.xml * Add the 0.9rc2 news. diff --git a/frugalware/xml/news_fr.xml b/frugalware/xml/news_fr.xml index 8df0fc6..a9edc94 100644 --- a/frugalware/xml/news_fr.xml +++ b/frugalware/xml/news_fr.xml @@ -22,6 +22,99 @@ Example: Mon, 07 Aug 2006 12:34:56 -0600 -- news post + id109/id + titleFrugalware 0.9rc2 (Solaria) released/title + dateTue, 26 Aug 2008 01:02:24 +0200/date + authorMiklos Vajna/author + hidden0/hidden + content![CDATA[ + L'équipe des développeurs de Frugalware est fière de vous a href=/news/109annoncer/a la sortie de Frugalware 0.9rc2, notre deuxième release candidate pour la version stable 0.9.br / + Une liste courte et incomplete des changements depuis la version 0.9rc1:br / + ul + liAméliorations: + ul + liL'éditeur vi par défaut est maintenant elvis à la place de nvi (comme elvis a moins de dépendences)./li + liAjout du support de la crosscompilation à distcc./li + liPlus de 350 autres petits changements./li + /ul + /li + liMise à jours de paquets: + ul + liNoyau Linux 2.6.26 + corrections/li + liGNOME 2.22.3/li + liGit 1.6.0/li + liPlus de 100 autres mise à jour de paquets/li + /ul + /li + liNouveaux paquets: + ul + liPilotes offciel pour les touchpad synaptics de XOrg./li + liUtilitaires pour le système de fichier HFS+./li + li8 nouveau modules drupal/li + liPlus de 20 autres nouveau paquets/li + /ul + /li + /ul + Veuillez vous référer à la Frugalware a href=http://ftp.frugalware.org/pub/frugalware/frugalware-testing/ChangeLog.txt;Testing ChangeLog/a pour plus d'information.br / + Nous avons un a href=http://bugs.frugalware.org/?do=roadmap;planing/a pour les nouvelles fonctionnalités nous prévoyons d'ajouté avant que Solaria soit stable.br / + Téléchargements pour i686:br / + bNOTE/b: Cliquez a href=/docs/install#_choosing_installation_flavorici/a pour avoir plus d'information pour choisir le media dont vous avez besoin pour l'installation.br / + a href=/download/frugalware-testing-iso/fwlive-0.9rc2-i686-full.isolivecd/a, + a href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-net.isonetinstall/a, + a href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-usb.imgusb/a, + a href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-tftp.imgtftp/a, + a href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd1.isocd1/a, + a href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd2.isocd2/a, + a href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd3.isocd3/a, + a href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd4.isocd4/a, + a href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd5.isocd5/a, + a href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd6.isocd6/a, + a href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd7.isocd7/a, + a href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd8.isocd8/a, + a href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd9.isocd9/a, + a href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd10.isocd10/a, + a
[Frugalware-git] frugalware-0.8: git-1.5.6.4-1kalgan1-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=3b2ca975630aee47a79a6fa9b0e6d54e05f653f3 commit 3b2ca975630aee47a79a6fa9b0e6d54e05f653f3 Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 16:00:54 2008 +0200 git-1.5.6.4-1kalgan1-i686 - secfix bump - closes #3305 diff --git a/source/devel-extra/git/FrugalBuild b/source/devel-extra/git/FrugalBuild index f2e24a3..a3dd774 100644 --- a/source/devel-extra/git/FrugalBuild +++ b/source/devel-extra/git/FrugalBuild @@ -8,11 +8,11 @@ USE_DEVEL=${USE_DEVEL:-n} USE_HTMLMAN=${USE_HTMLMAN:-y} pkgname=git -pkgver=1.5.4.3 +pkgver=1.5.6.4 Fuse $USE_DEVEL pkgver=1.5.4.rc5 -pkgrel=1 +pkgrel=1kalgan1 pkgdesc=A fast, scalable, distributed revision control system. -url=http://www.kernel.org/pub/software/scm/git/; +url=http://www.hu.kernel.org/pub/software/scm/git/; depends=('curl=7.16.0' 'openssl' 'perl=5.10.0') backup=(etc/sysconfig/git) makedepends=('asciidoc' 'docbook-xsl=1.73.0-2' 'docbook-xml' 'docbook2x' 'sgml-common' 'xmlto' 'cpio') @@ -66,7 +66,7 @@ build() Fconf make V=1 CLFAGS=$CFLAGS ASCIIDOC8=YesPlease \ ETC_GITCONFIG=/etc/gitconfig DOCBOOK2X_TEXI=docbook2texi \ - all doc info test || return 1 + all doc info || return 1 Fmakeinstall install-doc install-info ETC_GITCONFIG=/etc/gitconfig mandir=/usr/share/man Ffilerel perl/private-Error.pm /usr/lib/perl5/site_perl/current/Error.pm make -C Documentation WEBDOC_DEST=$Fdestdir/usr/share/doc/$pkgname-$pkgver install-webdoc || return 1 ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] homepage-ng: FSA509-firefox
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=62ec266a77a3ab9b4d1b8462f49ed9375d0a51ea commit 62ec266a77a3ab9b4d1b8462f49ed9375d0a51ea Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 16:15:44 2008 +0200 FSA509-firefox diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index e356ab4..a55825c 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,56 @@ fsas fsa + id509/id + date2008-08-26/date + packagefirefox/package + vulnerable2.0.0.14-1kalgan1/vulnerable + unaffected2.0.0.15-1kalgan1/unaffected + btshttp://bugs.frugalware.org/task/3202/bts + cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2800 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2801 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2805 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2806 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2808 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2809 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2810 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811/cve + descSome vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, disclose sensitive information, or potentially compromise a user's system. + 1) Multiple errors in the layout and JavaScript engines can be exploited to corrupt memory. + 2) An error in the handling of unprivileged XUL documents can be exploited to load Chrome scripts from a fastload file via script elements. + 3) An error in the mozIJSSubScriptLoader.LoadScript() function can be exploited to bypass XPCNativeWrappers and run arbitrary code with Chrome privileges. + Successful exploitation requires that an add-on using the affected function is installed. + 4) An error in the block reflow process can be exploited to cause a crash or potentially execute arbitrary code. + 5) An error in the processing of file URLs contained within local directory listings can potentially be exploited to execute malicious JavaScript content. + 6) Multiple errors in the implementation of the JavaScript same origin policy can be exploited to execute arbitrary script code in the context of a different domain. + 7) Multiple errors in the verification of signed JAR files can be exploited to execute arbitrary JavaScript code with the privileges of the JAR's signer. + 8) An error in the implementation of file upload forms can be exploited to upload arbitrary local files to a remote webserver via specially crafted DOM Range and originalTarget elements. + 9) An error in the Java LiveConnect implementation on Mac OS X can be exploited to establish arbitrary socket connections. + 10) An uninitialized memory access in the processing of improperly encoded .properties files can potentially be exploited to disclose sensitive memory via an add-on using the malformed file. + 11) An error in the processing of Alt Names provided by peer trusted certificates can be exploited to conduct spoofing attacks. + 12) An error in the processing of Windows URL shortcuts can be exploited to run a remote site as a local file./desc + /fsa + fsa + id508/id + date2008-08-16/date + packagepostfix/package + vulnerable2.4.6-1/vulnerable + unaffected2.4.7-1kalgan1/unaffected + btshttp://bugs.frugalware.org/task/3296/bts + cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937/cve + descSebastian Krahmer has reported some security issues in Postfix, which can be exploited by malicious, local users to disclose potentially sensitive information and perform certain actions with escalated privileges. + 1) A
[Frugalware-git] homepage-ng: FSA510-thunderbird
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=927438ac418d1596a2389d642866bf1d9c4c4776 commit 927438ac418d1596a2389d642866bf1d9c4c4776 Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 16:18:11 2008 +0200 FSA510-thunderbird diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index a55825c..4667730 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,21 @@ fsas fsa + id510/id + date2008-08-26/date + packagethunderbird/package + vulnerable2.0.0.14-1kalgan1/vulnerable + unaffected2.0.0.16-1kalgan1/unaffected + btshttp://bugs.frugalware.org/task/3206/bts + cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811/cve + descSome vulnerabilities have been reported in Mozilla Thunderbird, which potentially can be exploited by malicious people to compromise a user's system. + For more information, see FSA509/desc + /fsa + fsa id509/id date2008-08-26/date packagefirefox/package ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] homepage-ng: FSA511-pdns
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=fba3b7ab0719e5f14cb755451a7853203b1bba48 commit fba3b7ab0719e5f14cb755451a7853203b1bba48 Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 16:20:07 2008 +0200 FSA511-pdns diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 4667730..20aec8f 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,17 @@ fsas fsa + id511/id + date2008-08-26/date + packagepdns/package + vulnerable2.9.21-3/vulnerable + unaffected2.9.21.1-1kalgan1/unaffected + btshttp://bugs.frugalware.org/task/3309/bts + cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337/cve + descA weakness has been reported in PowerDNS, which can be exploited by malicious people to conduct spoofing attacks. + The weakness is caused due to the server dropping DNS queries for invalid DNS records within a valid domain. This can be exploited to facilitate the spoofing of the valid domain on third-party DNS servers./desc + /fsa + fsa id510/id date2008-08-26/date packagethunderbird/package ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] homepage-ng: FSA512-amarok
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=4818fdb9e07eefce8584a089546c369b1d76d5ba commit 4818fdb9e07eefce8584a089546c369b1d76d5ba Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 16:22:34 2008 +0200 FSA512-amarok diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 20aec8f..12e7a17 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,17 @@ fsas fsa + id512/id + date2008-08-26/date + packageamarok/package + vulnerable1.4.8-2/vulnerable + unaffected1.4.10-1kalgan1/unaffected + btshttp://bugs.frugalware.org/task/3312/bts + cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3699/cve + descA security issue has been reported in Amarok, which can be exploited by malicious, local users to perform certain actions with escalated privileges. + The security issue is caused due to the MagnatuneBrowser::listDownloadComplete() function handling temporary files in an insecure manner. This can be exploited via symlink attacks in combination with a race condition to overwrite arbitrary files with the privileges of the user running the application./desc + /fsa + fsa id511/id date2008-08-26/date packagepdns/package ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: docs/security
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=80148288c43197df1b4c43d12b2e3294d5bd30b2 commit 80148288c43197df1b4c43d12b2e3294d5bd30b2 Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 16:24:48 2008 +0200 docs/security fix the order of the steps in the 'How to release an FSA' section diff --git a/docs/security.txt b/docs/security.txt index 448b53b..f2a8968 100644 --- a/docs/security.txt +++ b/docs/security.txt @@ -23,12 +23,12 @@ issue in -stable and releases a new FSA. == How to release an FSA? -. Open the -stable Changelog file of the package. There you can see the - vulnerable and unaffected versions of the package. - . Check if the backport built by syncpkgd is ready (the binary packages should be uploaded for each arch). +. Open the -stable Changelog file of the package. There you can see the + vulnerable and unaffected versions of the package. + . Add a new entry to the frugalware/xml/security.xml file in the homepage-ng repo. ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] homepage-ng: FSA513-git
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=b1ba57161b752174fec92d3b89c0162572cd3f7f commit b1ba57161b752174fec92d3b89c0162572cd3f7f Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 16:29:00 2008 +0200 FSA513-git diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 12e7a17..7b2a285 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,16 @@ fsas fsa + id513/id + date2008-08-26/date + packagegit/package + vulnerable1.5.4.3-1/vulnerable + unaffected1.5.6.4-1kalgan1/unaffected + btshttp://bugs.frugalware.org/task/3305/bts + cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3546/cve + descStack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep./desc + /fsa + fsa id512/id date2008-08-26/date packageamarok/package ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-0.8: ruby-1.8.6-5kalgan1-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=5733f80314861074ae037e6f8e8ad2671e0b7468 commit 5733f80314861074ae037e6f8e8ad2671e0b7468 Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 16:42:16 2008 +0200 ruby-1.8.6-5kalgan1-i686 - update to patchlevel '287' - closes #3300 diff --git a/source/devel/ruby/FrugalBuild b/source/devel/ruby/FrugalBuild index 87d650c..6f537d7 100644 --- a/source/devel/ruby/FrugalBuild +++ b/source/devel/ruby/FrugalBuild @@ -4,8 +4,8 @@ pkgname=ruby pkgver=1.8.6 -pkgextraver=-p111 -pkgrel=4 +pkgextraver=-p287 +pkgrel=5kalgan1 pkgdesc=An object-oriented programming language. url=http://www.ruby-lang.org/; depends=('termcap' 'zlib' 'db=4.6.18' 'readline' 'openssl' 'gdbm') @@ -14,7 +14,7 @@ groups=('devel') archs=('i686' 'x86_64') up2date=lynx -dump http://www.ruby-lang.org/en/downloads/ |grep tar.gz |sed -ne 's/.*y-\(.*\).tar.*/\1/;1p' |sed s/$pkgextraver// source=(ftp://ftp.ruby-lang.org/pub/ruby/ruby-${pkgver}${pkgextraver}.tar.bz2) -sha1sums=('d85d25786e0ce30f8f54f5cfa36968ec0f6b9a5f') +sha1sums=('29b02ccab3c1d6b4a71148ad960e65b5f892fe17') build() { Fbuild --enable-shared --enable-pthread \ ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: ruby-1.8.7-5-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=2dc7c6b923393fa847501ead450264b590813f15 commit 2dc7c6b923393fa847501ead450264b590813f15 Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 17:08:25 2008 +0200 ruby-1.8.7-5-i686 - update to patchlevel '72' - closes #3300 diff --git a/source/devel/ruby/FrugalBuild b/source/devel/ruby/FrugalBuild index 64a1522..9ea7d68 100644 --- a/source/devel/ruby/FrugalBuild +++ b/source/devel/ruby/FrugalBuild @@ -4,9 +4,9 @@ pkgname=ruby pkgver=1.8.7 -pkgpatch=22 +pkgpatch=72 pkgextraver= -pkgrel=4 +pkgrel=5 pkgdesc=An object-oriented programming language. url=http://www.ruby-lang.org/; depends=('termcap' 'zlib' 'db=4.7.25-2' 'readline' 'openssl' 'gdbm') @@ -15,7 +15,7 @@ groups=('devel') archs=('i686' 'x86_64') up2date=lynx -dump http://www.ruby-lang.org/en/downloads/|sed 's/-p$pkgpatch//' |Flasttar source=(ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-${pkgver}-p$pkgpatch.tar.bz2) -sha1sums=('a54e59393f0ca8fcc39f9e23e63a04b1cd4e3b7a') +sha1sums=('462e990a724580e4dfeeac5a271b93f6cfcbf5c7') build() { Fcd ruby-$pkgver-p$pkgpatch ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] homepage-ng: add description about missing FSA508
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=f2e2b72eeca97eab463075a676041278bb3ac696 commit f2e2b72eeca97eab463075a676041278bb3ac696 Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 17:10:55 2008 +0200 add description about missing FSA508 diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 7b2a285..b4141c6 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -107,21 +107,7 @@ 11) An error in the processing of Alt Names provided by peer trusted certificates can be exploited to conduct spoofing attacks. 12) An error in the processing of Windows URL shortcuts can be exploited to run a remote site as a local file./desc /fsa - fsa - id508/id - date2008-08-16/date - packagepostfix/package - vulnerable2.4.6-1/vulnerable - unaffected2.4.7-1kalgan1/unaffected - btshttp://bugs.frugalware.org/task/3296/bts - cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937/cve - descSebastian Krahmer has reported some security issues in Postfix, which can be exploited by malicious, local users to disclose potentially sensitive information and perform certain actions with escalated privileges. - 1) A security issue is caused due to Postfix incorrectly handling symlink files. This can be exploited to e.g. append mail messages to arbitrary files by creating a hardlink to a symlink owned by the root user. - Successful exploitation requires write permission to the mail spool directory, that there is no root mailbox, and users can create a hardlink to a symlink (e.g. Linux 2.x, Solaris, Irix 6.5). - 2) A security issue is caused due to Postfix not correctly checking the ownership of the destination when delivering email. This can be exploited to e.g. disclose emails by creating an insecure mailbox file for other users. - Successful exploitation requires permission to create files within the mail spool directory./desc - /fsa + !-- 508 was the same as 507 by accident. -- fsa id507/id date2008-08-16/date ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-0.8: links-2.1-1kalgan1-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=d2a6c6be269f34ae56ad10e381379af030c09d4c commit d2a6c6be269f34ae56ad10e381379af030c09d4c Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 17:24:56 2008 +0200 links-2.1-1kalgan1-i686 - secfix bump - closes #3272 in stable diff --git a/source/network-extra/links/FrugalBuild b/source/network-extra/links/FrugalBuild index d651e5d..25febf1 100644 --- a/source/network-extra/links/FrugalBuild +++ b/source/network-extra/links/FrugalBuild @@ -2,8 +2,8 @@ # Maintainer: VMiklos [EMAIL PROTECTED] pkgname=links -pkgver=2.1pre33 -pkgrel=1 +pkgver=2.1 +pkgrel=1kalgan1 pkgdesc=A web browser running in both graphics and text mode. url=http://links.twibright.com/; depends=('libpng' 'libjpeg' 'libtiff' 'openssl' 'gpm' 'ncurses') @@ -13,6 +13,6 @@ up2date=lynx -dump $url/download.php|grep Current|sed 's/.* \(.*\)\..*/\1/' source=($url/download/$pkgname-$pkgver.tar.bz2) Fconfopts=$Fconfopts --enable-javascript --enable-graphics --without-x -sha1sums=('0ac2aa7c45f56692751f5a9ab94f3551c38ba846') +sha1sums=('f14617c6bce69a23fd20bd8816e693a789a8c5e4') # optimization OK ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-0.8: apache-2.2.8-2kalgan2-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=0440167e58f731710bf757370cfe9348a4882a12 commit 0440167e58f731710bf757370cfe9348a4882a12 Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 17:33:07 2008 +0200 apache-2.2.8-2kalgan2-i686 - add CVE-2008-2939.patch - closes #3307 diff --git a/source/network/apache/CVE-2008-2939.patch b/source/network/apache/CVE-2008-2939.patch new file mode 100644 index 000..ddf5c6a --- /dev/null +++ b/source/network/apache/CVE-2008-2939.patch @@ -0,0 +1,10 @@ +--- 2.2.x/modules/proxy/mod_proxy_ftp.c2008/08/05 19:00:05 682869 2.2.x/modules/proxy/mod_proxy_ftp.c2008/08/05 19:01:50 682870 +@@ -383,6 +383,7 @@ +c-bucket_alloc)); + } + if (wildcard != NULL) { ++wildcard = ap_escape_html(p, wildcard); + APR_BRIGADE_INSERT_TAIL(out, apr_bucket_pool_create(wildcard, +strlen(wildcard), p, +c-bucket_alloc)); diff --git a/source/network/apache/FrugalBuild b/source/network/apache/FrugalBuild index 3247385..a2d8c1b 100644 --- a/source/network/apache/FrugalBuild +++ b/source/network/apache/FrugalBuild @@ -4,7 +4,7 @@ pkgname=apache pkgver=2.2.8 -pkgrel=2kalgan1 +pkgrel=2kalgan2 pkgdesc=A high performance Unix-based HTTP server (with SSL) url=http://httpd.apache.org/; backup=(etc/httpd/conf/{httpd.conf,ssl.conf,ssl.crt/server.crt,ssl.csr/server.csr,ssl.key/server.key} \ @@ -19,8 +19,8 @@ source=(http://archive.apache.org/dist/httpd/httpd-$pkgver.tar.bz2 \ http://ftp.frugalware.org/pub/other/sources/apache/mkcert.tar.gz \ rc.httpd rc.httpd-hu.po httpd.conf ssl.conf \ README.Frugalware index.html http://frugalware.org/images/frugalware.png \ - CVE-2008-2364.patch) -signatures=($source.asc '' '' '' '' '' '' '' '' '') + CVE-2008-2364.patch CVE-2008-2939.patch) +signatures=($source.asc '' '' '' '' '' '' '' '' '' '') # svn web interface: # http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/ ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-0.8: python-2.5.2-2kalgan2-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=8743fd062258b92c2e0f88d32eaf741cc5ac5d26 commit 8743fd062258b92c2e0f88d32eaf741cc5ac5d26 Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 17:57:04 2008 +0200 python-2.5.2-2kalgan2-i686 - added CVE-2008-2315, CVE-2008-2316, CVE-2008-3142 and CVE-2008-3144 - closes #3286 diff --git a/source/devel/python/CVE-2008-2315.patch b/source/devel/python/CVE-2008-2315.patch new file mode 100644 index 000..19a654b --- /dev/null +++ b/source/devel/python/CVE-2008-2315.patch @@ -0,0 +1,581 @@ +Index: Python-2.5.2/Objects/unicodeobject.c +=== +--- Python-2.5.2.orig/Objects/unicodeobject.c Python-2.5.2/Objects/unicodeobject.c +@@ -240,6 +240,11 @@ PyUnicodeObject *_PyUnicode_New(Py_ssize + return unicode_empty; + } + ++/* Ensure we won't overflow the size. */ ++if (length ((PY_SSIZE_T_MAX / sizeof(Py_UNICODE)) - 1)) { ++return (PyUnicodeObject *)PyErr_NoMemory(); ++} ++ + /* Unicode freelist memory allocation */ + if (unicode_freelist) { + unicode = unicode_freelist; +@@ -1102,6 +1107,9 @@ PyObject *PyUnicode_EncodeUTF7(const Py_ + char * out; + char * start; + ++if (cbAllocated / 5 != size) ++return PyErr_NoMemory(); ++ + if (size == 0) + return PyString_FromStringAndSize(NULL, 0); + +@@ -1700,8 +1708,9 @@ PyUnicode_EncodeUTF16(const Py_UNICODE * + { + PyObject *v; + unsigned char *p; ++Py_ssize_t nsize, bytesize; + #ifdef Py_UNICODE_WIDE +-int i, pairs; ++Py_ssize_t i, pairs; + #else + const int pairs = 0; + #endif +@@ -1724,8 +1733,15 @@ PyUnicode_EncodeUTF16(const Py_UNICODE * + if (s[i] = 0x1) + pairs++; + #endif +-v = PyString_FromStringAndSize(NULL, +-2 * (size + pairs + (byteorder == 0))); ++/* 2 * (size + pairs + (byteorder == 0)) */ ++if (size PY_SSIZE_T_MAX || ++ size PY_SSIZE_T_MAX - pairs - (byteorder == 0)) ++ return PyErr_NoMemory(); ++nsize = (size + pairs + (byteorder == 0)); ++bytesize = nsize * 2; ++if (bytesize / 2 != nsize) ++ return PyErr_NoMemory(); ++v = PyString_FromStringAndSize(NULL, bytesize); + if (v == NULL) + return NULL; + +@@ -2053,6 +2069,11 @@ PyObject *unicodeescape_string(const Py_ + char *p; + + static const char *hexdigit = 0123456789abcdef; ++#ifdef Py_UNICODE_WIDE ++const Py_ssize_t expandsize = 10; ++#else ++const Py_ssize_t expandsize = 6; ++#endif + + /* Initial allocation is based on the longest-possible unichr +escape. +@@ -2068,13 +2089,12 @@ PyObject *unicodeescape_string(const Py_ +escape. + */ + ++if (size (PY_SSIZE_T_MAX - 2 - 1) / expandsize) ++ return PyErr_NoMemory(); ++ + repr = PyString_FromStringAndSize(NULL, + 2 +-#ifdef Py_UNICODE_WIDE +-+ 10*size +-#else +-+ 6*size +-#endif +++ expandsize*size + + 1); + if (repr == NULL) + return NULL; +@@ -2315,12 +2335,16 @@ PyObject *PyUnicode_EncodeRawUnicodeEsca + char *q; + + static const char *hexdigit = 0123456789abcdef; +- + #ifdef Py_UNICODE_WIDE +-repr = PyString_FromStringAndSize(NULL, 10 * size); ++const Py_ssize_t expandsize = 10; + #else +-repr = PyString_FromStringAndSize(NULL, 6 * size); ++const Py_ssize_t expandsize = 6; + #endif ++ ++if (size PY_SSIZE_T_MAX / expandsize) ++ return PyErr_NoMemory(); ++ ++repr = PyString_FromStringAndSize(NULL, expandsize * size); + if (repr == NULL) + return NULL; + if (size == 0) +@@ -4730,6 +4754,11 @@ PyUnicodeObject *pad(PyUnicodeObject *se + return self; + } + ++if (left PY_SSIZE_T_MAX - self-length || ++ right PY_SSIZE_T_MAX - (left + self-length)) { ++PyErr_SetString(PyExc_OverflowError, padded string is too long); ++return NULL; ++} + u = _PyUnicode_New(left + self-length + right); + if (u) { + if (left) +Index: Python-2.5.2/Objects/tupleobject.c +=== +--- Python-2.5.2.orig/Objects/tupleobject.c Python-2.5.2/Objects/tupleobject.c +@@ -60,11 +60,12 @@ PyTuple_New(register Py_ssize_t size) + Py_ssize_t nbytes = size * sizeof(PyObject *); + /* Check for overflow */ + if (nbytes / sizeof(PyObject *) != (size_t)size || +- (nbytes += sizeof(PyTupleObject) - sizeof(PyObject *)) +- = 0) ++ (nbytes PY_SSIZE_T_MAX - sizeof(PyTupleObject) - sizeof(PyObject *))) + { + return PyErr_NoMemory(); + } ++ nbytes += sizeof(PyTupleObject) - sizeof(PyObject *); ++ + op = PyObject_GC_NewVar(PyTupleObject, PyTuple_Type, size); + if (op == NULL) +
[Frugalware-git] frugalware-0.8: libxslt-1.1.22-2kalgan2-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=6ef5f3207cd36ecfe39690e1ab75cdb6067476ba commit 6ef5f3207cd36ecfe39690e1ab75cdb6067476ba Author: Miklos Vajna [EMAIL PROTECTED] Date: Tue Aug 26 18:14:46 2008 +0200 libxslt-1.1.22-2kalgan2-i686 - added CVE-2008-2935.patch - closes #3285 diff --git a/source/lib/libxslt/CVE-2008-2935.patch b/source/lib/libxslt/CVE-2008-2935.patch new file mode 100644 index 000..c9ab232 --- /dev/null +++ b/source/lib/libxslt/CVE-2008-2935.patch @@ -0,0 +1,152 @@ +Index: libexslt/crypto.c +=== +--- libexslt/crypto.c (revision 1479) libexslt/crypto.c (working copy) +@@ -595,11 +595,13 @@ exsltCryptoRc4EncryptFunction (xmlXPathP + int str_len = 0, bin_len = 0, hex_len = 0; + xmlChar *key = NULL, *str = NULL, *padkey = NULL; + xmlChar *bin = NULL, *hex = NULL; ++xsltTransformContextPtr tctxt = NULL; + +-if ((nargs 1) || (nargs 3)) { ++if (nargs != 2) { + xmlXPathSetArityError (ctxt); + return; + } ++tctxt = xsltXPathGetTransformContext(ctxt); + + str = xmlXPathPopString (ctxt); + str_len = xmlUTF8Strlen (str); +@@ -611,7 +613,7 @@ exsltCryptoRc4EncryptFunction (xmlXPathP + } + + key = xmlXPathPopString (ctxt); +-key_len = xmlUTF8Strlen (str); ++key_len = xmlUTF8Strlen (key); + + if (key_len == 0) { + xmlXPathReturnEmptyString (ctxt); +@@ -620,15 +622,33 @@ exsltCryptoRc4EncryptFunction (xmlXPathP + return; + } + +-padkey = xmlMallocAtomic (RC4_KEY_LENGTH); ++padkey = xmlMallocAtomic (RC4_KEY_LENGTH + 1); ++if (padkey == NULL) { ++ xsltTransformError(tctxt, NULL, tctxt-inst, ++ exsltCryptoRc4EncryptFunction: Failed to allocate padkey\n); ++ tctxt-state = XSLT_STATE_STOPPED; ++ xmlXPathReturnEmptyString (ctxt); ++ goto done; ++} ++memset(padkey, 0, RC4_KEY_LENGTH + 1); ++ + key_size = xmlUTF8Strsize (key, key_len); ++if ((key_size RC4_KEY_LENGTH) || (key_size 0)) { ++ xsltTransformError(tctxt, NULL, tctxt-inst, ++ exsltCryptoRc4EncryptFunction: key size too long or key broken\n); ++ tctxt-state = XSLT_STATE_STOPPED; ++ xmlXPathReturnEmptyString (ctxt); ++ goto done; ++} + memcpy (padkey, key, key_size); +-memset (padkey + key_size, '\0', sizeof (padkey)); + + /* encrypt it */ + bin_len = str_len; + bin = xmlStrdup (str); + if (bin == NULL) { ++ xsltTransformError(tctxt, NULL, tctxt-inst, ++ exsltCryptoRc4EncryptFunction: Failed to allocate string\n); ++ tctxt-state = XSLT_STATE_STOPPED; + xmlXPathReturnEmptyString (ctxt); + goto done; + } +@@ -638,6 +658,9 @@ exsltCryptoRc4EncryptFunction (xmlXPathP + hex_len = str_len * 2 + 1; + hex = xmlMallocAtomic (hex_len); + if (hex == NULL) { ++ xsltTransformError(tctxt, NULL, tctxt-inst, ++ exsltCryptoRc4EncryptFunction: Failed to allocate result\n); ++ tctxt-state = XSLT_STATE_STOPPED; + xmlXPathReturnEmptyString (ctxt); + goto done; + } +@@ -670,11 +693,13 @@ exsltCryptoRc4DecryptFunction (xmlXPathP + int str_len = 0, bin_len = 0, ret_len = 0; + xmlChar *key = NULL, *str = NULL, *padkey = NULL, *bin = + NULL, *ret = NULL; ++xsltTransformContextPtr tctxt = NULL; + +-if ((nargs 1) || (nargs 3)) { ++if (nargs != 2) { + xmlXPathSetArityError (ctxt); + return; + } ++tctxt = xsltXPathGetTransformContext(ctxt); + + str = xmlXPathPopString (ctxt); + str_len = xmlUTF8Strlen (str); +@@ -686,7 +711,7 @@ exsltCryptoRc4DecryptFunction (xmlXPathP + } + + key = xmlXPathPopString (ctxt); +-key_len = xmlUTF8Strlen (str); ++key_len = xmlUTF8Strlen (key); + + if (key_len == 0) { + xmlXPathReturnEmptyString (ctxt); +@@ -695,22 +720,51 @@ exsltCryptoRc4DecryptFunction (xmlXPathP + return; + } + +-padkey = xmlMallocAtomic (RC4_KEY_LENGTH); ++padkey = xmlMallocAtomic (RC4_KEY_LENGTH + 1); ++if (padkey == NULL) { ++ xsltTransformError(tctxt, NULL, tctxt-inst, ++ exsltCryptoRc4EncryptFunction: Failed to allocate padkey\n); ++ tctxt-state = XSLT_STATE_STOPPED; ++ xmlXPathReturnEmptyString (ctxt); ++ goto done; ++} ++memset(padkey, 0, RC4_KEY_LENGTH + 1); + key_size = xmlUTF8Strsize (key, key_len); ++if ((key_size RC4_KEY_LENGTH) || (key_size 0)) { ++ xsltTransformError(tctxt, NULL, tctxt-inst, ++ exsltCryptoRc4EncryptFunction: key size too long or key broken\n); ++ tctxt-state = XSLT_STATE_STOPPED; ++ xmlXPathReturnEmptyString (ctxt); ++ goto done; ++} + memcpy (padkey, key, key_size); +-memset (padkey + key_size, '\0', sizeof (padkey)); + + /* decode hex to binary */ + bin_len = str_len; + bin = xmlMallocAtomic (bin_len); ++if (bin == NULL) { ++
[Frugalware-git] frugalware-current: texinfo-4.11-4-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=71644014f9e187ad17c8faf5939d1713b6fce18a commit 71644014f9e187ad17c8faf5939d1713b6fce18a Author: Miklos Vajna [EMAIL PROTECTED] Date: Wed Aug 27 00:17:45 2008 +0200 texinfo-4.11-4-i686 - use Finclude texinfo - this silences the warning about non-existing /usr/info on install diff --git a/source/base/texinfo/FrugalBuild b/source/base/texinfo/FrugalBuild index 495e7c0..9962112 100644 --- a/source/base/texinfo/FrugalBuild +++ b/source/base/texinfo/FrugalBuild @@ -4,7 +4,7 @@ pkgname=texinfo pkgver=4.11 -pkgrel=3 +pkgrel=4 pkgdesc=The GNU info program and utilities url=http://www.gnu.org/software/texinfo/; depends=('ncurses=5.6-4' 'net-tools=1.60-26' 'grep=2.5.3-4' 'sed=4.1.5-3' 'udev=124-2' 'gawk=3.1.6-3') @@ -17,6 +17,7 @@ Fup2gnubz2 source=(http://ftp.gnu.org/pub/gnu/$pkgname/$pkgname-$pkgver.tar.bz2 mkinfodir) sha1sums=('915a42e1278860b0fa64e4ef9d5ad4488d3b23a0' \ 'd744345f082e32af0675a0b9d3287c6b8d4600a7') +Finclude texinfo build() diff --git a/source/base/texinfo/texinfo.install b/source/base/texinfo/texinfo.install deleted file mode 100644 index 766019d..000 --- a/source/base/texinfo/texinfo.install +++ /dev/null @@ -1,25 +0,0 @@ -post_install() -{ - echo -n generating the top-level Info node... - mkinfodir /usr/info /usr/info/dir 2/dev/null - echo done. -} - -post_upgrade() -{ - post_install -} - -pre_remove() -{ - echo -n removing the top-level Info node... - rm -f /usr/info/dir - echo done. -} - -op=$1 -shift - -$op $* - -# vim: ft=sh ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: a2ps-4.14-2-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=ac7410ba08bd5427715c95e9a90f11efbab79244 commit ac7410ba08bd5427715c95e9a90f11efbab79244 Author: Miklos Vajna [EMAIL PROTECTED] Date: Wed Aug 27 00:23:11 2008 +0200 a2ps-4.14-2-i686 - use Finclude texinfo diff --git a/source/apps/a2ps/FrugalBuild b/source/apps/a2ps/FrugalBuild index 9982930..e90f686 100644 --- a/source/apps/a2ps/FrugalBuild +++ b/source/apps/a2ps/FrugalBuild @@ -5,7 +5,7 @@ pkgname=a2ps pkgver=4.14 pkgextraver= -pkgrel=1 +pkgrel=2 pkgdesc=An Any to PostScript filter url=http://www.inf.enst.fr/~demaille/a2ps; depends=('glibc' 'urw-fonts' 'psutils' 'texinfo') @@ -18,6 +18,7 @@ source=(ftp://ftp.gnu.org/gnu/$pkgname/$pkgname-$pkgver.tar.gz \ libtool.patch) sha1sums=('365abbbe4b7128bf70dad16d06e23c5701874852' \ '2cd26284b19f897505b0f344fcd423ab10b76a6f') +Finclude texinfo build() { diff --git a/source/apps/a2ps/a2ps.install b/source/apps/a2ps/a2ps.install deleted file mode 100644 index da40cae..000 --- a/source/apps/a2ps/a2ps.install +++ /dev/null @@ -1,18 +0,0 @@ -post_install() { - echo -n generating the top-level Info node... - mkinfodir /usr/info /usr/info/dir - echo done. -} - -post_upgrade() { - post_install -} - -post_remove() { - post_install -} - -op=$1 -shift - -$op $* ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: grub-0.97-22-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=5b7033462e61182ef525b8b96179b0bce929701f commit 5b7033462e61182ef525b8b96179b0bce929701f Author: Miklos Vajna [EMAIL PROTECTED] Date: Wed Aug 27 00:30:09 2008 +0200 grub-0.97-22-i686 - use Finclude texinfo diff --git a/source/base/grub/FrugalBuild b/source/base/grub/FrugalBuild index 809b7af..f993639 100644 --- a/source/base/grub/FrugalBuild +++ b/source/base/grub/FrugalBuild @@ -3,12 +3,11 @@ pkgname=grub pkgver=0.97 -pkgrel=21 +pkgrel=22 pkgdesc=The GNU GRand Unified Bootloader url=http://www.gnu.org/software/grub/; depends=('texinfo') [ $CARCH == i686 ] depends=([EMAIL PROTECTED] 'ncurses' 'mktemp') -#makedepends=('gfxboot=3.3.22' 'perl-html-parser' 'cpio') [ $CARCH == x86_64 ] makedepends=([EMAIL PROTECTED] 'ncurses' 'mktemp') rodepends=('grub-theme-frugalware' 'os-prober') groups=('base') @@ -30,10 +29,7 @@ sha1sums=('2580626c4579bd99336d3af4482c346c95dac4fb' \ 'adbb4685c98797ffb4dc83561ec75698991dddbd' \ '389913c8b09e5882373e7cb233ecfefb7ad3a3cb' \ '56223e12b2460c3390674158eddfb5a14a2efcc6') - -# Original patch was for Debian at: -# http://neverborn.org/files/grub-gfxboot/source/grub-gfxboot/ and -# http://www.morphix.org/debian/source/grub-gfxboot/ +Finclude texinfo build() { @@ -50,21 +46,13 @@ build() --enable-{epic100,exos205,ni5210,lance,ne2100,ni{50,65}10,natsemi} \ --enable-{ne,ns8390,wd,otulip,rtl8139,sis900,sk-g16,smc9000,tiara} \ --enable-{tulip,via-rhine,w89c840} - Ffilerel stage2/stage2 /usr/lib/grub/i386-pc/stage2.netboot - Ffilerel stage2/{nbgrub,pxegrub} /usr/lib/grub/i386-pc/ + Ffilerel stage2/stage2 /usr/lib/grub/i386-frugalware/stage2.netboot + Ffilerel stage2/{nbgrub,pxegrub} /usr/lib/grub/i386-frugalware/ make clean # the normal build Fmake --bindir=/bin --sbindir=/sbin Fmakeinstall - - # message -# cp -a /usr/share/gfxboot/themes/frugalware ./ -# cd frugalware -# make BINDIR=/usr/sbin/ -# cd boot -# Ffilerel /boot/grub/message } # optimization OK - diff --git a/source/base/grub/grub.install b/source/base/grub/grub.install deleted file mode 100644 index 5a9a9f6..000 --- a/source/base/grub/grub.install +++ /dev/null @@ -1,23 +0,0 @@ -post_install() -{ - echo -n generating the top-level Info node... - mkinfodir /usr/info /usr/info/dir 2/dev/null - echo done. -} - -post_upgrade() -{ - post_install -} - -post_remove() -{ - post_install -} - -op=$1 -shift - -$op $* - -# vim: ft=sh ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: aalib-1.4rc5-4-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=120f987d020329b4047664e3fb908cf980f8bdb9 commit 120f987d020329b4047664e3fb908cf980f8bdb9 Author: Miklos Vajna [EMAIL PROTECTED] Date: Wed Aug 27 00:36:11 2008 +0200 aalib-1.4rc5-4-i686 - use Finclude texinfo diff --git a/source/lib/aalib/FrugalBuild b/source/lib/aalib/FrugalBuild index 58ca532..10d27fc 100644 --- a/source/lib/aalib/FrugalBuild +++ b/source/lib/aalib/FrugalBuild @@ -4,14 +4,14 @@ pkgname=aalib pkgver=1.4rc5 -pkgrel=3 +pkgrel=4 pkgdesc=A portable ascii art graphics library. groups=('lib') archs=('i686' 'x86_64') depends=('glibc' 'gpm=1.20.5-2' 'ncurses') _F_cd_path=$pkgname-1.4.0 _F_sourceforge_dirname=aa-project -Finclude sourceforge +Finclude sourceforge texinfo url=http://aa-project.sourceforge.net/aalib/; up2date=lynx -dump 'http://sourceforge.net/project/showfiles.php?group_id=20003'|grep -m1 'aalib-'|sed 's/.*-\(.*\).t.* .*/\1/' source=([EMAIL PROTECTED] aalib-m4-fix.patch missing-includes.patch) diff --git a/source/lib/aalib/aalib.install b/source/lib/aalib/aalib.install deleted file mode 100644 index 2336955..000 --- a/source/lib/aalib/aalib.install +++ /dev/null @@ -1,18 +0,0 @@ -post_install() { - echo -n generating the top-level Info node... - mkinfodir /usr/info /usr/info/dir 2/dev/null - echo done. -} - -post_upgrade() { - post_install -} - -post_remove() { - post_install -} - -op=$1 -shift - -$op $* ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: glib-1.2.10-6-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=af3c1c97275982aaf7c06fcaa80e5b4764f5e088 commit af3c1c97275982aaf7c06fcaa80e5b4764f5e088 Author: Miklos Vajna [EMAIL PROTECTED] Date: Wed Aug 27 00:37:41 2008 +0200 glib-1.2.10-6-i686 - use Finclude texinfo diff --git a/source/lib/glib/FrugalBuild b/source/lib/glib/FrugalBuild index d8bb16f..1cf86af 100644 --- a/source/lib/glib/FrugalBuild +++ b/source/lib/glib/FrugalBuild @@ -4,7 +4,7 @@ pkgname=glib pkgver=1.2.10 -pkgrel=5 +pkgrel=6 pkgdesc=Common C routines used by Gtk+ and other libs url=http://www.gnome.org/; depends=('glibc') @@ -17,6 +17,7 @@ source=(ftp://ftp.gtk.org/pub/gtk/v$preup2date/$pkgname-$pkgver.tar.gz $pkgname- sha1sums=('e5a9361c594608d152d5d9650154c2e3260b87fa' \ '07bd9ef15c3d4a3d5b6e054d46d4642d5c7f1bed' \ '68cb3f3080db37290d212ddc78757612049d3094') +Finclude texinfo build() { Fcd diff --git a/source/lib/glib/glib.install b/source/lib/glib/glib.install deleted file mode 100644 index bfe624e..000 --- a/source/lib/glib/glib.install +++ /dev/null @@ -1,18 +0,0 @@ -post_install() { - echo -n generating the top-level Info node... - mkinfodir /usr/info /usr/info/dir 2 /dev/null - echo done. -} - -post_upgrade() { - post_install -} - -post_remove() { - post_install -} - -op=$1 -shift - -$op $* ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: libmikmod-3.1.11-8-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=7b1b156e06bcde85941bb880581a46127a947e40 commit 7b1b156e06bcde85941bb880581a46127a947e40 Author: Miklos Vajna [EMAIL PROTECTED] Date: Wed Aug 27 00:40:17 2008 +0200 libmikmod-3.1.11-8-i686 - use Finclude texinfo diff --git a/source/lib/libmikmod/FrugalBuild b/source/lib/libmikmod/FrugalBuild index 36b9bfe..0a4d2c8 100644 --- a/source/lib/libmikmod/FrugalBuild +++ b/source/lib/libmikmod/FrugalBuild @@ -4,7 +4,7 @@ pkgname=libmikmod pkgver=3.1.11 -pkgrel=7 +pkgrel=8 pkgdesc=A module sound player and library url=http://mikmod.raphnet.net/; groups=('lib') @@ -17,6 +17,7 @@ source=(http://mikmod.raphnet.net/files/$pkgname-$pkgver.tar.gz libmikmod-3.1.11 sha1sums=('ca18fff19348d3bcf3550aa920b129b082c5069a' \ '3df6cdfa3f8f97094a21b23e35dcc671fdb28408' \ '22c9f0aed6415612ed2b16d2eaed31a22207aeef') +Finclude texinfo build() { diff --git a/source/lib/libmikmod/libmikmod.install b/source/lib/libmikmod/libmikmod.install deleted file mode 100644 index 2336955..000 --- a/source/lib/libmikmod/libmikmod.install +++ /dev/null @@ -1,18 +0,0 @@ -post_install() { - echo -n generating the top-level Info node... - mkinfodir /usr/info /usr/info/dir 2/dev/null - echo done. -} - -post_upgrade() { - post_install -} - -post_remove() { - post_install -} - -op=$1 -shift - -$op $* ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: libgtop-2.22.3-2-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=4a7f15b0a65ce99b6b9f55eebb29b38f516bb4c3 commit 4a7f15b0a65ce99b6b9f55eebb29b38f516bb4c3 Author: Miklos Vajna [EMAIL PROTECTED] Date: Wed Aug 27 00:42:19 2008 +0200 libgtop-2.22.3-2-i686 - use Finclude tetex diff --git a/source/xlib/libgtop/FrugalBuild b/source/xlib/libgtop/FrugalBuild index 2c55876..d94ee5b 100644 --- a/source/xlib/libgtop/FrugalBuild +++ b/source/xlib/libgtop/FrugalBuild @@ -3,14 +3,14 @@ pkgname=libgtop pkgver=2.22.3 -pkgrel=1 +pkgrel=2 pkgdesc=A library that read information about processes and the running system url=http://www.gnome.org/; depends=('glib2=2.16.3' 'popt' 'texinfo' 'libxau') makedepends=('libxt' 'perl-xml-parser' 'gtk-doc' 'intltool') groups=('xlib') archs=('i686' 'x86_64') -Finclude gnome +Finclude gnome texinfo Fconfopts=$Fconfopts --enable-debug=no --enable-fatal-warnings=no sha1sums=('cc172b78f11c19cb4ba7ed3b55a34283f6f63d50') diff --git a/source/xlib/libgtop/libgtop.install b/source/xlib/libgtop/libgtop.install deleted file mode 100644 index da40cae..000 --- a/source/xlib/libgtop/libgtop.install +++ /dev/null @@ -1,18 +0,0 @@ -post_install() { - echo -n generating the top-level Info node... - mkinfodir /usr/info /usr/info/dir - echo done. -} - -post_upgrade() { - post_install -} - -post_remove() { - post_install -} - -op=$1 -shift - -$op $* ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: tetex-3.0-16-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=6683dbe78c7e1f8cc4a2a85982dcabc5792fe2d8 commit 6683dbe78c7e1f8cc4a2a85982dcabc5792fe2d8 Author: Miklos Vajna [EMAIL PROTECTED] Date: Wed Aug 27 00:51:01 2008 +0200 tetex-3.0-16-i686 - install scriptlet: /usr/info - /usr/share/info diff --git a/source/xapps-extra/tetex/FrugalBuild b/source/xapps-extra/tetex/FrugalBuild index 5c25147..b99fc50 100644 --- a/source/xapps-extra/tetex/FrugalBuild +++ b/source/xapps-extra/tetex/FrugalBuild @@ -4,7 +4,7 @@ pkgname=tetex pkgver=3.0 -pkgrel=15 +pkgrel=16 pkgdesc=teTeX is a complete TeX distribution for UNIX compatible systems - base files, libraries, fonts url=http://www.tug.org/teTeX/; depends=('libstdc++' 'libxp' 'libxmu' 'libxft' 'libxpm' 'freetype2' 'fontconfig' 'expat' 'openmotif=2.3.0' 'zlib' 'libpng' 'tetex-kpathsea') @@ -74,12 +74,12 @@ EOF Fmv usr/share/texmf/ls-R usr/share/texmf/ls-R.tetex-bin.orig #cp $startdir/src/haltp.tex $startdir/pkg/usr/share/texmf/doc - Frm usr/info/dir + Frm usr/share/info/dir # Remove conflicting files with texet-kpathsea Frm usr/bin/{kpseaccess,kpsereadlink,kpsestat,kpsewhich,mktexlsr,mktexmf,mktexpk,mktextfm} Frm usr/include/kpathsea - Frm usr/info/kpathsea.info + Frm usr/share/info/kpathsea.info Frm usr/lib/libkpathsea.* Frm usr/man/man1/{kpseaccess,kpsereadlink,kpsestat,kpsewhich,mktexlsr,mktexmf,mktexpk,mktextfm}.* } diff --git a/source/xapps-extra/tetex/tetex.install b/source/xapps-extra/tetex/tetex.install index bc60102..dac7cf7 100644 --- a/source/xapps-extra/tetex/tetex.install +++ b/source/xapps-extra/tetex/tetex.install @@ -2,21 +2,21 @@ post_install() { echo Creating ls-R database with mktexlsr... /usr/bin/mktexlsr echo generating the top-level Info node... - mkinfodir /usr/info /usr/info/dir 2/dev/null + mkinfodir /usr/share/info /usr/share/info/dir 2/dev/null } post_upgrade() { echo Creating ls-R database with mktexlsr... /usr/bin/mktexlsr echo generating the top-level Info node... - mkinfodir /usr/info /usr/info/dir 2/dev/null + mkinfodir /usr/share/info /usr/share/info/dir 2/dev/null } post_remove() { rm /usr/share/texmf/doc/haltp.* /usr/share/texmf/web2c/latex.fmt /usr/share/texmf/web2c/latex.log /dev/null echo generating the top-level Info node... - mkinfodir /usr/info /usr/info/dir 2/dev/null + mkinfodir /usr/share/info /usr/share/info/dir 2/dev/null } ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git
[Frugalware-git] frugalware-current: util-linux-ng-2.14-4-i686
Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=66b858b78e3663611a2a2d6a7a001826e6ed9f31 commit 66b858b78e3663611a2a2d6a7a001826e6ed9f31 Author: Miklos Vajna [EMAIL PROTECTED] Date: Wed Aug 27 00:55:53 2008 +0200 util-linux-ng-2.14-4-i686 - pkgrel++ to have the fixed scriptlet in the fpm diff --git a/source/base/util-linux-ng/FrugalBuild b/source/base/util-linux-ng/FrugalBuild index d2cf296..9c6fd11 100644 --- a/source/base/util-linux-ng/FrugalBuild +++ b/source/base/util-linux-ng/FrugalBuild @@ -3,7 +3,7 @@ pkgname=util-linux-ng pkgver=2.14 -pkgrel=3 +pkgrel=4 pkgdesc=Miscellaneous system utilities for Linux url=http://www.kernel.org/pub/linux/utils/util-linux-ng; backup=('etc/sysconfig/console' 'etc/sysconfig/numlock') ___ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git