[Frugalware-git] homepage-ng: news_fr.xml

2008-08-26 Thread Michel Hermier
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=7c93a67b6c942001eac6789f9e2d9e003e56970a

commit 7c93a67b6c942001eac6789f9e2d9e003e56970a
Author: Michel Hermier [EMAIL PROTECTED]
Date:   Tue Aug 26 08:23:40 2008 +0200

news_fr.xml
* Add the 0.9rc2 news.

diff --git a/frugalware/xml/news_fr.xml b/frugalware/xml/news_fr.xml
index 8df0fc6..a9edc94 100644
--- a/frugalware/xml/news_fr.xml
+++ b/frugalware/xml/news_fr.xml
@@ -22,6 +22,99 @@ Example: Mon, 07 Aug 2006 12:34:56 -0600 --

news
post
+   id109/id
+   titleFrugalware 0.9rc2 (Solaria) released/title
+   dateTue, 26 Aug 2008 01:02:24 +0200/date
+   authorMiklos Vajna/author
+   hidden0/hidden
+   content![CDATA[
+   L'équipe des développeurs de Frugalware est fière de 
vous a href=/news/109annoncer/a la sortie de Frugalware 0.9rc2, notre 
deuxième release candidate pour la version stable 0.9.br /
+   Une liste courte et incomplete des changements depuis 
la version 0.9rc1:br /
+   ul
+   liAméliorations:
+   ul
+   liL'éditeur vi par défaut 
est maintenant elvis à la place de nvi (comme elvis a moins de 
dépendences)./li
+   liAjout du support de la 
crosscompilation à distcc./li
+   liPlus de 350 autres petits 
changements./li
+   /ul
+   /li
+   liMise à jours de paquets:
+   ul
+   liNoyau Linux 2.6.26 + 
corrections/li
+   liGNOME 2.22.3/li
+   liGit 1.6.0/li
+   liPlus de 100 autres mise à 
jour de paquets/li
+   /ul
+   /li
+   liNouveaux paquets:
+   ul
+   liPilotes offciel pour les 
touchpad synaptics de XOrg./li
+   liUtilitaires pour le 
système de fichier HFS+./li
+   li8 nouveau modules 
drupal/li
+   liPlus de 20 autres nouveau 
paquets/li
+   /ul
+   /li
+   /ul
+   Veuillez vous référer à la Frugalware a 
href=http://ftp.frugalware.org/pub/frugalware/frugalware-testing/ChangeLog.txt;Testing
 ChangeLog/a pour plus d'information.br /
+   Nous avons un a 
href=http://bugs.frugalware.org/?do=roadmap;planing/a pour les nouvelles 
fonctionnalités nous prévoyons d'ajouté avant que Solaria soit stable.br /
+   Téléchargements pour i686:br /
+   bNOTE/b: Cliquez a 
href=/docs/install#_choosing_installation_flavorici/a pour avoir plus 
d'information pour choisir le media dont vous avez besoin pour 
l'installation.br /
+   a 
href=/download/frugalware-testing-iso/fwlive-0.9rc2-i686-full.isolivecd/a,
+   a 
href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-net.isonetinstall/a,
+   a 
href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-usb.imgusb/a,
+   a 
href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-tftp.imgtftp/a,
+   a 
href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd1.isocd1/a,
+   a 
href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd2.isocd2/a,
+   a 
href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd3.isocd3/a,
+   a 
href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd4.isocd4/a,
+   a 
href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd5.isocd5/a,
+   a 
href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd6.isocd6/a,
+   a 
href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd7.isocd7/a,
+   a 
href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd8.isocd8/a,
+   a 
href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd9.isocd9/a,
+   a 
href=/download/frugalware-testing-iso/frugalware-0.9rc2-i686-cd10.isocd10/a,
+   a 

[Frugalware-git] frugalware-0.8: git-1.5.6.4-1kalgan1-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=3b2ca975630aee47a79a6fa9b0e6d54e05f653f3

commit 3b2ca975630aee47a79a6fa9b0e6d54e05f653f3
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 16:00:54 2008 +0200

git-1.5.6.4-1kalgan1-i686
- secfix bump
- closes #3305

diff --git a/source/devel-extra/git/FrugalBuild 
b/source/devel-extra/git/FrugalBuild
index f2e24a3..a3dd774 100644
--- a/source/devel-extra/git/FrugalBuild
+++ b/source/devel-extra/git/FrugalBuild
@@ -8,11 +8,11 @@ USE_DEVEL=${USE_DEVEL:-n}
USE_HTMLMAN=${USE_HTMLMAN:-y}

pkgname=git
-pkgver=1.5.4.3
+pkgver=1.5.6.4
Fuse $USE_DEVEL  pkgver=1.5.4.rc5
-pkgrel=1
+pkgrel=1kalgan1
pkgdesc=A fast, scalable, distributed revision control system.
-url=http://www.kernel.org/pub/software/scm/git/;
+url=http://www.hu.kernel.org/pub/software/scm/git/;
depends=('curl=7.16.0' 'openssl' 'perl=5.10.0')
backup=(etc/sysconfig/git)
makedepends=('asciidoc' 'docbook-xsl=1.73.0-2' 'docbook-xml' 'docbook2x' 
'sgml-common' 'xmlto' 'cpio')
@@ -66,7 +66,7 @@ build()
Fconf
make V=1 CLFAGS=$CFLAGS ASCIIDOC8=YesPlease \
ETC_GITCONFIG=/etc/gitconfig DOCBOOK2X_TEXI=docbook2texi \
-   all doc info test || return 1
+   all doc info || return 1
Fmakeinstall install-doc install-info ETC_GITCONFIG=/etc/gitconfig 
mandir=/usr/share/man
Ffilerel perl/private-Error.pm /usr/lib/perl5/site_perl/current/Error.pm
make -C Documentation WEBDOC_DEST=$Fdestdir/usr/share/doc/$pkgname-$pkgver 
install-webdoc || return 1
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] homepage-ng: FSA509-firefox

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=62ec266a77a3ab9b4d1b8462f49ed9375d0a51ea

commit 62ec266a77a3ab9b4d1b8462f49ed9375d0a51ea
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 16:15:44 2008 +0200

FSA509-firefox

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index e356ab4..a55825c 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,56 @@

fsas
fsa
+   id509/id
+   date2008-08-26/date
+   packagefirefox/package
+   vulnerable2.0.0.14-1kalgan1/vulnerable
+   unaffected2.0.0.15-1kalgan1/unaffected
+   btshttp://bugs.frugalware.org/task/3202/bts
+   cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2800
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2801
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2805
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2806
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2808
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2809
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2810
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811/cve
+   descSome vulnerabilities have been reported in Mozilla 
Firefox, which can be exploited by malicious people to conduct cross-site 
scripting and spoofing attacks, bypass certain security restrictions, disclose 
sensitive information, or potentially compromise a user's system.
+   1) Multiple errors in the layout and JavaScript engines 
can be exploited to corrupt memory.
+   2) An error in the handling of unprivileged XUL 
documents can be exploited to load Chrome scripts from a fastload file via 
script elements.
+   3) An error in the mozIJSSubScriptLoader.LoadScript() 
function can be exploited to bypass XPCNativeWrappers and run arbitrary code 
with Chrome privileges.
+   Successful exploitation requires that an add-on using 
the affected function is installed.
+   4) An error in the block reflow process can be 
exploited to cause a crash or potentially execute arbitrary code.
+   5) An error in the processing of file URLs contained 
within local directory listings can potentially be exploited to execute 
malicious JavaScript content.
+   6) Multiple errors in the implementation of the 
JavaScript same origin policy can be exploited to execute arbitrary script code 
in the context of a different domain.
+   7) Multiple errors in the verification of signed JAR 
files can be exploited to execute arbitrary JavaScript code with the privileges 
of the JAR's signer.
+   8) An error in the implementation of file upload forms 
can be exploited to upload arbitrary local files to a remote webserver via 
specially crafted DOM Range and originalTarget elements.
+   9) An error in the Java LiveConnect implementation on 
Mac OS X can be exploited to establish arbitrary socket connections.
+   10) An uninitialized memory access in the processing of 
improperly encoded .properties files can potentially be exploited to disclose 
sensitive memory via an add-on using the malformed file.
+   11) An error in the processing of Alt Names provided 
by peer trusted certificates can be exploited to conduct spoofing attacks.
+   12) An error in the processing of Windows URL shortcuts 
can be exploited to run a remote site as a local file./desc
+   /fsa
+   fsa
+   id508/id
+   date2008-08-16/date
+   packagepostfix/package
+   vulnerable2.4.6-1/vulnerable
+   unaffected2.4.7-1kalgan1/unaffected
+   btshttp://bugs.frugalware.org/task/3296/bts
+   cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937/cve
+   descSebastian Krahmer has reported some security issues in 
Postfix, which can be exploited by malicious, local users to disclose 
potentially sensitive information and perform certain actions with escalated 
privileges.
+   1) A 

[Frugalware-git] homepage-ng: FSA510-thunderbird

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=927438ac418d1596a2389d642866bf1d9c4c4776

commit 927438ac418d1596a2389d642866bf1d9c4c4776
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 16:18:11 2008 +0200

FSA510-thunderbird

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index a55825c..4667730 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,21 @@

fsas
fsa
+   id510/id
+   date2008-08-26/date
+   packagethunderbird/package
+   vulnerable2.0.0.14-1kalgan1/vulnerable
+   unaffected2.0.0.16-1kalgan1/unaffected
+   btshttp://bugs.frugalware.org/task/3206/bts
+   cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803
+   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811/cve
+   descSome vulnerabilities have been reported in Mozilla 
Thunderbird, which potentially can be exploited by malicious people to 
compromise a user's system.
+   For more information, see FSA509/desc
+   /fsa
+   fsa
id509/id
date2008-08-26/date
packagefirefox/package
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] homepage-ng: FSA511-pdns

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=fba3b7ab0719e5f14cb755451a7853203b1bba48

commit fba3b7ab0719e5f14cb755451a7853203b1bba48
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 16:20:07 2008 +0200

FSA511-pdns

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 4667730..20aec8f 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,17 @@

fsas
fsa
+   id511/id
+   date2008-08-26/date
+   packagepdns/package
+   vulnerable2.9.21-3/vulnerable
+   unaffected2.9.21.1-1kalgan1/unaffected
+   btshttp://bugs.frugalware.org/task/3309/bts
+   
cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337/cve
+   descA weakness has been reported in PowerDNS, which can be 
exploited by malicious people to conduct spoofing attacks.
+   The weakness is caused due to the server dropping DNS 
queries for invalid DNS records within a valid domain. This can be exploited to 
facilitate the spoofing of the valid domain on third-party DNS servers./desc
+   /fsa
+   fsa
id510/id
date2008-08-26/date
packagethunderbird/package
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] homepage-ng: FSA512-amarok

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=4818fdb9e07eefce8584a089546c369b1d76d5ba

commit 4818fdb9e07eefce8584a089546c369b1d76d5ba
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 16:22:34 2008 +0200

FSA512-amarok

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 20aec8f..12e7a17 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,17 @@

fsas
fsa
+   id512/id
+   date2008-08-26/date
+   packageamarok/package
+   vulnerable1.4.8-2/vulnerable
+   unaffected1.4.10-1kalgan1/unaffected
+   btshttp://bugs.frugalware.org/task/3312/bts
+   
cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3699/cve
+   descA security issue has been reported in Amarok, which can 
be exploited by malicious, local users to perform certain actions with 
escalated privileges.
+   The security issue is caused due to the 
MagnatuneBrowser::listDownloadComplete() function handling temporary files in 
an insecure manner. This can be exploited via symlink attacks in combination 
with a race condition to overwrite arbitrary files with the privileges of the 
user running the application./desc
+   /fsa
+   fsa
id511/id
date2008-08-26/date
packagepdns/package
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: docs/security

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=80148288c43197df1b4c43d12b2e3294d5bd30b2

commit 80148288c43197df1b4c43d12b2e3294d5bd30b2
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 16:24:48 2008 +0200

docs/security

fix the order of the steps in the 'How to release an FSA' section

diff --git a/docs/security.txt b/docs/security.txt
index 448b53b..f2a8968 100644
--- a/docs/security.txt
+++ b/docs/security.txt
@@ -23,12 +23,12 @@ issue in -stable and releases a new FSA.

== How to release an FSA?

-. Open the -stable Changelog file of the package. There you can see the
-  vulnerable and unaffected versions of the package.
-
. Check if the backport built by syncpkgd is ready (the binary packages
should be uploaded for each arch).

+. Open the -stable Changelog file of the package. There you can see the
+  vulnerable and unaffected versions of the package.
+
. Add a new entry to the frugalware/xml/security.xml file in the
homepage-ng repo.
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] homepage-ng: FSA513-git

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=b1ba57161b752174fec92d3b89c0162572cd3f7f

commit b1ba57161b752174fec92d3b89c0162572cd3f7f
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 16:29:00 2008 +0200

FSA513-git

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 12e7a17..7b2a285 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,16 @@

fsas
fsa
+   id513/id
+   date2008-08-26/date
+   packagegit/package
+   vulnerable1.5.4.3-1/vulnerable
+   unaffected1.5.6.4-1kalgan1/unaffected
+   btshttp://bugs.frugalware.org/task/3305/bts
+   
cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3546/cve
+   descStack-based buffer overflow in the (1) diff_addremove and 
(2) diff_change functions in GIT before 1.5.6.4 might allow local users to 
execute arbitrary code via a PATH whose length is larger than the system's 
PATH_MAX when running GIT utilities such as git-diff or git-grep./desc
+   /fsa
+   fsa
id512/id
date2008-08-26/date
packageamarok/package
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-0.8: ruby-1.8.6-5kalgan1-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=5733f80314861074ae037e6f8e8ad2671e0b7468

commit 5733f80314861074ae037e6f8e8ad2671e0b7468
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 16:42:16 2008 +0200

ruby-1.8.6-5kalgan1-i686
- update to patchlevel '287'
- closes #3300

diff --git a/source/devel/ruby/FrugalBuild b/source/devel/ruby/FrugalBuild
index 87d650c..6f537d7 100644
--- a/source/devel/ruby/FrugalBuild
+++ b/source/devel/ruby/FrugalBuild
@@ -4,8 +4,8 @@

pkgname=ruby
pkgver=1.8.6
-pkgextraver=-p111
-pkgrel=4
+pkgextraver=-p287
+pkgrel=5kalgan1
pkgdesc=An object-oriented programming language.
url=http://www.ruby-lang.org/;
depends=('termcap' 'zlib' 'db=4.6.18' 'readline' 'openssl' 'gdbm')
@@ -14,7 +14,7 @@ groups=('devel')
archs=('i686' 'x86_64')
up2date=lynx -dump http://www.ruby-lang.org/en/downloads/ |grep tar.gz |sed 
-ne 's/.*y-\(.*\).tar.*/\1/;1p' |sed s/$pkgextraver//
source=(ftp://ftp.ruby-lang.org/pub/ruby/ruby-${pkgver}${pkgextraver}.tar.bz2)
-sha1sums=('d85d25786e0ce30f8f54f5cfa36968ec0f6b9a5f')
+sha1sums=('29b02ccab3c1d6b4a71148ad960e65b5f892fe17')

build() {
Fbuild --enable-shared --enable-pthread \
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: ruby-1.8.7-5-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=2dc7c6b923393fa847501ead450264b590813f15

commit 2dc7c6b923393fa847501ead450264b590813f15
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 17:08:25 2008 +0200

ruby-1.8.7-5-i686
- update to patchlevel '72'
- closes #3300

diff --git a/source/devel/ruby/FrugalBuild b/source/devel/ruby/FrugalBuild
index 64a1522..9ea7d68 100644
--- a/source/devel/ruby/FrugalBuild
+++ b/source/devel/ruby/FrugalBuild
@@ -4,9 +4,9 @@

pkgname=ruby
pkgver=1.8.7
-pkgpatch=22
+pkgpatch=72
pkgextraver=
-pkgrel=4
+pkgrel=5
pkgdesc=An object-oriented programming language.
url=http://www.ruby-lang.org/;
depends=('termcap' 'zlib' 'db=4.7.25-2' 'readline' 'openssl' 'gdbm')
@@ -15,7 +15,7 @@ groups=('devel')
archs=('i686' 'x86_64')
up2date=lynx -dump http://www.ruby-lang.org/en/downloads/|sed 
's/-p$pkgpatch//' |Flasttar
source=(ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-${pkgver}-p$pkgpatch.tar.bz2)
-sha1sums=('a54e59393f0ca8fcc39f9e23e63a04b1cd4e3b7a')
+sha1sums=('462e990a724580e4dfeeac5a271b93f6cfcbf5c7')

build() {
Fcd ruby-$pkgver-p$pkgpatch
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] homepage-ng: add description about missing FSA508

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=f2e2b72eeca97eab463075a676041278bb3ac696

commit f2e2b72eeca97eab463075a676041278bb3ac696
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 17:10:55 2008 +0200

add description about missing FSA508

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 7b2a285..b4141c6 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -107,21 +107,7 @@
11) An error in the processing of Alt Names provided by peer trusted 
certificates can be exploited to conduct spoofing attacks.
12) An error in the processing of Windows URL shortcuts can be exploited to run 
a remote site as a local file./desc
/fsa
-   fsa
-   id508/id
-   date2008-08-16/date
-   packagepostfix/package
-   vulnerable2.4.6-1/vulnerable
-   unaffected2.4.7-1kalgan1/unaffected
-   btshttp://bugs.frugalware.org/task/3296/bts
-   cvehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936
-   
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937/cve
-   descSebastian Krahmer has reported some security issues in 
Postfix, which can be exploited by malicious, local users to disclose 
potentially sensitive information and perform certain actions with escalated 
privileges.
-   1) A security issue is caused due to Postfix 
incorrectly handling symlink files. This can be exploited to e.g. append mail 
messages to arbitrary files by creating a hardlink to a symlink owned by the 
root user.
-   Successful exploitation requires write permission to 
the mail spool directory, that there is no root mailbox, and users can create 
a hardlink to a symlink (e.g. Linux 2.x, Solaris, Irix 6.5).
-   2) A security issue is caused due to Postfix not 
correctly checking the ownership of the destination when delivering email. This 
can be exploited to e.g. disclose emails by creating an insecure mailbox file 
for other users.
-   Successful exploitation requires permission to create 
files within the mail spool directory./desc
-   /fsa
+   !-- 508 was the same as 507 by accident. --
fsa
id507/id
date2008-08-16/date
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-0.8: links-2.1-1kalgan1-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=d2a6c6be269f34ae56ad10e381379af030c09d4c

commit d2a6c6be269f34ae56ad10e381379af030c09d4c
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 17:24:56 2008 +0200

links-2.1-1kalgan1-i686
- secfix bump
- closes #3272 in stable

diff --git a/source/network-extra/links/FrugalBuild 
b/source/network-extra/links/FrugalBuild
index d651e5d..25febf1 100644
--- a/source/network-extra/links/FrugalBuild
+++ b/source/network-extra/links/FrugalBuild
@@ -2,8 +2,8 @@
# Maintainer: VMiklos [EMAIL PROTECTED]

pkgname=links
-pkgver=2.1pre33
-pkgrel=1
+pkgver=2.1
+pkgrel=1kalgan1
pkgdesc=A web browser running in both graphics and text mode.
url=http://links.twibright.com/;
depends=('libpng' 'libjpeg' 'libtiff' 'openssl' 'gpm' 'ncurses')
@@ -13,6 +13,6 @@ up2date=lynx -dump $url/download.php|grep Current|sed 's/.* 
\(.*\)\..*/\1/'
source=($url/download/$pkgname-$pkgver.tar.bz2)
Fconfopts=$Fconfopts --enable-javascript --enable-graphics --without-x

-sha1sums=('0ac2aa7c45f56692751f5a9ab94f3551c38ba846')
+sha1sums=('f14617c6bce69a23fd20bd8816e693a789a8c5e4')
# optimization OK
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-0.8: apache-2.2.8-2kalgan2-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=0440167e58f731710bf757370cfe9348a4882a12

commit 0440167e58f731710bf757370cfe9348a4882a12
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 17:33:07 2008 +0200

apache-2.2.8-2kalgan2-i686
- add CVE-2008-2939.patch
- closes #3307

diff --git a/source/network/apache/CVE-2008-2939.patch 
b/source/network/apache/CVE-2008-2939.patch
new file mode 100644
index 000..ddf5c6a
--- /dev/null
+++ b/source/network/apache/CVE-2008-2939.patch
@@ -0,0 +1,10 @@
+--- 2.2.x/modules/proxy/mod_proxy_ftp.c2008/08/05 19:00:05 682869
 2.2.x/modules/proxy/mod_proxy_ftp.c2008/08/05 19:01:50 682870
+@@ -383,6 +383,7 @@
+c-bucket_alloc));
+ }
+ if (wildcard != NULL) {
++wildcard = ap_escape_html(p, wildcard);
+ APR_BRIGADE_INSERT_TAIL(out, apr_bucket_pool_create(wildcard,
+strlen(wildcard), 
p,
+c-bucket_alloc));
diff --git a/source/network/apache/FrugalBuild 
b/source/network/apache/FrugalBuild
index 3247385..a2d8c1b 100644
--- a/source/network/apache/FrugalBuild
+++ b/source/network/apache/FrugalBuild
@@ -4,7 +4,7 @@

pkgname=apache
pkgver=2.2.8
-pkgrel=2kalgan1
+pkgrel=2kalgan2
pkgdesc=A high performance Unix-based HTTP server (with SSL)
url=http://httpd.apache.org/;
backup=(etc/httpd/conf/{httpd.conf,ssl.conf,ssl.crt/server.crt,ssl.csr/server.csr,ssl.key/server.key}
 \
@@ -19,8 +19,8 @@ 
source=(http://archive.apache.org/dist/httpd/httpd-$pkgver.tar.bz2 \
http://ftp.frugalware.org/pub/other/sources/apache/mkcert.tar.gz \
rc.httpd rc.httpd-hu.po httpd.conf ssl.conf \
README.Frugalware index.html http://frugalware.org/images/frugalware.png \
-   CVE-2008-2364.patch)
-signatures=($source.asc '' '' '' '' '' '' '' '' '')
+   CVE-2008-2364.patch CVE-2008-2939.patch)
+signatures=($source.asc '' '' '' '' '' '' '' '' '' '')

# svn web interface:
# http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-0.8: python-2.5.2-2kalgan2-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=8743fd062258b92c2e0f88d32eaf741cc5ac5d26

commit 8743fd062258b92c2e0f88d32eaf741cc5ac5d26
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 17:57:04 2008 +0200

python-2.5.2-2kalgan2-i686
- added CVE-2008-2315, CVE-2008-2316, CVE-2008-3142 and CVE-2008-3144
- closes #3286

diff --git a/source/devel/python/CVE-2008-2315.patch 
b/source/devel/python/CVE-2008-2315.patch
new file mode 100644
index 000..19a654b
--- /dev/null
+++ b/source/devel/python/CVE-2008-2315.patch
@@ -0,0 +1,581 @@
+Index: Python-2.5.2/Objects/unicodeobject.c
+===
+--- Python-2.5.2.orig/Objects/unicodeobject.c
 Python-2.5.2/Objects/unicodeobject.c
+@@ -240,6 +240,11 @@ PyUnicodeObject *_PyUnicode_New(Py_ssize
+ return unicode_empty;
+ }
+
++/* Ensure we won't overflow the size. */
++if (length  ((PY_SSIZE_T_MAX / sizeof(Py_UNICODE)) - 1)) {
++return (PyUnicodeObject *)PyErr_NoMemory();
++}
++
+ /* Unicode freelist  memory allocation */
+ if (unicode_freelist) {
+ unicode = unicode_freelist;
+@@ -1102,6 +1107,9 @@ PyObject *PyUnicode_EncodeUTF7(const Py_
+ char * out;
+ char * start;
+
++if (cbAllocated / 5 != size)
++return PyErr_NoMemory();
++
+ if (size == 0)
+   return PyString_FromStringAndSize(NULL, 0);
+
+@@ -1700,8 +1708,9 @@ PyUnicode_EncodeUTF16(const Py_UNICODE *
+ {
+ PyObject *v;
+ unsigned char *p;
++Py_ssize_t nsize, bytesize;
+ #ifdef Py_UNICODE_WIDE
+-int i, pairs;
++Py_ssize_t i, pairs;
+ #else
+ const int pairs = 0;
+ #endif
+@@ -1724,8 +1733,15 @@ PyUnicode_EncodeUTF16(const Py_UNICODE *
+   if (s[i] = 0x1)
+   pairs++;
+ #endif
+-v = PyString_FromStringAndSize(NULL,
+-2 * (size + pairs + (byteorder == 0)));
++/* 2 * (size + pairs + (byteorder == 0)) */
++if (size  PY_SSIZE_T_MAX ||
++  size  PY_SSIZE_T_MAX - pairs - (byteorder == 0))
++  return PyErr_NoMemory();
++nsize = (size + pairs + (byteorder == 0));
++bytesize = nsize * 2;
++if (bytesize / 2 != nsize)
++  return PyErr_NoMemory();
++v = PyString_FromStringAndSize(NULL, bytesize);
+ if (v == NULL)
+ return NULL;
+
+@@ -2053,6 +2069,11 @@ PyObject *unicodeescape_string(const Py_
+ char *p;
+
+ static const char *hexdigit = 0123456789abcdef;
++#ifdef Py_UNICODE_WIDE
++const Py_ssize_t expandsize = 10;
++#else
++const Py_ssize_t expandsize = 6;
++#endif
+
+ /* Initial allocation is based on the longest-possible unichr
+escape.
+@@ -2068,13 +2089,12 @@ PyObject *unicodeescape_string(const Py_
+escape.
+ */
+
++if (size  (PY_SSIZE_T_MAX - 2 - 1) / expandsize)
++  return PyErr_NoMemory();
++
+ repr = PyString_FromStringAndSize(NULL,
+ 2
+-#ifdef Py_UNICODE_WIDE
+-+ 10*size
+-#else
+-+ 6*size
+-#endif
+++ expandsize*size
+ + 1);
+ if (repr == NULL)
+ return NULL;
+@@ -2315,12 +2335,16 @@ PyObject *PyUnicode_EncodeRawUnicodeEsca
+ char *q;
+
+ static const char *hexdigit = 0123456789abcdef;
+-
+ #ifdef Py_UNICODE_WIDE
+-repr = PyString_FromStringAndSize(NULL, 10 * size);
++const Py_ssize_t expandsize = 10;
+ #else
+-repr = PyString_FromStringAndSize(NULL, 6 * size);
++const Py_ssize_t expandsize = 6;
+ #endif
++
++if (size  PY_SSIZE_T_MAX / expandsize)
++  return PyErr_NoMemory();
++
++repr = PyString_FromStringAndSize(NULL, expandsize * size);
+ if (repr == NULL)
+ return NULL;
+ if (size == 0)
+@@ -4730,6 +4754,11 @@ PyUnicodeObject *pad(PyUnicodeObject *se
+ return self;
+ }
+
++if (left  PY_SSIZE_T_MAX - self-length ||
++  right  PY_SSIZE_T_MAX - (left + self-length)) {
++PyErr_SetString(PyExc_OverflowError, padded string is too long);
++return NULL;
++}
+ u = _PyUnicode_New(left + self-length + right);
+ if (u) {
+ if (left)
+Index: Python-2.5.2/Objects/tupleobject.c
+===
+--- Python-2.5.2.orig/Objects/tupleobject.c
 Python-2.5.2/Objects/tupleobject.c
+@@ -60,11 +60,12 @@ PyTuple_New(register Py_ssize_t size)
+   Py_ssize_t nbytes = size * sizeof(PyObject *);
+   /* Check for overflow */
+   if (nbytes / sizeof(PyObject *) != (size_t)size ||
+-  (nbytes += sizeof(PyTupleObject) - sizeof(PyObject *))
+-  = 0)
++  (nbytes  PY_SSIZE_T_MAX - sizeof(PyTupleObject) - 
sizeof(PyObject *)))
+   {
+   return PyErr_NoMemory();
+   }
++  nbytes += sizeof(PyTupleObject) - sizeof(PyObject *);
++
+   op = PyObject_GC_NewVar(PyTupleObject, PyTuple_Type, size);
+   if (op == NULL)
+  

[Frugalware-git] frugalware-0.8: libxslt-1.1.22-2kalgan2-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-0.8.git;a=commitdiff;h=6ef5f3207cd36ecfe39690e1ab75cdb6067476ba

commit 6ef5f3207cd36ecfe39690e1ab75cdb6067476ba
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Tue Aug 26 18:14:46 2008 +0200

libxslt-1.1.22-2kalgan2-i686
- added CVE-2008-2935.patch
- closes #3285

diff --git a/source/lib/libxslt/CVE-2008-2935.patch 
b/source/lib/libxslt/CVE-2008-2935.patch
new file mode 100644
index 000..c9ab232
--- /dev/null
+++ b/source/lib/libxslt/CVE-2008-2935.patch
@@ -0,0 +1,152 @@
+Index: libexslt/crypto.c
+===
+--- libexslt/crypto.c  (revision 1479)
 libexslt/crypto.c  (working copy)
+@@ -595,11 +595,13 @@ exsltCryptoRc4EncryptFunction (xmlXPathP
+ int str_len = 0, bin_len = 0, hex_len = 0;
+ xmlChar *key = NULL, *str = NULL, *padkey = NULL;
+ xmlChar *bin = NULL, *hex = NULL;
++xsltTransformContextPtr tctxt = NULL;
+
+-if ((nargs  1) || (nargs  3)) {
++if (nargs != 2) {
+   xmlXPathSetArityError (ctxt);
+   return;
+ }
++tctxt = xsltXPathGetTransformContext(ctxt);
+
+ str = xmlXPathPopString (ctxt);
+ str_len = xmlUTF8Strlen (str);
+@@ -611,7 +613,7 @@ exsltCryptoRc4EncryptFunction (xmlXPathP
+ }
+
+ key = xmlXPathPopString (ctxt);
+-key_len = xmlUTF8Strlen (str);
++key_len = xmlUTF8Strlen (key);
+
+ if (key_len == 0) {
+   xmlXPathReturnEmptyString (ctxt);
+@@ -620,15 +622,33 @@ exsltCryptoRc4EncryptFunction (xmlXPathP
+   return;
+ }
+
+-padkey = xmlMallocAtomic (RC4_KEY_LENGTH);
++padkey = xmlMallocAtomic (RC4_KEY_LENGTH + 1);
++if (padkey == NULL) {
++  xsltTransformError(tctxt, NULL, tctxt-inst,
++  exsltCryptoRc4EncryptFunction: Failed to allocate padkey\n);
++  tctxt-state = XSLT_STATE_STOPPED;
++  xmlXPathReturnEmptyString (ctxt);
++  goto done;
++}
++memset(padkey, 0, RC4_KEY_LENGTH + 1);
++
+ key_size = xmlUTF8Strsize (key, key_len);
++if ((key_size  RC4_KEY_LENGTH) || (key_size  0)) {
++  xsltTransformError(tctxt, NULL, tctxt-inst,
++  exsltCryptoRc4EncryptFunction: key size too long or key broken\n);
++  tctxt-state = XSLT_STATE_STOPPED;
++  xmlXPathReturnEmptyString (ctxt);
++  goto done;
++}
+ memcpy (padkey, key, key_size);
+-memset (padkey + key_size, '\0', sizeof (padkey));
+
+ /* encrypt it */
+ bin_len = str_len;
+ bin = xmlStrdup (str);
+ if (bin == NULL) {
++  xsltTransformError(tctxt, NULL, tctxt-inst,
++  exsltCryptoRc4EncryptFunction: Failed to allocate string\n);
++  tctxt-state = XSLT_STATE_STOPPED;
+   xmlXPathReturnEmptyString (ctxt);
+   goto done;
+ }
+@@ -638,6 +658,9 @@ exsltCryptoRc4EncryptFunction (xmlXPathP
+ hex_len = str_len * 2 + 1;
+ hex = xmlMallocAtomic (hex_len);
+ if (hex == NULL) {
++  xsltTransformError(tctxt, NULL, tctxt-inst,
++  exsltCryptoRc4EncryptFunction: Failed to allocate result\n);
++  tctxt-state = XSLT_STATE_STOPPED;
+   xmlXPathReturnEmptyString (ctxt);
+   goto done;
+ }
+@@ -670,11 +693,13 @@ exsltCryptoRc4DecryptFunction (xmlXPathP
+ int str_len = 0, bin_len = 0, ret_len = 0;
+ xmlChar *key = NULL, *str = NULL, *padkey = NULL, *bin =
+   NULL, *ret = NULL;
++xsltTransformContextPtr tctxt = NULL;
+
+-if ((nargs  1) || (nargs  3)) {
++if (nargs != 2) {
+   xmlXPathSetArityError (ctxt);
+   return;
+ }
++tctxt = xsltXPathGetTransformContext(ctxt);
+
+ str = xmlXPathPopString (ctxt);
+ str_len = xmlUTF8Strlen (str);
+@@ -686,7 +711,7 @@ exsltCryptoRc4DecryptFunction (xmlXPathP
+ }
+
+ key = xmlXPathPopString (ctxt);
+-key_len = xmlUTF8Strlen (str);
++key_len = xmlUTF8Strlen (key);
+
+ if (key_len == 0) {
+   xmlXPathReturnEmptyString (ctxt);
+@@ -695,22 +720,51 @@ exsltCryptoRc4DecryptFunction (xmlXPathP
+   return;
+ }
+
+-padkey = xmlMallocAtomic (RC4_KEY_LENGTH);
++padkey = xmlMallocAtomic (RC4_KEY_LENGTH + 1);
++if (padkey == NULL) {
++  xsltTransformError(tctxt, NULL, tctxt-inst,
++  exsltCryptoRc4EncryptFunction: Failed to allocate padkey\n);
++  tctxt-state = XSLT_STATE_STOPPED;
++  xmlXPathReturnEmptyString (ctxt);
++  goto done;
++}
++memset(padkey, 0, RC4_KEY_LENGTH + 1);
+ key_size = xmlUTF8Strsize (key, key_len);
++if ((key_size  RC4_KEY_LENGTH) || (key_size  0)) {
++  xsltTransformError(tctxt, NULL, tctxt-inst,
++  exsltCryptoRc4EncryptFunction: key size too long or key broken\n);
++  tctxt-state = XSLT_STATE_STOPPED;
++  xmlXPathReturnEmptyString (ctxt);
++  goto done;
++}
+ memcpy (padkey, key, key_size);
+-memset (padkey + key_size, '\0', sizeof (padkey));
+
+ /* decode hex to binary */
+ bin_len = str_len;
+ bin = xmlMallocAtomic (bin_len);
++if (bin == NULL) {
++  

[Frugalware-git] frugalware-current: texinfo-4.11-4-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=71644014f9e187ad17c8faf5939d1713b6fce18a

commit 71644014f9e187ad17c8faf5939d1713b6fce18a
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Wed Aug 27 00:17:45 2008 +0200

texinfo-4.11-4-i686
- use Finclude texinfo
- this silences the warning about non-existing /usr/info on install

diff --git a/source/base/texinfo/FrugalBuild b/source/base/texinfo/FrugalBuild
index 495e7c0..9962112 100644
--- a/source/base/texinfo/FrugalBuild
+++ b/source/base/texinfo/FrugalBuild
@@ -4,7 +4,7 @@

pkgname=texinfo
pkgver=4.11
-pkgrel=3
+pkgrel=4
pkgdesc=The GNU info program and utilities
url=http://www.gnu.org/software/texinfo/;
depends=('ncurses=5.6-4' 'net-tools=1.60-26' 'grep=2.5.3-4' 'sed=4.1.5-3' 
'udev=124-2' 'gawk=3.1.6-3')
@@ -17,6 +17,7 @@ Fup2gnubz2
source=(http://ftp.gnu.org/pub/gnu/$pkgname/$pkgname-$pkgver.tar.bz2 mkinfodir)
sha1sums=('915a42e1278860b0fa64e4ef9d5ad4488d3b23a0' \
'd744345f082e32af0675a0b9d3287c6b8d4600a7')
+Finclude texinfo


build()
diff --git a/source/base/texinfo/texinfo.install 
b/source/base/texinfo/texinfo.install
deleted file mode 100644
index 766019d..000
--- a/source/base/texinfo/texinfo.install
+++ /dev/null
@@ -1,25 +0,0 @@
-post_install()
-{
-   echo -n generating the top-level Info node... 
-   mkinfodir /usr/info  /usr/info/dir 2/dev/null
-   echo done.
-}
-
-post_upgrade()
-{
-   post_install
-}
-
-pre_remove()
-{
-   echo -n removing the top-level Info node... 
-   rm -f /usr/info/dir
-   echo done.
-}
-
-op=$1
-shift
-
-$op $*
-
-# vim: ft=sh
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: a2ps-4.14-2-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=ac7410ba08bd5427715c95e9a90f11efbab79244

commit ac7410ba08bd5427715c95e9a90f11efbab79244
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Wed Aug 27 00:23:11 2008 +0200

a2ps-4.14-2-i686
- use Finclude texinfo

diff --git a/source/apps/a2ps/FrugalBuild b/source/apps/a2ps/FrugalBuild
index 9982930..e90f686 100644
--- a/source/apps/a2ps/FrugalBuild
+++ b/source/apps/a2ps/FrugalBuild
@@ -5,7 +5,7 @@
pkgname=a2ps
pkgver=4.14
pkgextraver=
-pkgrel=1
+pkgrel=2
pkgdesc=An Any to PostScript filter
url=http://www.inf.enst.fr/~demaille/a2ps;
depends=('glibc' 'urw-fonts' 'psutils' 'texinfo')
@@ -18,6 +18,7 @@ 
source=(ftp://ftp.gnu.org/gnu/$pkgname/$pkgname-$pkgver.tar.gz \
libtool.patch)
sha1sums=('365abbbe4b7128bf70dad16d06e23c5701874852' \
'2cd26284b19f897505b0f344fcd423ab10b76a6f')
+Finclude texinfo

build()
{
diff --git a/source/apps/a2ps/a2ps.install b/source/apps/a2ps/a2ps.install
deleted file mode 100644
index da40cae..000
--- a/source/apps/a2ps/a2ps.install
+++ /dev/null
@@ -1,18 +0,0 @@
-post_install() {
-   echo -n generating the top-level Info node... 
-   mkinfodir /usr/info  /usr/info/dir
-   echo done.
-}
-
-post_upgrade() {
-   post_install
-}
-
-post_remove() {
-   post_install
-}
-
-op=$1
-shift
-
-$op $*
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: grub-0.97-22-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=5b7033462e61182ef525b8b96179b0bce929701f

commit 5b7033462e61182ef525b8b96179b0bce929701f
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Wed Aug 27 00:30:09 2008 +0200

grub-0.97-22-i686
- use Finclude texinfo

diff --git a/source/base/grub/FrugalBuild b/source/base/grub/FrugalBuild
index 809b7af..f993639 100644
--- a/source/base/grub/FrugalBuild
+++ b/source/base/grub/FrugalBuild
@@ -3,12 +3,11 @@

pkgname=grub
pkgver=0.97
-pkgrel=21
+pkgrel=22
pkgdesc=The GNU GRand Unified Bootloader
url=http://www.gnu.org/software/grub/;
depends=('texinfo')
[ $CARCH == i686 ]  depends=([EMAIL PROTECTED] 'ncurses' 'mktemp')
-#makedepends=('gfxboot=3.3.22' 'perl-html-parser' 'cpio')
[ $CARCH == x86_64 ]  makedepends=([EMAIL PROTECTED] 'ncurses' 'mktemp')
rodepends=('grub-theme-frugalware' 'os-prober')
groups=('base')
@@ -30,10 +29,7 @@ sha1sums=('2580626c4579bd99336d3af4482c346c95dac4fb' \
'adbb4685c98797ffb4dc83561ec75698991dddbd' \
'389913c8b09e5882373e7cb233ecfefb7ad3a3cb' \
'56223e12b2460c3390674158eddfb5a14a2efcc6')
-
-# Original patch was for Debian at:
-# http://neverborn.org/files/grub-gfxboot/source/grub-gfxboot/ and
-# http://www.morphix.org/debian/source/grub-gfxboot/
+Finclude texinfo

build()
{
@@ -50,21 +46,13 @@ build()
--enable-{epic100,exos205,ni5210,lance,ne2100,ni{50,65}10,natsemi} \
--enable-{ne,ns8390,wd,otulip,rtl8139,sis900,sk-g16,smc9000,tiara} \
--enable-{tulip,via-rhine,w89c840}
-   Ffilerel stage2/stage2 /usr/lib/grub/i386-pc/stage2.netboot
-   Ffilerel stage2/{nbgrub,pxegrub} /usr/lib/grub/i386-pc/
+   Ffilerel stage2/stage2 /usr/lib/grub/i386-frugalware/stage2.netboot
+   Ffilerel stage2/{nbgrub,pxegrub} /usr/lib/grub/i386-frugalware/
make clean

# the normal build
Fmake --bindir=/bin --sbindir=/sbin
Fmakeinstall
-
-   # message
-#  cp -a /usr/share/gfxboot/themes/frugalware ./
-#  cd frugalware
-#  make BINDIR=/usr/sbin/
-#  cd boot
-#  Ffilerel /boot/grub/message
}

# optimization OK
-
diff --git a/source/base/grub/grub.install b/source/base/grub/grub.install
deleted file mode 100644
index 5a9a9f6..000
--- a/source/base/grub/grub.install
+++ /dev/null
@@ -1,23 +0,0 @@
-post_install()
-{
-   echo -n generating the top-level Info node... 
-   mkinfodir /usr/info  /usr/info/dir 2/dev/null
-   echo done.
-}
-
-post_upgrade()
-{
-   post_install
-}
-
-post_remove()
-{
-   post_install
-}
-
-op=$1
-shift
-
-$op $*
-
-# vim: ft=sh
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: aalib-1.4rc5-4-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=120f987d020329b4047664e3fb908cf980f8bdb9

commit 120f987d020329b4047664e3fb908cf980f8bdb9
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Wed Aug 27 00:36:11 2008 +0200

aalib-1.4rc5-4-i686
- use Finclude texinfo

diff --git a/source/lib/aalib/FrugalBuild b/source/lib/aalib/FrugalBuild
index 58ca532..10d27fc 100644
--- a/source/lib/aalib/FrugalBuild
+++ b/source/lib/aalib/FrugalBuild
@@ -4,14 +4,14 @@

pkgname=aalib
pkgver=1.4rc5
-pkgrel=3
+pkgrel=4
pkgdesc=A portable ascii art graphics library.
groups=('lib')
archs=('i686' 'x86_64')
depends=('glibc' 'gpm=1.20.5-2' 'ncurses')
_F_cd_path=$pkgname-1.4.0
_F_sourceforge_dirname=aa-project
-Finclude sourceforge
+Finclude sourceforge texinfo
url=http://aa-project.sourceforge.net/aalib/;
up2date=lynx -dump 
'http://sourceforge.net/project/showfiles.php?group_id=20003'|grep -m1 
'aalib-'|sed 's/.*-\(.*\).t.* .*/\1/'
source=([EMAIL PROTECTED] aalib-m4-fix.patch missing-includes.patch)
diff --git a/source/lib/aalib/aalib.install b/source/lib/aalib/aalib.install
deleted file mode 100644
index 2336955..000
--- a/source/lib/aalib/aalib.install
+++ /dev/null
@@ -1,18 +0,0 @@
-post_install() {
-   echo -n generating the top-level Info node... 
-   mkinfodir /usr/info  /usr/info/dir 2/dev/null
-   echo done.
-}
-
-post_upgrade() {
-   post_install
-}
-
-post_remove() {
-   post_install
-}
-
-op=$1
-shift
-
-$op $*
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: glib-1.2.10-6-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=af3c1c97275982aaf7c06fcaa80e5b4764f5e088

commit af3c1c97275982aaf7c06fcaa80e5b4764f5e088
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Wed Aug 27 00:37:41 2008 +0200

glib-1.2.10-6-i686
- use Finclude texinfo

diff --git a/source/lib/glib/FrugalBuild b/source/lib/glib/FrugalBuild
index d8bb16f..1cf86af 100644
--- a/source/lib/glib/FrugalBuild
+++ b/source/lib/glib/FrugalBuild
@@ -4,7 +4,7 @@

pkgname=glib
pkgver=1.2.10
-pkgrel=5
+pkgrel=6
pkgdesc=Common C routines used by Gtk+ and other libs
url=http://www.gnome.org/;
depends=('glibc')
@@ -17,6 +17,7 @@ 
source=(ftp://ftp.gtk.org/pub/gtk/v$preup2date/$pkgname-$pkgver.tar.gz $pkgname-
sha1sums=('e5a9361c594608d152d5d9650154c2e3260b87fa' \
'07bd9ef15c3d4a3d5b6e054d46d4642d5c7f1bed' \
'68cb3f3080db37290d212ddc78757612049d3094')
+Finclude texinfo

build() {
Fcd
diff --git a/source/lib/glib/glib.install b/source/lib/glib/glib.install
deleted file mode 100644
index bfe624e..000
--- a/source/lib/glib/glib.install
+++ /dev/null
@@ -1,18 +0,0 @@
-post_install() {
-   echo -n generating the top-level Info node... 
-   mkinfodir /usr/info  /usr/info/dir 2 /dev/null
-   echo done.
-}
-
-post_upgrade() {
-   post_install
-}
-
-post_remove() {
-   post_install
-}
-
-op=$1
-shift
-
-$op $*
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: libmikmod-3.1.11-8-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=7b1b156e06bcde85941bb880581a46127a947e40

commit 7b1b156e06bcde85941bb880581a46127a947e40
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Wed Aug 27 00:40:17 2008 +0200

libmikmod-3.1.11-8-i686
- use Finclude texinfo

diff --git a/source/lib/libmikmod/FrugalBuild b/source/lib/libmikmod/FrugalBuild
index 36b9bfe..0a4d2c8 100644
--- a/source/lib/libmikmod/FrugalBuild
+++ b/source/lib/libmikmod/FrugalBuild
@@ -4,7 +4,7 @@

pkgname=libmikmod
pkgver=3.1.11
-pkgrel=7
+pkgrel=8
pkgdesc=A module sound player and library
url=http://mikmod.raphnet.net/;
groups=('lib')
@@ -17,6 +17,7 @@ 
source=(http://mikmod.raphnet.net/files/$pkgname-$pkgver.tar.gz libmikmod-3.1.11
sha1sums=('ca18fff19348d3bcf3550aa920b129b082c5069a' \
'3df6cdfa3f8f97094a21b23e35dcc671fdb28408' \
'22c9f0aed6415612ed2b16d2eaed31a22207aeef')
+Finclude texinfo

build()
{
diff --git a/source/lib/libmikmod/libmikmod.install 
b/source/lib/libmikmod/libmikmod.install
deleted file mode 100644
index 2336955..000
--- a/source/lib/libmikmod/libmikmod.install
+++ /dev/null
@@ -1,18 +0,0 @@
-post_install() {
-   echo -n generating the top-level Info node... 
-   mkinfodir /usr/info  /usr/info/dir 2/dev/null
-   echo done.
-}
-
-post_upgrade() {
-   post_install
-}
-
-post_remove() {
-   post_install
-}
-
-op=$1
-shift
-
-$op $*
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: libgtop-2.22.3-2-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=4a7f15b0a65ce99b6b9f55eebb29b38f516bb4c3

commit 4a7f15b0a65ce99b6b9f55eebb29b38f516bb4c3
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Wed Aug 27 00:42:19 2008 +0200

libgtop-2.22.3-2-i686
- use Finclude tetex

diff --git a/source/xlib/libgtop/FrugalBuild b/source/xlib/libgtop/FrugalBuild
index 2c55876..d94ee5b 100644
--- a/source/xlib/libgtop/FrugalBuild
+++ b/source/xlib/libgtop/FrugalBuild
@@ -3,14 +3,14 @@

pkgname=libgtop
pkgver=2.22.3
-pkgrel=1
+pkgrel=2
pkgdesc=A library that read information about processes and the running system
url=http://www.gnome.org/;
depends=('glib2=2.16.3' 'popt' 'texinfo' 'libxau')
makedepends=('libxt' 'perl-xml-parser' 'gtk-doc' 'intltool')
groups=('xlib')
archs=('i686' 'x86_64')
-Finclude gnome
+Finclude gnome texinfo
Fconfopts=$Fconfopts --enable-debug=no --enable-fatal-warnings=no
sha1sums=('cc172b78f11c19cb4ba7ed3b55a34283f6f63d50')

diff --git a/source/xlib/libgtop/libgtop.install 
b/source/xlib/libgtop/libgtop.install
deleted file mode 100644
index da40cae..000
--- a/source/xlib/libgtop/libgtop.install
+++ /dev/null
@@ -1,18 +0,0 @@
-post_install() {
-   echo -n generating the top-level Info node... 
-   mkinfodir /usr/info  /usr/info/dir
-   echo done.
-}
-
-post_upgrade() {
-   post_install
-}
-
-post_remove() {
-   post_install
-}
-
-op=$1
-shift
-
-$op $*
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: tetex-3.0-16-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=6683dbe78c7e1f8cc4a2a85982dcabc5792fe2d8

commit 6683dbe78c7e1f8cc4a2a85982dcabc5792fe2d8
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Wed Aug 27 00:51:01 2008 +0200

tetex-3.0-16-i686
- install scriptlet: /usr/info - /usr/share/info

diff --git a/source/xapps-extra/tetex/FrugalBuild 
b/source/xapps-extra/tetex/FrugalBuild
index 5c25147..b99fc50 100644
--- a/source/xapps-extra/tetex/FrugalBuild
+++ b/source/xapps-extra/tetex/FrugalBuild
@@ -4,7 +4,7 @@

pkgname=tetex
pkgver=3.0
-pkgrel=15
+pkgrel=16
pkgdesc=teTeX is a complete TeX distribution for UNIX compatible systems - 
base files, libraries, fonts
url=http://www.tug.org/teTeX/;
depends=('libstdc++' 'libxp' 'libxmu' 'libxft' 'libxpm' 'freetype2' 
'fontconfig' 'expat' 'openmotif=2.3.0' 'zlib' 'libpng' 'tetex-kpathsea')
@@ -74,12 +74,12 @@ EOF
Fmv usr/share/texmf/ls-R usr/share/texmf/ls-R.tetex-bin.orig

#cp $startdir/src/haltp.tex $startdir/pkg/usr/share/texmf/doc
-   Frm usr/info/dir
+   Frm usr/share/info/dir

# Remove conflicting files with texet-kpathsea
Frm 
usr/bin/{kpseaccess,kpsereadlink,kpsestat,kpsewhich,mktexlsr,mktexmf,mktexpk,mktextfm}
Frm usr/include/kpathsea
-   Frm usr/info/kpathsea.info
+   Frm usr/share/info/kpathsea.info
Frm usr/lib/libkpathsea.*
Frm 
usr/man/man1/{kpseaccess,kpsereadlink,kpsestat,kpsewhich,mktexlsr,mktexmf,mktexpk,mktextfm}.*
}
diff --git a/source/xapps-extra/tetex/tetex.install 
b/source/xapps-extra/tetex/tetex.install
index bc60102..dac7cf7 100644
--- a/source/xapps-extra/tetex/tetex.install
+++ b/source/xapps-extra/tetex/tetex.install
@@ -2,21 +2,21 @@ post_install() {
echo Creating ls-R database with mktexlsr...
/usr/bin/mktexlsr
echo generating the top-level Info node... 
-   mkinfodir /usr/info  /usr/info/dir 2/dev/null
+   mkinfodir /usr/share/info  /usr/share/info/dir 2/dev/null
}

post_upgrade() {
echo Creating ls-R database with mktexlsr...
/usr/bin/mktexlsr
echo generating the top-level Info node... 
-   mkinfodir /usr/info  /usr/info/dir 2/dev/null
+   mkinfodir /usr/share/info  /usr/share/info/dir 2/dev/null
}

post_remove()
{
rm /usr/share/texmf/doc/haltp.* /usr/share/texmf/web2c/latex.fmt 
/usr/share/texmf/web2c/latex.log /dev/null
echo generating the top-level Info node... 
-   mkinfodir /usr/info  /usr/info/dir 2/dev/null
+   mkinfodir /usr/share/info  /usr/share/info/dir 2/dev/null

}
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git


[Frugalware-git] frugalware-current: util-linux-ng-2.14-4-i686

2008-08-26 Thread Miklos Vajna
Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=66b858b78e3663611a2a2d6a7a001826e6ed9f31

commit 66b858b78e3663611a2a2d6a7a001826e6ed9f31
Author: Miklos Vajna [EMAIL PROTECTED]
Date:   Wed Aug 27 00:55:53 2008 +0200

util-linux-ng-2.14-4-i686
- pkgrel++ to have the fixed scriptlet in the fpm

diff --git a/source/base/util-linux-ng/FrugalBuild 
b/source/base/util-linux-ng/FrugalBuild
index d2cf296..9c6fd11 100644
--- a/source/base/util-linux-ng/FrugalBuild
+++ b/source/base/util-linux-ng/FrugalBuild
@@ -3,7 +3,7 @@

pkgname=util-linux-ng
pkgver=2.14
-pkgrel=3
+pkgrel=4
pkgdesc=Miscellaneous system utilities for Linux
url=http://www.kernel.org/pub/linux/utils/util-linux-ng;
backup=('etc/sysconfig/console' 'etc/sysconfig/numlock')
___
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git