Skip to content
This repository

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
  • 10,000 commits
  • files changed
  • 0 comments
  • 12 contributors
This comparison is big! We're only showing the most recent 250 commits
Feb 12, 2003
Make the reason for restriction more explicit. 67f4863
Make this work on Darwin. Use same ps option as NetBSD's one. ee8a424
Don't set a non exixtent function to read-passwd on FSF Emacs 20.x
or later (They actually have read-passwd).
d0175d3
Add back update of p5-SSLeay and curl at 20030209 5da81c1
Fix wildcard to match current version. 9d01067
Feb 13, 2003
This really needs /proc mounted - add a check afba2d4
correct some types to make this compile on alpha. Passes 3/4 tests so…
… this

is only a partial improvement.
72df23c
improve download instructions f691d34
Correct usage of r:... for BUILDLINK_TRANSFORM, and use the COPTX and
LDOPTX variables to pass in our pkgsrc CFLAGS and LDFLAGS so that
OSS works properly.
6a6b1a3
Bump PKGREVISION after previous change. 8fb6012
Bump PKGREVISION of sysutils/cdrecord to 1. Fix package so that cdrecord
links properly when using audio/oss (USE_OSS=YES).
ceee560
Update to 2.5.1: bugfix release. 2dcaecd
grep-2.5.1 update. 16f1e4f
Update to 4.5. Changes:
4.5 (4 February 2003)
* info:
  . a bug in 4.4 prevented compressed info files from being found.
* Distribution:
  . detect sys/ptem.h on Solaris.

4.4 (31 January 2003)
* Language:
  . The ' (ASCII apostrophe/right quote) character is finally allowed in
    node and anchor names.  Thus, after installing this texinfo.tex,
    existing .aux files will cause errors!  Remove them and rerun TeX to
    generate good ones.
  . @value constructs are now expanded in the filename arguments to
    @include and @verbatiminclude.
* makeinfo:
  . bug fix: @copying text is now reflected in tag table positions;
    before, nodes may not have been found with a long-enough @copying.
  . bug fix: html @verb arg is quoted properly, and does not imply
    a paragraph break.
* texinfo.tex:
  . @smallexample and the like now output in a smaller font (9pt) in all
    paper formats, not just @smallbook and @afourpaper.
  . new translation txi-tr.tex.
  . bug fix: <>| and other characters do not disappear when they are
    first on a line in @verbatim.
* install-info:
  . bug fix: don't translate the `* Menu' info keyword.
* info:
  . CTRL-H is treated like DEL in incremental search.
  . arrow keys once again work in isearch contexts under Solaris.
* infokey:
  . use .info key bindings before defaults.
  . allow prefix keys to be disabled.
* Distribution:
  . update to GNU FDL 1.2 (http://www.gnu.org/licenses/fdl.html).
  . getopt and other common library files updated from gnulib
    (http://savannah.gnu.org/projects/gnulib/).
  . autoconf 2.57, automake 1.7.2.
37d05f7
gtexinfo-4.5 update. c7d2300
+ blender-2.26, gcc3-3.2.2 [pkg/20308], mplayer-0.90rc4 [pkg/20307],
p5-CGI-2.88 [pkg/20323], p5-Time-HiRes-1.42 [pkg/20321], rep-gtk-0.17,
sendmail-8.12.7 [pkg/20324], shorten-3.5.1, squeak-3.2 [fredb|pkg/17950],
xchat-2.0.0 [pkg/20298], xmame-0.65.1, xmess-0.65.1,
- texinfo-4.5
b49ba36
Add and enable p5-Log-Agent. e162cd3
Mark this package as broken until gnome2 is updated. 38b0332
Mark this package as broken (kpilot compilation problems). ffa3ace
Mark this package as broken, due to Xv compilation problems. 220a228
Mark this package as broken 2f15c00
Add suitable arguments to "avifile-config --libs" for autodetected XF…
…ree 4

static libraries, where required. [You can't have a shared library run-time
dependency on a static library.] This may let "apla" build again on systems
with XFree 4 -- not tested.
637b5f9
Feb 14, 2003
Pullup version 1.9 to the pkgsrc 1.6.1 branch.
Requested by David Brownlee.

> Date: Thu, 13 Feb 2003 20:51:56 +0200 (EET)
> From: David Brownlee <abs@netbsd.org>
>
> Module Name:    pkgsrc
> Committed By:   abs
> Date:           Thu Feb 13 18:51:56 UTC 2003
>
> Modified Files:
>         pkgsrc/mk: texinfo.mk
>
> Log Message:
> When comparing install-info version, ignore non [0-9.] - treat 4.0b as 4.0
6bdcd7d
Feb 17, 2003
Pull up version 1.54 to the 1.6.1 pkgsrc branch.
Regquested by David Brownlee

> Date: Thu, 13 Feb 2003 21:22:44 +0200 (EET)
> From: David Brownlee <abs@netbsd.org>
>
>
> Module Name:    pkgsrc
> Committed By:   abs
> Date:           Thu Feb 13 19:22:44 UTC 2003
>
> Modified Files:
>         pkgsrc/mail/imap-uw: Makefile
>
> Log Message:
> Linux cp -R behaves differently to NetBSD when given a directory as a source
> argument. Handle differently.
ec671ae
Pullup a patch from Yuji Yamano from the trunk to get opencm to build
properly in a bulk build environment on the 1.6.1 pkgsrc branch.

Requested by Julio Merino.

> Date: Fri, 14 Feb 2003 21:03:48 +0200 (EET)
> From: Julio Merino <jmmv@netbsd.org>
> To: pkgsrc-changes@netbsd.org
> Subject: CVS commit: pkgsrc/devel/opencm
>
>
>
> Module Name:    pkgsrc
> Committed By:   jmmv
> Date:           Fri Feb 14 19:03:48 UTC 2003
>
> Modified Files:
>         pkgsrc/devel/opencm: distinfo
>         pkgsrc/devel/opencm/patches: patch-aa
>
> Log Message:
> Unset GZIP from the environment before calling GZIP_CMD.  Should fix problems
> shown in Hubert's bulk build.  Thanks to Yuji Yamano!
cf7d9a8
Pullup version 1.23 to the 1.6.1 pkgsrc branch.
Requested by Julio Merino.

> Date: Sun, 16 Feb 2003 12:49:36 +0200 (EET)
> From: Julio Merino <jmmv@netbsd.org>
>
> Module Name:    pkgsrc
> Committed By:   jmmv
> Date:           Sun Feb 16 10:49:36 UTC 2003
>
> Modified Files:
>         pkgsrc/devel/oaf: Makefile
>
> Log Message:
> Disable gtk-doc detection; not required and causes problems.
55f6747
Pull up version 1.26 to the netbsd-1-6-1 branch.
Requested by Julio Merino.

> Date: Sun, 16 Feb 2003 13:55:43 +0200 (EET)
> From: Julio Merino <jmmv@netbsd.org>
>
> Module Name:    pkgsrc
> Committed By:   jmmv
> Date:           Sun Feb 16 11:55:42 UTC 2003
>
> Modified Files:
>         pkgsrc/sysutils/gnome-vfs: Makefile
>
> Log Message:
> Disable gtk-doc detection; not required and causes problems.
e632a84
Pull up version 1.35 to the netbsd-1-6-1 branch.
Requested by Julio Merino.

> Date: Sun, 16 Feb 2003 17:05:28 +0200 (EET)
> From: Julio Merino <jmmv@netbsd.org>
>
> Module Name:    pkgsrc
> Committed By:   jmmv
> Date:           Sun Feb 16 15:05:28 UTC 2003
>
> Modified Files:
>         pkgsrc/devel/bonobo: Makefile
>
> Log Message:
> Disable gtk-doc detection; not required and causes problems.
7ed0f85
Pull up version 1.27 to the netbsd-1-6-1 branch.
Requested by Julio Merino.

> Date: Sun, 16 Feb 2003 18:35:47 +0200 (EET)
> From: Julio Merino <jmmv@netbsd.org>
>
> Module Name:    pkgsrc
> Committed By:   jmmv
> Date:           Sun Feb 16 16:35:47 UTC 2003
>
> Modified Files:
>         pkgsrc/www/gtkhtml: Makefile
>
> Log Message:
> Disable gtk-doc detection; not required and causes problems.
a155025
Pull up patches from trunk to detect automatically Xfree86 4 static libs
in `avifile-config --libs`.

Requested by Frederick Bruckman.

> Module Name:    pkgsrc
> Committed By:   fredb
> Date:           Thu Feb 13 16:31:26 UTC 2003
>
> Modified Files:
>         pkgsrc/graphics/avifile-devel: Makefile buildlink2.mk distinfo
> Added Files:
>         pkgsrc/graphics/avifile-devel/patches: patch-ac
>
> Log Message:
> Add suitable arguments to "avifile-config --libs" for autodetected XFree 4
> static libraries, where required. [You can't have a shared library run-time
> dependency on a static library.] This may let "apla" build again on systems
> with XFree 4 -- not tested.
>
>
> To generate a diff of this commit:
> cvs rdiff -r1.29 -r1.30 pkgsrc/graphics/avifile-devel/Makefile
> cvs rdiff -r1.3 -r1.4 pkgsrc/graphics/avifile-devel/buildlink2.mk
> cvs rdiff -r1.12 -r1.13 pkgsrc/graphics/avifile-devel/distinfo
> cvs rdiff -r0 -r1.3 pkgsrc/graphics/avifile-devel/patches/patch-ac
38d82aa
Use the new version of the avifile-devel package to build, and bump the
package revision, on the netbsd-1-6-1 branch.

Requested by Frederick Bruckman.

> Module Name:        pkgsrc
> Committed By:       fredb
> Date:               Thu Feb 13 21:16:11 UTC 2003
>
> Modified Files:
>     pkgsrc/graphics/apla: Makefile
>
> Log Message:
> This builds again on NetBSD 1.6.1, but only against the latest version
> of avifile-devel. Bump pkgrevision.
>
>
> To generate a diff of this commit:
> cvs rdiff -r1.13 -r1.14 pkgsrc/graphics/apla/Makefile
9dd7355
Feb 18, 2003
Pull up revision 1.43 to the netbsd-1-6-1 branch.
Requested by Dan McMahill.

> correct the 'broken due to depends' processing.  This change makes the
> summary email list correctly the packages which are broken because of
> their dependencies.  Problem noted on Huberts most recent bulk build.
7e8b4f8
Feb 20, 2003
Pull up version 1.7 to the netbsd-1-6 branch.
Requested by Grant Beattie.

> Module Name:    pkgsrc
> Committed By:   grant
> Date:           Tue Feb 18 15:45:51 UTC 2003
>
> Modified Files:
>         pkgsrc/pkgtools/pkg_install/files/lib: pkgdb.c
>
> Log Message:
> correct #ifdef misplacement.
6b3bbcb
Pull up changes from trunk to the netbsd-1-6-1 branch to allow this t…
…o be

extracted.

Requested by Lubomir Sedlacik.

> Module Name:    pkgsrc
> Committed By:   wiz
> Date:           Fri Feb 14 18:15:26 UTC 2003
>
> Modified Files:
>         pkgsrc/textproc/crimson: Makefile distinfo
>
> Log Message:
> "Update" to 1.1.3.1 -- same files as in 1.1.3, but in a correct tar file
> this time. Closes PR 18997. No actual change.

> Module Name:    pkgsrc
> Committed By:   salo
> Date:           Mon Feb 17 07:42:22 UTC 2003
>
> Modified Files:
>         pkgsrc/textproc/crimson: Makefile
>
> Log Message:
> Remove trailing .1 from WRKSRC which appeared in the latest update (hi wiz!).
2c05359
Mar 02, 2003
Pull up build fixes for Alpha from the trunk to the netbsd-1-6-1 branch.
Requested by Nick Hudson.

> Date: Fri, 21 Feb 2003 15:42:39 +0200 (EET)
> From: Nick Hudson <skrll@netbsd.org>
>
> Module Name:    pkgsrc
> Committed By:   skrll
> Date:           Fri Feb 21 13:42:39 UTC 2003
>
> Modified Files:
>         pkgsrc/misc/kdepim3: distinfo
>         pkgsrc/misc/kdeutils3: distinfo
>         pkgsrc/net/kdenetwork3: distinfo
> Added Files:
>         pkgsrc/misc/kdepim3/patches: patch-ai
>         pkgsrc/misc/kdeutils3/patches: patch-ao
>         pkgsrc/net/kdenetwork3/patches: patch-aa
>
> Log Message:
> Remove some more bogus sizeof(size_t) == sizeof(unsigned int) checks.
0d4c533
Some non-i386 compile fixes for the netbsd-1-6-1 branch.
Requested by Nick Hudson.

> Date: Mon, 24 Feb 2003 10:12:32 +0200 (EET)
> From: Nick Hudson <skrll@netbsd.org>
>
> Module Name:    pkgsrc
> Committed By:   skrll
> Date:           Mon Feb 24 08:12:32 UTC 2003
>
> Modified Files:
>         pkgsrc/x11/kdebase3: Makefile distinfo
>         pkgsrc/x11/kdebase3/patches: patch-de
>
> Log Message:
> Let platforms that don't have apm compile ksysguard. This fixes PR 18340
> and PR 20439.
6b0715e
Pullup configure script typo fix from the trunk to the netbsd-1-6 bra…
…nch.

Requested by Dan McMahill.

> Date: Tue, 25 Feb 2003 04:11:35 +0200 (EET)
> From: Dan McMahill <dmcmahill@netbsd.org>
>
>
> Module Name:    pkgsrc
> Committed By:   dmcmahill
> Date:           Tue Feb 25 02:11:35 UTC 2003
>
> Modified Files:
>         pkgsrc/x11/kdebase3: distinfo
>         pkgsrc/x11/kdebase3/patches: patch-aa
>
> Log Message:
> fix typo in configure script which incorrectly determines that a prototype
> for strlcat is needed.  Unfortunately that had the effect of providing
> a bad (for 64 bit systems) prototype.
e45d589
Pullup fix from the trunk to the netbsd-1-6-1 branch.
Requested by Dan McMahill.

> Date: Wed, 26 Feb 2003 11:57:28 +0200 (EET)
> From: Dan McMahill <dmcmahill@netbsd.org>
>
>
> Module Name:    pkgsrc
> Committed By:   dmcmahill
> Date:           Wed Feb 26 09:57:28 UTC 2003
>
> Modified Files:
>         pkgsrc/audio/kdemultimedia3: Makefile
>
> Log Message:
> unlimit datasize to allow this to build on alpha
979c6fb
Pull up fixes from the trunk to the netbsd-1-6-1 branch.
Requested by Dan McMahill.

> Date: Wed, 26 Feb 2003 12:46:14 +0200 (EET)
> From: Dan McMahill <dmcmahill@netbsd.org>
>
>
> Module Name:    pkgsrc
> Committed By:   dmcmahill
> Date:           Wed Feb 26 10:46:13 UTC 2003
>
> Modified Files:
>         pkgsrc/net/kdenetwork3: distinfo
>         pkgsrc/net/kdenetwork3/patches: patch-aa
>
> Log Message:
> fix typo in check for strlcat which caused a build failure on alpha.
2ffbc70
Pullup typo fixes from trunk to netbsd-1-6-1 branch.
Requested by Dan McMahill.

> Date: Thu, 27 Feb 2003 01:09:04 +0200 (EET)
> From: Dan McMahill <dmcmahill@netbsd.org>
>
>
> Module Name:    pkgsrc
> Committed By:   dmcmahill
> Date:           Wed Feb 26 23:09:03 UTC 2003
>
> Modified Files:
>         pkgsrc/misc/kdeutils3: distinfo
>         pkgsrc/misc/kdeutils3/patches: patch-ao
>
> Log Message:
> fix typo in check for strlcat which caused a failure on alpha
1787f3c
Pull up a typo fix from the trunk to the netbsd-1-6-1 branch.
Requested by Dan McMahill.

> Date: Thu, 27 Feb 2003 03:03:30 +0200 (EET)
> From: Dan McMahill <dmcmahill@netbsd.org>
>
>
> Module Name:    pkgsrc
> Committed By:   dmcmahill
> Date:           Thu Feb 27 01:03:29 UTC 2003
>
> Modified Files:
>         pkgsrc/misc/kdepim3: distinfo
>         pkgsrc/misc/kdepim3/patches: patch-ai
>
> Log Message:
> fix typo in check for strlcat which caused a failure on alpha
d26500a
Pullup compilation fix from trunk to netbsd-1-6-1 branch.
Requested by Grant Beattie.

> Date: Sat,  1 Mar 2003 01:44:39 +0200 (EET)
>
>
> Module Name:    pkgsrc
> Committed By:   grant
> Date:           Fri Feb 28 23:44:39 UTC 2003
>
> Modified Files:
>         pkgsrc/graphics/xv: distinfo
>         pkgsrc/graphics/xv/patches: patch-ab
>
> Log Message:
> fix a broken #ifdef, noted on Linux.
dff904e
Pull up compilation fix from the trunk to the netbsd-1-6-1 branch.
Requested by Michael Rauch.

> Module Name:    pkgsrc
> Committed By:   mrauch
> Date:           Thu Feb 27 20:17:50 UTC 2003
>
> Modified Files:
>         pkgsrc/misc/openoffice: distinfo
> Added Files:
>         pkgsrc/misc/openoffice/patches: patch-eq
>
> Log Message:
> Reduce optimisation for a particular file to avoid a gcc internal
> compiler error.
4b08f12
Pullup fixes from the trunk to the netbsd-1-6-1 branch.
Requested by Michael Rauch.

> Module Name:    pkgsrc
> Committed By:   mrauch
> Date:           Thu Feb 27 20:59:20 UTC 2003
>
> Modified Files:
>         pkgsrc/misc/openoffice-linux: Makefile PLIST
>
> Log Message:
> The change to automate the creation of /emul/linux/etc/mtab wasn't correct --
> the creation comes too late. Back it out for the moment.

> Module Name:    pkgsrc
> Committed By:   mrauch
> Date:           Thu Feb 27 22:04:08 UTC 2003
>
> Modified Files:
>         pkgsrc/misc/openoffice-linux: Makefile
>
> Log Message:
> Automate the creation of /emul/linux/etc/mtab:
> Use the code from Johnny (jlam) again, but do an additional copy at
> pre-install, because the file has to be present during do-install already.
b57fc4b
Mar 04, 2003
Updated to version 1.9.1.
This version fixes the buffer overflow issue noted in:

  http://www.kb.cert.org/vuls/id/916785

Changes:

 - follow PKG_SYSCONFDIR
 - added rc.d script
 - create own user and group
 - added MESSAGE with post-install instructions
 - removed DEINSTALL
 - minor cleanups (this package was really half-baked..)

1.9.1:
======
 - src/preprocessors/spp_rpc_decode.c (PreprocRpcDecode):
	- alignment errors on non-x86 platforms
	- added new space delimited options
	  alert_fragments
	  no_alert_multiple_requests
	  no_alert_large_fragments
	  no_alert_incomplete
 - corrected buffer overflow in fragment normalization
 - src/snort.c
	- Win32 '-s' parameter wasn't configured to accept an optarg,
	  but code expected one, causing null-pointer violation.
 - Backport of 2.0 fixes for stream4 ( off by one errors on reassembly )
24db33d
Mar 05, 2003
Pullup nethack version 3.4.1 to netbsd-1-6-1 pkgsrc branch.
Requested by Antti Kantee.

> Date: Sat,  1 Mar 2003 23:12:53 +0200 (EET)
>
>
> Module Name:    pkgsrc
> Committed By:   pooka
> Date:           Sat Mar  1 21:12:53 UTC 2003
>
> Modified Files:
>         pkgsrc/games/nethack-lib: Makefile.common distinfo
>         pkgsrc/games/nethack-lib/patches: patch-aa patch-ab patch-ac patch-ae
>         pkgsrc/games/nethack-qt: Makefile distinfo
>         pkgsrc/games/nethack-qt/patches: patch-aa patch-ab patch-ac patch-ae
>             patch-af patch-ag patch-ah patch-ai
>         pkgsrc/games/nethack-tty: distinfo
>         pkgsrc/games/nethack-x11: Makefile distinfo
>         pkgsrc/games/nethack-x11/patches: patch-aa patch-ab patch-ac patch-af
>             patch-ag patch-ah
> Removed Files:
>         pkgsrc/games/nethack-lib/patches: patch-ah
>         pkgsrc/games/nethack-qt/patches: patch-aj
>         pkgsrc/games/nethack-x11/patches: patch-ai
>
> Log Message:
> Hello NetHack 3.4.1
>
> This is a bugfix release, no new features introduced.
>
> As a compensation for no new features, savegames and bones levels
> from NetHack 3.4.0 should work, and that's why I kept the datafile
> directory named nethackdir340. In theory you should be able to
> simply update the nethack pkgs and continue playing, but I'll not
> accept any death threats if it doesn't work, so please make sure
> you make the appropriate backups before trying.
f23758d
Mar 07, 2003
Pull up revision 1.10 (requested by wiz in ticket #1196):
Make this build again, without evolution support. Bump PKGREVISION.
fe3a3b2
Pull up revision 1.6 (requested by wiz in ticket #1196):
Make this build again, without evolution support. Bump PKGREVISION.
4b873cb
Delete file (from ticket 1192 requested by salo)
 Snort RPC preprocessing buffer overflow when decoding fragmented RPC
 records (http://www.kb.cert.org/vuls/id/916785).
 Versions affected <1.9.1.
85d79ff
Pullup rev 1.7 (from ticket 1192 requested by salo)
 Snort RPC preprocessing buffer overflow when decoding fragmented RPC
 records (http://www.kb.cert.org/vuls/id/916785).
 Versions affected <1.9.1.
4a5ee32
Pullup rev 1.8 (from ticket 1192 requested by salo)
 Snort RPC preprocessing buffer overflow when decoding fragmented RPC
 records (http://www.kb.cert.org/vuls/id/916785).
 Versions affected <1.9.1.
a11306a
Pullup rev 1.14 (from ticket 1192 requested by salo)
 Snort RPC preprocessing buffer overflow when decoding fragmented RPC
 records (http://www.kb.cert.org/vuls/id/916785).
 Versions affected <1.9.1.
8069847
Pullup rev 1.8 (from ticket 1192 requested by salo)
 Snort RPC preprocessing buffer overflow when decoding fragmented RPC
 records (http://www.kb.cert.org/vuls/id/916785).
 Versions affected <1.9.1.
82f9a09
Pullup revs 1.9-1.10 (requested by hubertf in ticket #1197)
 Makes this pkg build on 1.6.1.
7e44296
Pullup rev 1.59 (requested by grant in ticket #1198)
 Don't use .bz2 distfile, as it doesn't appear to exist on various mirrors
284a501
Pullup rev 1.11 (requested by grant in ticket #1198)
 Don't use .bz2 distfile, as it doesn't appear to exist on various mirrors
4ca581a
Mar 08, 2003
default the config file to PKG_SYSCONFDIR/cdrecord.conf unless
overridden by the user via CDRECORD_CONF.

You must move your config file to the new location if you update!

patch man pages and print a MESSAGE if CDRECORD_CONF is not set to
`/etc/default/cdrecord', as required by license.

bump PKGREVISION.

addresses PR pkg/20593 from Steven M. Bellovin.
ae77739
pull up revision 1.4 (requested by bouyer in ticket #1201):
Update to 2.1.7: Many bug and security fixes; you should upgrade.
4c0346d
pull up revision 1.2 (requested by bouyer in ticket #1201):
Update to 2.1.7: Many bug and security fixes; you should upgrade.
f2502c9
pull up revision 1.3 (requested by bouyer in ticket #1201):
Update to 2.1.7: Many bug and security fixes; you should upgrade.
d35d6d9
pull up revision 1.2 (requested by bouyer in ticket #1201):
Update to 2.1.7: Many bug and security fixes; you should upgrade.
2025614
create new file (requested by bouyer in ticket #1201):
Update to 2.1.7: Many bug and security fixes; you should upgrade.
2e80d13
add changes for the netbsd-1-6-1 pkgsrc branch. 4c26b0d
Mar 10, 2003
Pull up revision 1.5 (requested by skrll in ticket #1203):
Restrict to x86 and arm as no other ports are done ATM
d77c992
Pull up revision 1.71 (requested by salo in ticket #1204):
Updated to version 0.9.10.

This release fixes a security hole discovered by Georgi Guninski in
the SOCKS dissector.  All users of previous versions are encouraged
to upgrade.  For more details see

  http://www.ethereal.com/appnotes/enpa-sa-00008.html
59875c1
Pull up revision 1.7 (requested by salo in ticket #1204):
Updated to version 0.9.10.

This release fixes a security hole discovered by Georgi Guninski in
the SOCKS dissector.  All users of previous versions are encouraged
to upgrade.  For more details see

  http://www.ethereal.com/appnotes/enpa-sa-00008.html
b5b75a9
Pull up revision 1.17 (requested by salo in ticket #1204):
Updated to version 0.9.10.

This release fixes a security hole discovered by Georgi Guninski in
the SOCKS dissector.  All users of previous versions are encouraged
to upgrade.  For more details see

  http://www.ethereal.com/appnotes/enpa-sa-00008.html
c4fbd7b
note lang/wonka and net/ethereal pullups. b0b88bb
Mar 13, 2003
create new file (requested by dmcmahill in ticket #1209):
fix bug with static initializers which prevented compilition on 64 bit
platforms
5d73042
Pull up revision 1.4 (requested by dmcmahill in ticket #1209):
fix bug with static initializers which prevented compilition on 64 bit
platforms
9e01a33
ticket 1209 3fad4c9
Mar 15, 2003
Pull up revision 1.33 (requested by dmcmahill in ticket #1211):
add --disable-gtk-doc to CONFIGURE_ARGS to allow this to build without
an active X display.
cbd0ed1
Pull up revision 1.10 (requested by dmcmahill in ticket #1213):
on alpha lower optimization level on a handful of key problem files that
triggered a compiler error.   This package now builds and seems to run
on NetBSD-1.6/alpha
580702a
Pull up revision 1.6 (requested by dmcmahill in ticket #1213):
on alpha lower optimization level on a handful of key problem files that
triggered a compiler error.   This package now builds and seems to run
on NetBSD-1.6/alpha
05e08bd
Pull up revision 1.5 (requested by dmcmahill in ticket #1213):
on alpha lower optimization level on a handful of key problem files that
triggered a compiler error.   This package now builds and seems to run
on NetBSD-1.6/alpha
8c21c25
Pull up revision 1.72 (requested by salo in ticket #1214):
Updated to version 0.9.11.
(0.9.10 was improperly packaged)
17c22f0
Pull up revision 1.18 (requested by salo in ticket #1214):
Updated to version 0.9.11.
(0.9.10 was improperly packaged)
4f3f19f
Pull up revision 1.23 (requested by dmcmahill in ticket #1215):
lower optimization on 8 problem files on alpha which trigger compiler
bugs.  This package now builds on NetBSD-1.6/alpha and even seems to
run the GUI.  Audio output not verified due to lack of hardware.
152822b
Pull up revision 1.4 (requested by dmcmahill in ticket #1215):
lower optimization on 8 problem files on alpha which trigger compiler
bugs.  This package now builds on NetBSD-1.6/alpha and even seems to
run the GUI.  Audio output not verified due to lack of hardware.
ac14b0e
Pull up revision 1.8 (requested by dmcmahill in ticket #1215):
lower optimization on 8 problem files on alpha which trigger compiler
bugs.  This package now builds on NetBSD-1.6/alpha and even seems to
run the GUI.  Audio output not verified due to lack of hardware.
d901559
pullups for 1211, 1213, 1214 & 1215 70d4ef4
Pull up revision 1.2 (requested by dmcmahill in ticket #1216):
use a time_t * as the argument to time(3) to let this compile on 64 bit systems.
Fixes recently noted compile problems on alpha.
3541c10
create new file (requested by dmcmahill in ticket #1216):
use a time_t * as the argument to time(3) to let this compile on 64 bit systems.
Fixes recently noted compile problems on alpha.
e336154
ticket 1216 fa2167b
Pull up revision 1.115 (requested by taya in ticket #1208):
moz-install treated element between @comment begin DIRS & @comment end DIRS in
PLIST.
if @exec ${MKDIR} -p %D/lib/${MOZILLA}/plugins in such a section,
directory '@exec', '${MKDIR}', '-p', '%D/lib/${MOZILLA}/plugins' are created.

this commit fixes this problem.
4f121be
Pull up revision 1.6 (requested by taya in ticket #1208):
moz-install treated element between @comment begin DIRS & @comment end DIRS in
PLIST.
if @exec ${MKDIR} -p %D/lib/${MOZILLA}/plugins in such a section,
directory '@exec', '${MKDIR}', '-p', '%D/lib/${MOZILLA}/plugins' are created.

this commit fixes this problem.
82ee476
ticket 1208 d6a7b7e
Mar 17, 2003
Pull up revision 1.7 (requested by dmcmahill in ticket #1217):
don't try and do  -a because that produces 'xmkmf -a -a' which
causes an error.  This builds and runs on alpha now.
f3aff48
Pull up revision 1.2 (requested by dmcmahill in ticket #1217):
don't try and do ${XMFMF} -a because that produces 'xmkmf -a -a' which
causes an error.  This builds and runs on alpha now.
3227364
ticket #1217 c8e0edc
Make this go on non-i386 systems. Currently ocamlopt is only available
on i386 so avoid using that on non-i386 systems.  Compiles and seems to work
on alpha.
ed4995e
Update to 2.2.1.
Main changes since 2.0:
Add various translations
Add a preference to allow maintenance ops with no confirmation screen
Allow setting the number of columns in the summary screen as a user
      preference (Brian Keifer <brian@valinor.net>).
Make text, icon, or both menus a user preference
Add a Horde preferences screen, and a preference to refresh the summary
      screen.
Add text/enriched MIME_Viewer

See share/doc/horde/CHANGES for details.
263d562
Wrong branch, sorry. Back out previous. 0bf979b
Mar 20, 2003
Pull up revision 1.93 (requested by jschauma in ticket #1223):
Update mutt to 1.4.1:

 fix a buffer overflow in mutt's IMAP client code which
 was identified by Core Security Technologies, and fixed by Edmund
 Grimley Evans.  A more detailed advisory will be published by Core
 Security.
2122c28
Pull up revision 1.13 (requested by jschauma in ticket #1223):
Update mutt to 1.4.1:

 fix a buffer overflow in mutt's IMAP client code which
 was identified by Core Security Technologies, and fixed by Edmund
 Grimley Evans.  A more detailed advisory will be published by Core
 Security.
ce993f5
Pull up revision 1.4 (requested by jschauma in ticket #1223):
Update mutt to 1.4.1:

 fix a buffer overflow in mutt's IMAP client code which
 was identified by Core Security Technologies, and fixed by Edmund
 Grimley Evans.  A more detailed advisory will be published by Core
 Security.
8110c28
ticket 1223 cfaf1f0
Mar 23, 2003
Pullup rev 1.47 (requested by grant in ticket #1200)
 Default the config file to PKG_SYSCONFDIR/cdrecord.conf unless
 overridden by the user via CDRECORD_CONF.

 You must move your config file to the new location if you update!

 Patch man pages and print a MESSAGE if CDRECORD_CONF is not set to
 '/etc/default/cdrecord', as required by license.

 Bump PKGREVISION.

 Addresses PR pkg/20593 from Steven M. Bellovin.
b984f8c
Pullup rev 1.9 (requested by grant in ticket #1200)
 Default the config file to PKG_SYSCONFDIR/cdrecord.conf unless
 overridden by the user via CDRECORD_CONF.

 You must move your config file to the new location if you update!

 Patch man pages and print a MESSAGE if CDRECORD_CONF is not set to
 '/etc/default/cdrecord', as required by license.

 Bump PKGREVISION.

 Addresses PR pkg/20593 from Steven M. Bellovin.
24ef131
Pullup rev 1.133 (requested by grant in ticket #1200)
 provide CDRECORD_CONF.
5e6d774
Reformat file to be consistant with current CHANGES format:
 Tab's before all lines that have the commit info.
 PR's referenced as PR#<pr>.
 Capitalize sentences correctly. Remove misc personal attributions (ala
 thanks! XXX).

Also, added info for ticket #1200
a25b96e
Pullup rev 1.94 (requested by bouyer in ticket #1218)
        open_file_shared(): when falling back to O_RDONLY open_file() call
        after O_RDWR fails in fcbopen case, remember the errno from
        previous open_file() call and set errno back to this value if the
        second open_file() call fails too.

        This makes samba report EACCESS instead of confusing ENOENT if
        creation of file fails due to insufficient permissions for
        SMBcreate/SMBmknew call.

        Bump package revision.
3099a76
Pullup rev 1.26 (requested by bouyer in ticket #1218)
        open_file_shared(): when falling back to O_RDONLY open_file() call
        after O_RDWR fails in fcbopen case, remember the errno from
        previous open_file() call and set errno back to this value if the
        second open_file() call fails too.

        This makes samba report EACCESS instead of confusing ENOENT if
        creation of file fails due to insufficient permissions for
        SMBcreate/SMBmknew call.

        Bump package revision.
cd22085
Pullup rev 1.4 (requested by dmcmahill in ticket #1219)
 Make this go on non-i386 systems.  Currently ocamlopt is only available
 on i386 so avoid using that on non-i386 systems.  Compiles and seems to work
 on alpha.
85dd2b8
Add tickets 1218 and 1219 a172c3c
Pullup rev 1.95 (requested by bouyer in ticket #1220)
        Updated samba to 2.2.8

        ****************************************
        * IMPORTANT: Security bugfix for Samba *
        ****************************************

        The SuSE security audit team, in particular Sebastian Krahmer
        <krahmer@suse.de>, has found a flaw in the Samba main smbd code which
        could allow an external attacker to remotely and anonymously gain
        Super User (root) privileges on a server running a Samba server.

        This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a
        inclusive.  This is a serious problem and all sites should either
        upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139
        and 445. Advice created by Andrew Tridgell, the leader of the Samba
        Team, on how to protect an unpatched Samba server is given at the end
        of this section.

        The SMB/CIFS protocol implemented by Samba is vulnerable to many
        attacks, even without specific security holes.  The TCP ports 139 and
        the new port 445 (used by Win2k and the Samba 3.0 alpha code in
        particular) should never be exposed to untrusted networks.
ff1a5fd
Pullup rev 1.6 (requested by bouyer in ticket #1220)
        Updated samba to 2.2.8

        ****************************************
        * IMPORTANT: Security bugfix for Samba *
        ****************************************

        The SuSE security audit team, in particular Sebastian Krahmer
        <krahmer@suse.de>, has found a flaw in the Samba main smbd code which
        could allow an external attacker to remotely and anonymously gain
        Super User (root) privileges on a server running a Samba server.

        This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a
        inclusive.  This is a serious problem and all sites should either
        upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139
        and 445. Advice created by Andrew Tridgell, the leader of the Samba
        Team, on how to protect an unpatched Samba server is given at the end
        of this section.

        The SMB/CIFS protocol implemented by Samba is vulnerable to many
        attacks, even without specific security holes.  The TCP ports 139 and
        the new port 445 (used by Win2k and the Samba 3.0 alpha code in
        particular) should never be exposed to untrusted networks.
cbd9132
Pullup rev 1.27 (requested by bouyer in ticket #1220)
        Updated samba to 2.2.8

        ****************************************
        * IMPORTANT: Security bugfix for Samba *
        ****************************************

        The SuSE security audit team, in particular Sebastian Krahmer
        <krahmer@suse.de>, has found a flaw in the Samba main smbd code which
        could allow an external attacker to remotely and anonymously gain
        Super User (root) privileges on a server running a Samba server.

        This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a
        inclusive.  This is a serious problem and all sites should either
        upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139
        and 445. Advice created by Andrew Tridgell, the leader of the Samba
        Team, on how to protect an unpatched Samba server is given at the end
        of this section.

        The SMB/CIFS protocol implemented by Samba is vulnerable to many
        attacks, even without specific security holes.  The TCP ports 139 and
        the new port 445 (used by Win2k and the Samba 3.0 alpha code in
        particular) should never be exposed to untrusted networks.
8e088c1
Pullup rev 1.24 (requested by bouyer in ticket #1220)
        Updated samba to 2.2.8

        ****************************************
        * IMPORTANT: Security bugfix for Samba *
        ****************************************

        The SuSE security audit team, in particular Sebastian Krahmer
        <krahmer@suse.de>, has found a flaw in the Samba main smbd code which
        could allow an external attacker to remotely and anonymously gain
        Super User (root) privileges on a server running a Samba server.

        This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a
        inclusive.  This is a serious problem and all sites should either
        upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139
        and 445. Advice created by Andrew Tridgell, the leader of the Samba
        Team, on how to protect an unpatched Samba server is given at the end
        of this section.

        The SMB/CIFS protocol implemented by Samba is vulnerable to many
        attacks, even without specific security holes.  The TCP ports 139 and
        the new port 445 (used by Win2k and the Samba 3.0 alpha code in
        particular) should never be exposed to untrusted networks.
225976a
Pullup rev 1.20 (requested by bouyer in ticket #1220)
        Updated samba to 2.2.8

        ****************************************
        * IMPORTANT: Security bugfix for Samba *
        ****************************************

        The SuSE security audit team, in particular Sebastian Krahmer
        <krahmer@suse.de>, has found a flaw in the Samba main smbd code which
        could allow an external attacker to remotely and anonymously gain
        Super User (root) privileges on a server running a Samba server.

        This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a
        inclusive.  This is a serious problem and all sites should either
        upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139
        and 445. Advice created by Andrew Tridgell, the leader of the Samba
        Team, on how to protect an unpatched Samba server is given at the end
        of this section.

        The SMB/CIFS protocol implemented by Samba is vulnerable to many
        attacks, even without specific security holes.  The TCP ports 139 and
        the new port 445 (used by Win2k and the Samba 3.0 alpha code in
        particular) should never be exposed to untrusted networks.
93ee6a3
Pullup rev 1.12 (requested by bouyer in ticket #1220)
        Updated samba to 2.2.8

        ****************************************
        * IMPORTANT: Security bugfix for Samba *
        ****************************************

        The SuSE security audit team, in particular Sebastian Krahmer
        <krahmer@suse.de>, has found a flaw in the Samba main smbd code which
        could allow an external attacker to remotely and anonymously gain
        Super User (root) privileges on a server running a Samba server.

        This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a
        inclusive.  This is a serious problem and all sites should either
        upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139
        and 445. Advice created by Andrew Tridgell, the leader of the Samba
        Team, on how to protect an unpatched Samba server is given at the end
        of this section.

        The SMB/CIFS protocol implemented by Samba is vulnerable to many
        attacks, even without specific security holes.  The TCP ports 139 and
        the new port 445 (used by Win2k and the Samba 3.0 alpha code in
        particular) should never be exposed to untrusted networks.
45cfde1
Pullup rev 1.2 (requested by bouyer in ticket #1220)
        Updated samba to 2.2.8

        ****************************************
        * IMPORTANT: Security bugfix for Samba *
        ****************************************

        The SuSE security audit team, in particular Sebastian Krahmer
        <krahmer@suse.de>, has found a flaw in the Samba main smbd code which
        could allow an external attacker to remotely and anonymously gain
        Super User (root) privileges on a server running a Samba server.

        This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a
        inclusive.  This is a serious problem and all sites should either
        upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139
        and 445. Advice created by Andrew Tridgell, the leader of the Samba
        Team, on how to protect an unpatched Samba server is given at the end
        of this section.

        The SMB/CIFS protocol implemented by Samba is vulnerable to many
        attacks, even without specific security holes.  The TCP ports 139 and
        the new port 445 (used by Win2k and the Samba 3.0 alpha code in
        particular) should never be exposed to untrusted networks.
28a1f95
Add ticket 1220 for samba pullup 0e9307d
Apr 06, 2003
Pull up revisions 1.16-1.17 (requested by salo in ticket #1239):
move WRKSRC to DISTNAME section.

Bump PKGREVISION: fix several potential buffer overflows found by Timo
Sirainen <tss at iki dot fi>
fce522e
Pull up revision 1.7 (requested by salo in ticket #1239):
Bump PKGREVISION: fix several potential buffer overflows found by Timo
Sirainen <tss at iki dot fi>
0cdf424
Add new file (requested by salo in ticket #1239):
Bump PKGREVISION: fix several potential buffer overflows found by Timo
Sirainen <tss at iki dot fi>
069408f
ticket 1239 781742b
Apr 16, 2003
Create new file (requested by aymeric in ticket #1253):
Fix for wordwrap() buffer overflow, per
	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396
(Patch obtained from RedHat's php-4.2.2-8.0.7.src.rpm.)

Bump PKGREVISION.
704b01c
Pull up revision 1.19 (requested by aymeric in ticket #1253):
Fix for wordwrap() buffer overflow, per
	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396
(Patch obtained from RedHat's php-4.2.2-8.0.7.src.rpm.)

Bump PKGREVISION.
b8eb479
Pull up revision 1.32 (requested by aymeric in ticket #1253):
Fix for wordwrap() buffer overflow, per
	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396
(Patch obtained from RedHat's php-4.2.2-8.0.7.src.rpm.)

Bump PKGREVISION.
c960990
ticket 1253, whitespace police for some other entries. b22f5bd
Pull up revision 1.8 (requested by cjep in ticket #1251):
Update to Samba 2.2.8a.
[security fix]
92e7b76
Pull up revision 1.28 (requested by cjep in ticket #1251):
Update to Samba 2.2.8a.
[security fix]
723fdff
ticket 1251 2093424
Pull up revisions 1.20-1.22 (requested by aymeric in ticket #1254):
update to ircii 20030314.  changes since ircII 20021103:

  o  server's added by /server are no longer removed if they fail to connect.
  o  SEVERAL REMOTE HOLES FIXED in ctcp, status & other code
  o  fix ICB /msg to names starting with a /.  you can now /msg \/oink to send
     a message to "/oink".  if you previously were able to /msg \oink you now
     have to /msg \\oink.
  o  arithmetic "|" now works properly
  o  fix ICB /msg with a user the same name as the channel
  o  fix ICB group's and user's with comma's in them
  o  /notify and /timer always go to level crap now
  o  fix nickname response lossage
  o  fix $connect() hich was broken recently
  o  fix "irc -h" which was broken recently
  o  fix "dcc close raw" which was broken recently
f063a30
Pull up revision 1.12 (requested by aymeric in ticket #1254):
update to ircii 20030314.  changes since ircII 20021103:

  o  server's added by /server are no longer removed if they fail to connect.
  o  SEVERAL REMOTE HOLES FIXED in ctcp, status & other code
  o  fix ICB /msg to names starting with a /.  you can now /msg \/oink to send
     a message to "/oink".  if you previously were able to /msg \oink you now
     have to /msg \\oink.
  o  arithmetic "|" now works properly
  o  fix ICB /msg with a user the same name as the channel
  o  fix ICB group's and user's with comma's in them
  o  /notify and /timer always go to level crap now
  o  fix nickname response lossage
  o  fix $connect() hich was broken recently
  o  fix "irc -h" which was broken recently
  o  fix "dcc close raw" which was broken recently
28ede63
Pull up revisions 1.17-1.18 (requested by aymeric in ticket #1254):
update to ircii 20030314.  changes since ircII 20021103:

  o  server's added by /server are no longer removed if they fail to connect.
  o  SEVERAL REMOTE HOLES FIXED in ctcp, status & other code
  o  fix ICB /msg to names starting with a /.  you can now /msg \/oink to send
     a message to "/oink".  if you previously were able to /msg \oink you now
     have to /msg \\oink.
  o  arithmetic "|" now works properly
  o  fix ICB /msg with a user the same name as the channel
  o  fix ICB group's and user's with comma's in them
  o  /notify and /timer always go to level crap now
  o  fix nickname response lossage
  o  fix $connect() hich was broken recently
  o  fix "irc -h" which was broken recently
  o  fix "dcc close raw" which was broken recently
9ab1451
ticket 1254 db62af9
Pull up revision 1.9 (requested by salo in ticket #1257):
Updated to version 2.0.0.
[security fix]
e139d05
Pull up revision 1.2 (requested by salo in ticket #1257):
Updated to version 2.0.0.
[security fix]
38b3ff3
Pull up revision 1.8 (requested by salo in ticket #1257):
Updated to version 2.0.0.
[security fix]
cbf7203
Pull up revision 1.9 (requested by salo in ticket #1257):
Updated to version 2.0.0.
[security fix]
7ade9f2
Pull up revision 1.15 (requested by salo in ticket #1257):
Updated to version 2.0.0.
[security fix]
0dd8040
ticket 1257 e46b955
Apr 20, 2003
create new file (requested by jmmv in ticket #1261):
Distfile has changed in the server, no information about why... (from what
I found, they have rebuild automake stuff and it seems they fixed some bugs,
so also bump PKGREVISION).
ca4862b
Pull up revision 1.3 (requested by jmmv in ticket #1261):
Distfile has changed in the server, no information about why... (from what
I found, they have rebuild automake stuff and it seems they fixed some bugs,
so also bump PKGREVISION).
1886e7a
ticket 1261 b5a9d14
Pull up revision 1.8 (requested by hubertf in ticket #1262):
distfile updated on server.
3735012
ticket 1262 3aa949b
improve ticket 1261 description 2aec7cf
Pull up revision 1.5 (requested by salo in ticket #1259):
Bump PKGREVISION: Resale is prohibited, set RESTRICTED accordingly.
fc9b246
ticket 1259 c130ef7
Pull up revisions 1.2-1.3 (requested by hubertf in ticket #1263):
Update dictionary files to latest version.
Closes PR 19885.

move WRKSRC to DISTNAME section to appease pkglint.
cecefed
Pull up revision 1.2 (requested by hubertf in ticket #1263):
Update dictionary files to latest version.
Closes PR 19885.
f152aeb
ticket 1263 aa45921
Pull up revision 1.10 (requested by salo in ticket #1258):
Bump PKGREVISION: honour PKG_SYSCONFDIR for real.  (i thought i fixed this
                  before but apparently i did not :/)
797ddeb
Pull up revision 1.3 (requested by salo in ticket #1258):
Bump PKGREVISION: honour PKG_SYSCONFDIR for real.  (i thought i fixed this
                  before but apparently i did not :/)
d437b87
Pull up revision 1.22 (requested by salo in ticket #1258):
Bump PKGREVISION: honour PKG_SYSCONFDIR for real.  (i thought i fixed this
                  before but apparently i did not :/)
7666a64
Pull up revision 1.9 (requested by salo in ticket #1258):
Bump PKGREVISION: honour PKG_SYSCONFDIR for real.  (i thought i fixed this
                  before but apparently i did not :/)
6ebab21
Pull up revision 1.16 (requested by salo in ticket #1258):
Bump PKGREVISION: honour PKG_SYSCONFDIR for real.  (i thought i fixed this
                  before but apparently i did not :/)
00579d0
Pull up revision 1.5 (requested by salo in ticket #1258):
Bump PKGREVISION: honour PKG_SYSCONFDIR for real.  (i thought i fixed this
                  before but apparently i did not :/)
9b40abe
Pull up revision 1.10 (requested by salo in ticket #1258):
Bump PKGREVISION: honour PKG_SYSCONFDIR for real.  (i thought i fixed this
                  before but apparently i did not :/)
b442864
ticket 1258 8954446
Pull up revisions 1.2-1.4 (requested by hubertf in ticket #1264):
- don't use _USE_RPATH
- Add FILESDIR definition so the rc.d script can be installed
6146db2
ticket 1264 9946b29
Apply patch (requested by hubertf in ticket #1265):
correct distfile to allow this to build.
cde3568
ticket 1265 be47a3c
Pull up revisions 1.7-1.10 (requested by hubertf in ticket #1265,
fix of previous pullup, bad distfile correction on master site):

revision 1.10
date: 2003/04/10 01:28:24;  author: grant;  state: Exp;  lines: +3 -3
make ${PAX} usage consistent:

- group 'zrw' and 'p' args, -s last
- use the && operator consistently
- strip unneeded parens
- some whitespace cleanup
----------------------------
revision 1.9
date: 2003/03/29 12:42:36;  author: jmmv;  state: Exp;  lines: +2 -2
Place WRKSRC where it belongs, to make pkglint happy; ok'ed by wiz.
----------------------------
revision 1.8
date: 2003/02/17 07:42:21;  author: salo;  state: Exp;  lines: +2 -2
Remove trailing .1 from WRKSRC which appeared in the latest update (hi
wiz!).
----------------------------
revision 1.7
date: 2003/02/14 18:15:26;  author: wiz;  state: Exp;  lines: +2 -2
"Update" to 1.1.3.1 -- same files as in 1.1.3, but in a correct tar file
this time. Closes PR 18997. No actual change.
fb98ec9
Add new file (requested by pooka in ticket #1267):
initial patch which cvs missed the first time.
95f80cb
ticket 1267. 252afac
Pull up revision 1.21 (requested by bouyer in ticket #1235):
Update to 3.8.6.
Changelog: Fixed root exploit of slave machines
If you use the network features of apcupsd, you probably want to upgrade.
5ffdcc6
Pull up revision 1.6 (requested by bouyer in ticket #1235):
Update to 3.8.6.
Changelog: Fixed root exploit of slave machines
If you use the network features of apcupsd, you probably want to upgrade.
a9a1dff
ticket 1235 b1d3b21
Pull up revisions 1.14-1.15 (requested by jdc in ticket #1246):
- Mark NetBSD 1.6 version as imcompatible.
- bump PKGREVISION.
3d0356b
ticket 1246 4bdedf0
Pull up revisions 1.2-1.3 (requested by taca in ticket #1268):
Update samba package to samba-2.2.7b-1.0.
This fixes samba's known security problem.
091e8d6
Create new file (requested by taca in ticket #1268):
Update samba package to samba-2.2.7b-1.0.
This fixes samba's known security problem.
959df42
Pull up revision 1.3 (requested by taca in ticket #1268):
Update samba package to samba-2.2.7b-1.0.
This fixes samba's known security problem.
27a4c9c
Create new file (requested by taca in ticket #1268):
Update samba package to samba-2.2.7b-1.0.
This fixes samba's known security problem.
9f3f300
Delete file (requested by taca in ticket #1268):
Update samba package to samba-2.2.7b-1.0.
This fixes samba's known security problem.
fad26f9
Create new file (requested by taca in ticket #1268):
Update samba package to samba-2.2.7b-1.0.
This fixes samba's known security problem.
bb704d3
Pull up revision 1.2 (requested by taca in ticket #1268):
Update samba package to samba-2.2.7b-1.0.
This fixes samba's known security problem.
3eec4df
Pull up revisions 1.10-1.13 (requested by taca in ticket #1268):
Update samba package to samba-2.2.7b-1.0.
This fixes samba's known security problem.
143e096
Pull up revision 1.4 (requested by taca in ticket #1268):
Update samba package to samba-2.2.7b-1.0.
This fixes samba's known security problem.
014dc0e
Pull up revisions 1.5-1.9 (requested by taca in ticket #1268):
Update samba package to samba-2.2.7b-1.0.
This fixes samba's known security problem.
eee8299
ticket 1268 48f7c52
Apr 21, 2003
Pull up revision 1.40 (requested by tron in ticket #1247):
Use wildcard dependence on "dialog" package.
0a0bced
ticket 1247 4fdf3f9
Apr 28, 2003
Pull up revision 1.8 (requested by jmmv in ticket #1273):
s/SILIENT/SILENT/
736d61e
ticket 1273 95fa151
Jun 18, 2003
Create new file from rev 1.1 (requested by salo in ticket #1280):
Provide a buildlink structure so sed and gsed appear in buildlink/bin as some
programs require GNU sed, but refer to 'sed' directly in their scripts.
e4c8093
Jun 19, 2003
Create new file from rev 1.1 (requested by salo in ticket #1280):
Updated to version 0.9.12.

This release fixes several off-by-one and integer overflow errors
discovered by Timo Sirainen.  See the following url for more details:

  http://www.ethereal.com/appnotes/enpa-sa-00009.html
e35c15d
Pull up revisions 1.73-1.74 and 1.76 (requested by salo in ticket #12…
…80):

On solaris use gsed's buildlink2 to provide sed to configure/etc (it
requires GNU sed)

Include "bsd.prefs.mk" to fix make error invented in last commit.

Updated to version 0.9.12.

This release fixes several off-by-one and integer overflow errors
discovered by Timo Sirainen.  See the following url for more details:

  http://www.ethereal.com/appnotes/enpa-sa-00009.html
f8a392b
Pull up revision 1.2 (requested by salo in ticket #1280):
Updated to version 0.9.12.

This release fixes several off-by-one and integer overflow errors
discovered by Timo Sirainen.  See the following url for more details:

  http://www.ethereal.com/appnotes/enpa-sa-00009.html
1f81226
Pull up revision 1.8 (requested by salo in ticket #1280):
Updated to version 0.9.12.

This release fixes several off-by-one and integer overflow errors
discovered by Timo Sirainen.  See the following url for more details:

  http://www.ethereal.com/appnotes/enpa-sa-00009.html
9e2414a
Pull up revision 1.19 (requested by salo in ticket #1280):
Updated to version 0.9.12.

This release fixes several off-by-one and integer overflow errors
discovered by Timo Sirainen.  See the following url for more details:

  http://www.ethereal.com/appnotes/enpa-sa-00009.html
b4dff40
ticket 1280 a300ec0
Pull up revision 1.2 (requested by salo in ticket #1289):
PKGREVISION++
- Fix major core bug with channel mode -k * on hybrid7 servers.  For
  more information see:  http://www.securityfocus.com/archive/1/321093

Patch from BitchX CVS.
13e7576
Pull up revision 1.19 (requested by salo in ticket #1289):
PKGREVISION++
- Fix major core bug with channel mode -k * on hybrid7 servers.  For
  more information see:  http://www.securityfocus.com/archive/1/321093

Patch from BitchX CVS.
26aec93
Pull up revision 1.8 (requested by salo in ticket #1289):
PKGREVISION++
- Fix major core bug with channel mode -k * on hybrid7 servers.  For
  more information see:  http://www.securityfocus.com/archive/1/321093

Patch from BitchX CVS.
a403c96
ticket 1289 248c801
Pull up revisions 1.5-1.7 (requested by salo in ticket #1291):
Darwin has no static libz, mark it incompatible.

mark Linux zlib as incompatible to avoid using base zlib which can
cause problems with pkgsrc libtool, eg.

libtool: link: AGE `4' is greater than the current interface number `1'
libtool: link: `1:1:4' is not valid version information
libtool: install: `libz.la' is not a valid libtool archive

Added fix for CAN-2003-0107 -
Buffer overflow in the gzprintf function in zlib 1.1.4, when zlib is compiled
without vsnprintf or when long inputs are truncated using vsnprintf, allows
attackers to cause a denial of service or possibly execute arbitrary code.
From OpenBSD.

Restore configure target and add check for [v]snprintf.

Bump PKGREVISION.
cad9b98
Create new file from rev 1.3 (requested by salo in ticket #1291):
Darwin has no static libz, mark it incompatible.

mark Linux zlib as incompatible to avoid using base zlib which can
cause problems with pkgsrc libtool, eg.

libtool: link: AGE `4' is greater than the current interface number `1'
libtool: link: `1:1:4' is not valid version information
libtool: install: `libz.la' is not a valid libtool archive

Added fix for CAN-2003-0107 -
Buffer overflow in the gzprintf function in zlib 1.1.4, when zlib is compiled
without vsnprintf or when long inputs are truncated using vsnprintf, allows
attackers to cause a denial of service or possibly execute arbitrary code.
From OpenBSD.

Restore configure target and add check for [v]snprintf.

Bump PKGREVISION.
975cd0c
Create new file from rev 1.1 (requested by salo in ticket #1291):
Darwin has no static libz, mark it incompatible.

mark Linux zlib as incompatible to avoid using base zlib which can
cause problems with pkgsrc libtool, eg.

libtool: link: AGE `4' is greater than the current interface number `1'
libtool: link: `1:1:4' is not valid version information
libtool: install: `libz.la' is not a valid libtool archive

Added fix for CAN-2003-0107 -
Buffer overflow in the gzprintf function in zlib 1.1.4, when zlib is compiled
without vsnprintf or when long inputs are truncated using vsnprintf, allows
attackers to cause a denial of service or possibly execute arbitrary code.
From OpenBSD.

Restore configure target and add check for [v]snprintf.

Bump PKGREVISION.
8173b4e
Pull up revisions 1.17-1.18 (requested by salo in ticket #1291):
Darwin has no static libz, mark it incompatible.

mark Linux zlib as incompatible to avoid using base zlib which can
cause problems with pkgsrc libtool, eg.

libtool: link: AGE `4' is greater than the current interface number `1'
libtool: link: `1:1:4' is not valid version information
libtool: install: `libz.la' is not a valid libtool archive

Added fix for CAN-2003-0107 -
Buffer overflow in the gzprintf function in zlib 1.1.4, when zlib is compiled
without vsnprintf or when long inputs are truncated using vsnprintf, allows
attackers to cause a denial of service or possibly execute arbitrary code.
From OpenBSD.

Restore configure target and add check for [v]snprintf.

Bump PKGREVISION.
fc3a555
Pull up revision 1.4 (requested by salo in ticket #1291):
Added fix for CAN-2003-0107 -
Buffer overflow in the gzprintf function in zlib 1.1.4, when zlib is compiled
without vsnprintf or when long inputs are truncated using vsnprintf, allows
attackers to cause a denial of service or possibly execute arbitrary code.
From OpenBSD.

Restore configure target and add check for [v]snprintf.

Bump PKGREVISION.
58fd7b2
ticket 1291 22456de
Create new file from rev 1.1 (requested by salo in ticket #1293):
PKGREVISION++
- use included slang library, fixes various issues with colours and character
  printing (e.g., TERM=wsvt25 in color mode on wscons console or TERM=xterm in
  xterm).  From Pavel Arnost via PR pkg/21539.
- add patch from devel/libslang
7d9f2fa
Pull up revision 1.43 (requested by salo in ticket #1293):
PKGREVISION++
- use included slang library, fixes various issues with colours and character
  printing (e.g., TERM=wsvt25 in color mode on wscons console or TERM=xterm in
  xterm).  From Pavel Arnost via PR pkg/21539.
- add patch from devel/libslang
2c7bdcd
Pull up revision 1.19 (requested by salo in ticket #1293):
PKGREVISION++
- use included slang library, fixes various issues with colours and character
  printing (e.g., TERM=wsvt25 in color mode on wscons console or TERM=xterm in
  xterm).  From Pavel Arnost via PR pkg/21539.
- add patch from devel/libslang
f88c903
Pull up revision 1.7 (requested by salo in ticket #1293):
PKGREVISION++
- use included slang library, fixes various issues with colours and character
  printing (e.g., TERM=wsvt25 in color mode on wscons console or TERM=xterm in
  xterm).  From Pavel Arnost via PR pkg/21539.
- add patch from devel/libslang
4679e15
ticket 1293 cc53782
Pull up revision 1.6 (requested by salo in ticket #1294):
PKGREVISION++
- fix device handling on NetBSD ELF (from Pavel Arnost via PR
  pkg/21530)
- fix floppyd handling in better and simpler way
- don't hardcode -R, use RPATH_FLAG instead
- remove unused cruft, style nits
2f7e1a7
Pull up revision 1.5 (requested by salo in ticket #1294):
PKGREVISION++
- fix device handling on NetBSD ELF (from Pavel Arnost via PR
  pkg/21530)
- fix floppyd handling in better and simpler way
- don't hardcode -R, use RPATH_FLAG instead
- remove unused cruft, style nits
107227a
Create new file from rev 1.3 (requested by salo in ticket #1294):
PKGREVISION++
- fix device handling on NetBSD ELF (from Pavel Arnost via PR
  pkg/21530)
- fix floppyd handling in better and simpler way
- don't hardcode -R, use RPATH_FLAG instead
- remove unused cruft, style nits
8acf619
Pull up revision 1.27 (requested by salo in ticket #1294):
PKGREVISION++
- fix device handling on NetBSD ELF (from Pavel Arnost via PR
  pkg/21530)
- fix floppyd handling in better and simpler way
- don't hardcode -R, use RPATH_FLAG instead
- remove unused cruft, style nits
6741e16
Pull up revision 1.3 (requested by salo in ticket #1294):
PKGREVISION++
- fix device handling on NetBSD ELF (from Pavel Arnost via PR
  pkg/21530)
- fix floppyd handling in better and simpler way
- don't hardcode -R, use RPATH_FLAG instead
- remove unused cruft, style nits
5865184
ticket 1294 c0bc1a1
Pull up revision 1.2 (requested by hubertf in ticket #1265):
"Update" to 1.1.3.1 -- same files as in 1.1.3, but in a correct tar
file this time. Closes PR 18997. No actual change.
2252854
Jun 24, 2003
Pull up revision 1.14 (requested by tron in ticket #1335):
Update "acroread5" package to version 5.07. This version fixes a
remotely exploitable security whole in version 5.06 an older.
025871f
Pull up revision 1.2 (requested by tron in ticket #1335):
Update "acroread5" package to version 5.07. This version fixes a
remotely exploitable security whole in version 5.06 an older.
67dcdde
ticket 1335 3c46d4b
Jun 30, 2003
Create new file from rev 1.2 (requested by tron in ticket #1359):
Update "ImageMagick" and "p5-PerlMagick" packages to version 5.5.7.9.

Implement suggestion from last commit: Split out common part of
p5-PerlMagick and ImageMagick into Makefile.common.
de3ed60
Pull up revisions 1.94-1.96, 1.98 (requested by tron in ticket #1359):
Update "ImageMagick" and "p5-PerlMagick" packages to version 5.5.7.9.

Implement suggestion from last commit: Split out common part of
p5-PerlMagick and ImageMagick into Makefile.common.

Update ImageMagick and p5-PerlMagick to 5.5.6.

Changes are lots of bug fixes and minor enhancements (several pages
worth of it).

XXX Those two should probably be using a Makefile.common instead
XXX of just copying the appropriate bits.

Place WRKSRC where it belongs, to make pkglint happy; ok'ed by wiz.
3907450
Pull up revisions 1.9-1.10 (requested by tron in ticket #1359):
Update "ImageMagick" and "p5-PerlMagick" packages to version 5.5.7.9.

Update ImageMagick and p5-PerlMagick to 5.5.6.
105f61e
Pull up revisions 1.13-1.14 (requested by tron in ticket #1359):
Update "ImageMagick" and "p5-PerlMagick" packages to version 5.5.7.9.

Update ImageMagick and p5-PerlMagick to 5.5.6.
3b0c220
Pull up revisions 1.25-1.28 (requested by tron in ticket #1359):
Update "ImageMagick" and "p5-PerlMagick" packages to version 5.5.7.9.

Implement suggestion from last commit: Split out common part of
p5-PerlMagick and ImageMagick into Makefile.common.

Update ImageMagick and p5-PerlMagick to 5.5.6.

Changes are lots of bug fixes and minor enhancements (several pages
worth of it).

XXX Those two should probably be using a Makefile.common instead
XXX of just copying the appropriate bits.

Place WRKSRC where it belongs, to make pkglint happy; ok'ed by wiz.
044beb8
ticket 1359 b49b028
Aug 05, 2003
Pull up revision 1.1145 (requested by tron in ticket #1380):
Add a MASTER_SITE_APACHE variable with a bunch of apache.org mirrors.
aed993e
Pull up revisions 1.121, 1.123-1.125, 1.127, 1.131-1.132 (requested by
tron in ticket #1380):

Use MASTER_SITE_APACHE.

Update to 1.3.27nb4: compile with mod-ssl-2.8.14.
Remove quite some lint while here.

Fix fetch stage. Noted broken by grant.

be quiet in all targets except post-install.

drop some unnecessary parens

s/netbsd.org/NetBSD.org/

Update "apache" package to version 1.3.28.
c141fcf
Pull up revisions 1.26-1.27 (requested by tron in ticket #1380):
Update to 1.3.27nb4: compile with mod-ssl-2.8.14.
Remove quite some lint while here.

Update "apache" package to version 1.3.28.
6104558
Pull up revision 1.8 (requested by x in ticket #1380):
Update "apache" package to version 1.3.28.
7914767
ticket 1380 0aa114f
Create new file from rev 1.1 (requested by tron in ticket #1381):
Update to 2.8.14.
853230e
Pull up revisions 1.68, 1.71-1.72 (requested by tron in ticket #1381):
Update to 2.8.14.

s/netbsd.org/NetBSD.org/

Update "ap-ssl" package to version 2.8.15.
400205d
Pull up revisions 1.17-1.18 (requested by tron in ticket #1381):
Update to 2.8.14.

Update "ap-ssl" package to version 2.8.15.
2820449
ticket 1381 0f49749
Oct 22, 2003
Pullup rev 1.11 (requested by dmcmahill in ticket #1382)
Wildcard dialog depends.
f881a90
#1382 e079d09
Pullup via hand patch against date 20030812 (requested by dmcmahill in
ticket #1407)

  Update to ethereal-0.9.14 to address known security issues.
  In addition several other bugs have been fixed.
a137ae5
#1407 e8c3994
Pullup rev 1.5 (via patch) (requested by bouyer in ticket #1419)
Update horde to 2.2.4rc1 and imp to 3.2.2rc1, for the "session fixation" security problem.
9cc5379
Pullup rev 1.24 (via patch) (requested by bouyer in ticket #1419)
Update horde to 2.2.4rc1 and imp to 3.2.2rc1, for the "session fixation" security problem.
f8098c3
Pullup rev 1.5 (via patch) (requested by bouyer in ticket #1419)
Update horde to 2.2.4rc1 and imp to 3.2.2rc1, for the "session fixation" security problem.
5a13a60
Pullup rev 1.8 (via patch) (requested by bouyer in ticket #1419)
Update horde to 2.2.4rc1 and imp to 3.2.2rc1, for the "session fixation" security problem.
5ecfc7c
Pullup rev 1.4 (via patch) (requested by bouyer in ticket #1419)
Update horde to 2.2.4rc1 and imp to 3.2.2rc1, for the "session fixation" security problem.
724b273
Pullup rev 1.2 (via patch) (requested by bouyer in ticket #1419)
Update horde to 2.2.4rc1 and imp to 3.2.2rc1, for the "session fixation" security problem.
1a054aa
Pullup rev 1.6 (via patch) (requested by bouyer in ticket #1419)
Update horde to 2.2.4rc1 and imp to 3.2.2rc1, for the "session fixation" security problem.
48a9a7b
Pullup rev 1.21 (via patch) (requested by bouyer in ticket #1419)
Update horde to 2.2.4rc1 and imp to 3.2.2rc1, for the "session fixation" security problem.
5b51237
Pullup rev 1.5 (via patch) (requested by bouyer in ticket #1419)
Update horde to 2.2.4rc1 and imp to 3.2.2rc1, for the "session fixation" security problem.
17025fc
Pullup rev 1.8 (via patch) (requested by bouyer in ticket #1419)
Update horde to 2.2.4rc1 and imp to 3.2.2rc1, for the "session fixation" security problem.
8ed062f
#1419 ee49664
Oct 23, 2003
Pullup rev 1.26 (requested by bouyer in ticket #1467)
Update to 2.2.4, based on patch from Adrian Portelli in PR#22629.
Changes since 2.2.4rc1:
SECURITY: Add dereferer to strip off session information from links to
the outside of the Horde system to protect against session hijacking.
Fix a bug with importing vCard 2.1 data.
Add Arabic (Syria) translation.
d897aa9
Pullup rev 1.6 (requested by bouyer in ticket #1467)
Update to 2.2.4, based on patch from Adrian Portelli in PR#22629.
Changes since 2.2.4rc1:
SECURITY: Add dereferer to strip off session information from links to
the outside of the Horde system to protect against session hijacking.
Fix a bug with importing vCard 2.1 data.
Add Arabic (Syria) translation.
8187504
Pullup rev 1.9 (requested by bouyer in ticket #1467)
Update to 2.2.4, based on patch from Adrian Portelli in PR#22629.
Changes since 2.2.4rc1:
SECURITY: Add dereferer to strip off session information from links to
the outside of the Horde system to protect against session hijacking.
Fix a bug with importing vCard 2.1 data.
Add Arabic (Syria) translation.
eee7e2e
#1467 26bba8e
Pullup rev 1.22 (requested by bouyer in ticket #1468)
Update to 3.2.2, based on patch from Adrian Portelli in PR#22656
f2110ce
Pullup rev 1.7 (via patch) (requested by bouyer in ticket #1468)
Update to 3.2.2, based on patch from Adrian Portelli in PR#22656
32a76cf
Pullup rev 1.9 (requested by bouyer in ticket #1468)
Update to 3.2.2, based on patch from Adrian Portelli in PR#22656
9d9022c
#1468 32d2095
Something went wrong with that request. Please try again.