Commit graph

15 commits

Author SHA1 Message Date
Trevor Johnson
396e63911f Add sizes. 2004-02-06 01:06:40 +00:00
Trevor Johnson
4d61a0ed94 Use the latest glibc packages. Changes are described at
<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0689>,
<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0859>
and <URL:https://rhn.redhat.com/errata/RHSA-2003-325.html>.
2003-12-04 03:41:30 +00:00
Trevor Johnson
098ed299a5 Remove the XFree86-libs RPM from here (see ports/x11/linux-XFree86-libs). 2003-11-19 16:12:24 +00:00
Trevor Johnson
f730b9000c Add the libattr, libacl, libelf, and bzip2-libs packages, needed
by programs such as mv (used in installation); remove librpm404 and
rpm404-python which are unused.  Make rpm an EXTRACT_DEPENDS rather
than BUILD_DEPENDS, based on Phil Pennock's suggestion for the
sgifonts port.

Submitted by:	Frank Reppin (adding libattr and libacl)
2003-07-21 00:44:28 +00:00
Trevor Johnson
43a3ce9a00 security fix: update the XFree86 libraries to 4.2.1 because of
what is described at <URL:http://www.xfree86.org/security/> as "an
Xlib problem that made it possible to load (and execute) arbitrary
code in privileged clients"

"local users [may] gain root privileges via a modified LD_PRELOAD
environment variable that points to a malicious module"
--CAN-2002-1472
<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1472>

The hash matches the one in RHSA-2003:067-19 at
<URL:http://rhn.redhat.com/errata/RHSA-2003-067.html>.
2003-07-03 16:35:54 +00:00
Trevor Johnson
a62f32ec86 new i386-only linux_base port, which installs bits from release 8.0
of a Linux distribution
2003-07-03 14:29:29 +00:00
Trevor Johnson
885cb8d505 security update:
The function gzprintf within zlib, when called with a string
	longer than Z_PRINTF_BUFZISE (= 4096 bytes), can overflow
	without giving a warning.  zlib-1.1.4 and earlier exhibit
	this behavior. There are no known exploits of the gzprintf
	overrun, and only a few programs, including rpm2html and
	gimp-print, are known to use the gzprintf function.  The
	problem has been fixed by checking the length of the output
	string within gzprintf.

--<URL:http://rhn.redhat.com/errata/RHSA-2003-079.html>
2003-06-01 08:23:28 +00:00
Trevor Johnson
f0b43969f2 For i386, update glibc and for the Alpha, mark forbidden due to
remotely exploitable RPC bug (Red Hat advisory RHSA-2003-089 and
CERT advisory CA-2003-10).

According to <URL:http://www.redhat.com/apps/support/errata/>, "all
errata support for Alpha products, Sparc products, and Powertools
products have reached end of life."

I didn't do proper run-time testing of this, but "make package
deinstall" leaves a clean /compat/linux/ behind.
2003-04-08 21:22:45 +00:00
Marcel Moolenaar
ee41069f85 Duplicate the two different MD5 checksums for redhat-release-*.rpm
in both distinfo files. The alpha and i386 versions are identical
except for some meta-data.

Requested by: trevor
2002-12-10 03:04:57 +00:00
Marcel Moolenaar
950671e1f4 Fix both alpha and i386. The major change is that glibc has been
updated.

Reviewed by: kris
2002-12-03 06:27:50 +00:00
Trevor Johnson
e7bfaf6db7 The redhat-release-7.1-1.noarch.rpm from Red Hat 7.1/Alpha has a
different MD5 hash from the corresponding package from 7.1/i386.
The contained etc/redhat-release files have the same contents but
different time stamps.  By having both hashes in both distinfo
files, installation can proceed for users who share the same distfile
cache for both architectures.
2002-09-26 16:21:32 +00:00
Trevor Johnson
48f343aba0 Update glibc to 2.2.4-29, to avoid resolver and RPC security bugs. 2002-08-28 11:43:54 +00:00
David E. O'Brien
02709ab678 Upgrade to Red Hat 7.x support. Many binary-only packages are now requiring
Red Hat 7.x to run.
2002-05-28 02:35:23 +00:00
Trevor Johnson
48d1b32f61 Update for zlib "double free" security bug
(http://www.redhat.com/support/errata/RHSA-2002-026.html).  I only
tested this on i386.
2002-03-12 13:44:43 +00:00
Marcel Moolenaar
9782a69b13 Upgrade to Red Hat 6.1. The port also allows installing updates,
which makes it easier to keep it up to date.

Thanks to: Sean O'Connell (sean@stat.duke.edu) for his support.
2000-01-05 23:25:43 +00:00