Use the 1.2.8p distribution, bump PKGREVISION to 2.

Fixes vulnerability:  http://xforce.iss.net/xforce/alerts/id/154
This commit is contained in:
kim 2003-09-23 18:26:05 +00:00
parent 2f15782207
commit 8646a84042
2 changed files with 9 additions and 6 deletions

View file

@ -1,7 +1,8 @@
# $NetBSD: Makefile,v 1.9 2003/07/17 22:51:40 grant Exp $
# $NetBSD: Makefile,v 1.10 2003/09/23 18:26:05 kim Exp $
DISTNAME= proftpd-1.2.8
PKGREVISION= 1
PKGNAME= proftpd-1.2.8
DISTNAME= proftpd-1.2.8p
PKGREVISION= 2
CATEGORIES= net
MASTER_SITES= ftp://ftp.proftpd.org/distrib/source/
EXTRACT_SUFX= .tar.bz2
@ -10,6 +11,8 @@ MAINTAINER= martti@NetBSD.org
HOMEPAGE= http://www.proftpd.org/
COMMENT= FTP server with Apache like configuration
WRKSRC= ${WRKDIR}/${PKGNAME_NOREV}
GNU_CONFIGURE= # defined
USE_GMAKE= # defined
USE_PKGINSTALL= YES

View file

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.5 2003/03/05 09:05:34 martti Exp $
$NetBSD: distinfo,v 1.6 2003/09/23 18:26:05 kim Exp $
SHA1 (proftpd-1.2.8.tar.bz2) = 024c597e9c5fbe77ed41ded02787f4d7878ef8a2
Size (proftpd-1.2.8.tar.bz2) = 746193 bytes
SHA1 (proftpd-1.2.8p.tar.bz2) = 42be00b9e8c80c4ad473c421adad772b94633672
Size (proftpd-1.2.8p.tar.bz2) = 746173 bytes
SHA1 (patch-aa) = f9290fb6035dc8c799731ef704c3fa33586dec87