aboutsummaryrefslogtreecommitdiff
path: root/emulators/linux_base-8/distinfo.i386
Commit message (Collapse)AuthorAgeFilesLines
* Add sizes.Trevor Johnson2004-02-061-0/+33
| | | | Notes: svn path=/head/; revision=100096
* Use the latest glibc packages. Changes are described atTrevor Johnson2003-12-041-2/+2
| | | | | | | | | <URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0689>, <URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0859> and <URL:https://rhn.redhat.com/errata/RHSA-2003-325.html>. Notes: svn path=/head/; revision=94868
* Remove the XFree86-libs RPM from here (see ports/x11/linux-XFree86-libs).Trevor Johnson2003-11-191-1/+1
| | | | Notes: svn path=/head/; revision=94392
* Add the libattr, libacl, libelf, and bzip2-libs packages, neededTrevor Johnson2003-07-211-2/+4
| | | | | | | | | | | | by programs such as mv (used in installation); remove librpm404 and rpm404-python which are unused. Make rpm an EXTRACT_DEPENDS rather than BUILD_DEPENDS, based on Phil Pennock's suggestion for the sgifonts port. Submitted by: Frank Reppin (adding libattr and libacl) Notes: svn path=/head/; revision=85257
* security fix: update the XFree86 libraries to 4.2.1 because ofTrevor Johnson2003-07-031-1/+1
| | | | | | | | | | | | | | | | | what is described at <URL:http://www.xfree86.org/security/> as "an Xlib problem that made it possible to load (and execute) arbitrary code in privileged clients" "local users [may] gain root privileges via a modified LD_PRELOAD environment variable that points to a malicious module" --CAN-2002-1472 <URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1472> The hash matches the one in RHSA-2003:067-19 at <URL:http://rhn.redhat.com/errata/RHSA-2003-067.html>. Notes: svn path=/head/; revision=84158
* new i386-only linux_base port, which installs bits from release 8.0Trevor Johnson2003-07-031-30/+32
| | | | | | | of a Linux distribution Notes: svn path=/head/; revision=84138
* security update:Trevor Johnson2003-06-011-1/+1
| | | | | | | | | | | | | | | | The function gzprintf within zlib, when called with a string longer than Z_PRINTF_BUFZISE (= 4096 bytes), can overflow without giving a warning. zlib-1.1.4 and earlier exhibit this behavior. There are no known exploits of the gzprintf overrun, and only a few programs, including rpm2html and gimp-print, are known to use the gzprintf function. The problem has been fixed by checking the length of the output string within gzprintf. --<URL:http://rhn.redhat.com/errata/RHSA-2003-079.html> Notes: svn path=/head/; revision=81876
* For i386, update glibc and for the Alpha, mark forbidden due toTrevor Johnson2003-04-081-2/+2
| | | | | | | | | | | | | | | remotely exploitable RPC bug (Red Hat advisory RHSA-2003-089 and CERT advisory CA-2003-10). According to <URL:http://www.redhat.com/apps/support/errata/>, "all errata support for Alpha products, Sparc products, and Powertools products have reached end of life." I didn't do proper run-time testing of this, but "make package deinstall" leaves a clean /compat/linux/ behind. Notes: svn path=/head/; revision=78624
* Duplicate the two different MD5 checksums for redhat-release-*.rpmMarcel Moolenaar2002-12-101-0/+1
| | | | | | | | | | in both distinfo files. The alpha and i386 versions are identical except for some meta-data. Requested by: trevor Notes: svn path=/head/; revision=71487
* Fix both alpha and i386. The major change is that glibc has beenMarcel Moolenaar2002-12-031-5/+4
| | | | | | | | | updated. Reviewed by: kris Notes: svn path=/head/; revision=71347
* The redhat-release-7.1-1.noarch.rpm from Red Hat 7.1/Alpha has aTrevor Johnson2002-09-261-0/+1
| | | | | | | | | | | different MD5 hash from the corresponding package from 7.1/i386. The contained etc/redhat-release files have the same contents but different time stamps. By having both hashes in both distinfo files, installation can proceed for users who share the same distfile cache for both architectures. Notes: svn path=/head/; revision=67152
* Update glibc to 2.2.4-29, to avoid resolver and RPC security bugs.Trevor Johnson2002-08-281-2/+2
| | | | Notes: svn path=/head/; revision=65171
* Upgrade to Red Hat 7.x support. Many binary-only packages are now requiringDavid E. O'Brien2002-05-281-31/+29
| | | | | | | Red Hat 7.x to run. Notes: svn path=/head/; revision=60161
* Update for zlib "double free" security bugTrevor Johnson2002-03-121-1/+1
| | | | | | | | (http://www.redhat.com/support/errata/RHSA-2002-026.html). I only tested this on i386. Notes: svn path=/head/; revision=55932
* Upgrade to Red Hat 6.1. The port also allows installing updates,Marcel Moolenaar2000-01-051-0/+31
which makes it easier to keep it up to date. Thanks to: Sean O'Connell (sean@stat.duke.edu) for his support. Notes: svn path=/head/; revision=24459