mirror of
https://github.com/flatcar/scripts.git
synced 2025-08-18 10:27:00 +02:00
commit
32c126e530
@ -1,10 +1 @@
|
||||
AUX nasm-2.13.01-fix-docdir.patch 5536 SHA256 886cc7ca0b0bb8652c82f5ce3a6de8792f118b28fa839bea4d3e0ccf75355537 SHA512 22bbfac66b75451345a1f3d19816ecc35397c9b95f16f7dffdf8dbde9055bb035880f5cb081686c42ce3f448e250a29c9440775aad929a7e36c1325e6bbc88d7 WHIRLPOOL b2da2a063fe835c0c75e1d58bb6b3c90afa00cbc2417edb942df6cc90701f95edf8b0f4bce982a21806aca671e2a50273448e83be3faf15b02b4004c2a4cca32
|
||||
DIST nasm-2.11.08.tar.xz 764872 SHA256 c99467c7072211c550d147640d8a1a0aa4d636d4d8cf849f3bf4317d900a1f7f SHA512 f7caf42d0fe1b850de13180a1f363e34a6d44a02696312dd8f12f4116ad1c1f3d01e6606c3a79fb881e76fc70d20894d85b333c84a75d60265ff9551f7b8cde4 WHIRLPOOL d13f342d59aedf2510347f847a2f5fb276a3bdb9e7b8c5cac6ac4e204a03ea31e477adc19facbf68f939245aae72971b232f1a0fc461ef554458f8956403c623
|
||||
DIST nasm-2.12.01.tar.xz 780112 SHA256 9dbba1ce620512e435ba57e69e811fe8e07d04359e47e0a0b5e94a5dd8367489 SHA512 c016b2b26f2ef00fe8de673dc7b2effa55ddd23d1f15145380c2767a2cd4a5c60c77732faebcd5868b325f780c0bf76a5e0c49eb6189609b21e2493d2af9347c WHIRLPOOL 4659275043c947461a03450efe184a425019aa99b30607c33b1dd302dd02091a9f1dfaf80382c4466b7df295bc09add6ad9587e3050ea4567a4605f956e1bcdd
|
||||
DIST nasm-2.13.01.tar.xz 800244 SHA256 aa0213008f0433ecbe07bb628506a5c4be8079be20fc3532a5031fd639db9a5e SHA512 6561a2efb3ffea77a1a8cd364edf1ecedb2c14e1902469d7c59d743f25ca612529113d1099818abbe0a9f2592f12604f1810855bbdf8dc9de3648094a83529ae WHIRLPOOL dfc7018acfb51cdd3988da6abd157a29d72fdcd233862de4eb09debd65560280a0d7a7aa8f76f0e0c546861272d533f57d3dacd52add16a894dbc026a913d1c5
|
||||
EBUILD nasm-2.11.08.ebuild 823 SHA256 dbbaff01dfbed8747b8e12f00dd2d4882c381a230a7ba6a7191670d12b9959b3 SHA512 d91efdd2f128087650e692210f2f6b50caae8b1364d255854b1592d0cd2e411859d66e2ed2d698de8e4550e8b0c306d73261fa23d344b4b472b241d5928f4ff5 WHIRLPOOL 80a5cce837ba2ea31fbcc8534fab815cd39ed465da2237bec1ca505b8022e85e9dff0192bd593d757f98f84a8023597722f0560b47658b5f3fa05ce47171e584
|
||||
EBUILD nasm-2.12.01.ebuild 826 SHA256 12ea2c411ee54729685aea58991ac05da520d2ddd63f5afae10719f031da76ac SHA512 011a6594157b7bd2df8203dd523edf2bd9159e8c606ba0e59a9ebf75a127c0b6c32be00e95f989b274714ab4cdef881b36e9151d475aac7c882806045333671f WHIRLPOOL 5bc7fa797029347a5018d19500a3634ae33c367b65e24129da5c4d7f1335550cb63925ae5518c92dc13cb033bfdc20c77f067bfdfa897eb0604ba87d6b029fb7
|
||||
EBUILD nasm-2.13.01.ebuild 807 SHA256 233c71bba2d735be6812925cb64a0d7ed0e7f135f32de41b82279bca3f8add08 SHA512 d25c8d7c6d70982c4140e7ed906d08e1ba6e7c300ea0dd686bc748bcb040a00f217cf837ab11bb65357ec8b32de836ba7fc81d10b4152f8dda13c81e8bb52598 WHIRLPOOL a46eead45d09f2b341c966abe22bb896a97ba4911e1aa06216ad5dafd597002fb0350f21821e994bc10818b995db2c19dff9343658e68ff7d4fff406b4db67f7
|
||||
MISC ChangeLog 3607 SHA256 4fc4a23d8f54d5fdee13f0ca83d4a99cc08e33bbdcc31d50281b526208345637 SHA512 9dd7abd0e3d1d2005430fdd264c61bd6f8e7e4bfebf9d2d420f8ad66147836b845f557f270a839f70d769a445486b0597a4207d5d56683acd23f03e0ea4caae0 WHIRLPOOL b9fa8b2f314fef762ad10a0390a72355713a5f1443a7a5cd4556f4efb3ef1cb8618fda78e6b87a6041211771d2377b324f1087e569a47e55bed6b47aaa1175c8
|
||||
MISC ChangeLog-2015 16260 SHA256 463417428e7292fe03116c42f47f71a0e4f7c3c2b3f6fe14766c78d95f583c74 SHA512 f281c9f702d3e48bb354310867731065e3cc53f4ef9e757c3d3b4d372ab840f33535358a2c5534846a70c355ac3f08c86c1db0e0e7c30ad06c1707aae7710ebf WHIRLPOOL b8d892c078ec19dd57fbefe585872d82f7be65ab906564f3c9719c2ec6e115dac6f26cad33e3ff0521f45eb4d32d7597283638a0f5f7794b9ccfcdc2b62ad7fd
|
||||
MISC metadata.xml 870 SHA256 7cff6c25e006b869e6229a3a6ac109d7f37aa7c24a39dfe2bbfeef57528e3623 SHA512 17b926c02760e286ff9ae9b11982560cfecf1c2ad46839ad36956b7e00ad76967dc296ac2457fb617a905b6a338b16b95aebc132a233537e3663340825b5b2d6 WHIRLPOOL db1b0dd7d74afbab6a81bf614b00b5d52e097a1e0d4674093e06e95021133e3c9303c79c46c83f7e13726bb773c8b920f5311015daace8a9dd5c6c76924e4fbe
|
||||
DIST nasm-2.14.02.tar.xz 827620 BLAKE2B deb1f3c806ffbe48eefe4163271c68f02a782f75f21980331cb03e64de20da61c118621536c1c869c1629e558cab45ce98fed8443d29c1126fb4255cd6a36ce4 SHA512 c7a228095f37321d57f2813d04f58ee66949e8f81fc49ef6c4ecd391301e308217583ce1a265d4fe8c13d54b5b9c72aeb132caa3caee36e31b6555fbfff34c81
|
||||
|
@ -1,177 +0,0 @@
|
||||
From 1c369c46fd2cceeb6abe46b89fc539960a6c0c88 Mon Sep 17 00:00:00 2001
|
||||
From: David Seifert <soap@gentoo.org>
|
||||
Date: Sat, 1 Jul 2017 19:42:50 -0700
|
||||
Subject: [PATCH] Make buildsystem respect GNU conventions
|
||||
|
||||
* CPPFLAGS is a user variable and should be respected
|
||||
when compiling .c files. Think of -D_FORTIFY_SOURCE=2.
|
||||
* Pass ALL_CFLAGS when linking too. This is recommended
|
||||
for certain edge cases (-flto)
|
||||
* Use DESTDIR instead of INSTALLROOT for staging dir
|
||||
Every other build system (Automake, CMake, Meson) uses
|
||||
DESTDIR. This integrates better into distro and other
|
||||
build systems that have standard hooks for DESTDIR.
|
||||
* $(MAKE) -C <dir> is better than cd'ing into a <dir>
|
||||
* Use Autoconf's ${docdir} and ${htmldir} for installing
|
||||
the documentation. This makes handling documentation
|
||||
easier and respects user choice.
|
||||
---
|
||||
Makefile.in | 41 +++++++++++++++++++++--------------------
|
||||
doc/Makefile.in | 13 ++++++++-----
|
||||
2 files changed, 29 insertions(+), 25 deletions(-)
|
||||
|
||||
diff --git a/Makefile.in b/Makefile.in
|
||||
index a48d980..e7f01e4 100644
|
||||
--- a/Makefile.in
|
||||
+++ b/Makefile.in
|
||||
@@ -20,6 +20,7 @@ datarootdir = @datarootdir@
|
||||
|
||||
CC = @CC@
|
||||
CFLAGS = @CFLAGS@
|
||||
+CPPFLAGS = @CPPFLAGS@
|
||||
BUILD_CFLAGS = $(CFLAGS) @DEFS@
|
||||
INTERNAL_CFLAGS = -I$(srcdir) -I$(objdir) \
|
||||
-I$(srcdir)/include -I$(objdir)/include \
|
||||
@@ -72,13 +73,13 @@ endif
|
||||
.PHONY: manpages nsis
|
||||
|
||||
.c.$(O):
|
||||
- $(CC) -c $(ALL_CFLAGS) -o $@ $<
|
||||
+ $(CC) -c $(CPPFLAGS) $(ALL_CFLAGS) -o $@ $<
|
||||
|
||||
.c.s:
|
||||
- $(CC) -S $(ALL_CFLAGS) -o $@ $<
|
||||
+ $(CC) -S $(CPPFLAGS) $(ALL_CFLAGS) -o $@ $<
|
||||
|
||||
.c.i:
|
||||
- $(CC) -E $(ALL_CFLAGS) -o $@ $<
|
||||
+ $(CC) -E $(CPPFLAGS) $(ALL_CFLAGS) -o $@ $<
|
||||
|
||||
.txt.xml:
|
||||
$(ASCIIDOC) -b docbook -d manpage -o $@ $<
|
||||
@@ -88,7 +89,7 @@ endif
|
||||
|
||||
# This rule is only used for rdoff, to allow common rules
|
||||
.$(O)$(X):
|
||||
- $(CC) $(LDFLAGS) -o $@ $< $(RDFLIB) $(NASMLIB) $(LIBS)
|
||||
+ $(CC) $(ALL_CFLAGS) $(LDFLAGS) -o $@ $< $(RDFLIB) $(NASMLIB) $(LIBS)
|
||||
|
||||
#-- Begin File Lists --#
|
||||
NASM = asm/nasm.$(O)
|
||||
@@ -152,10 +153,10 @@ $(NASMLIB): $(LIBOBJ)
|
||||
$(RANLIB) $(NASMLIB)
|
||||
|
||||
nasm$(X): $(NASM) $(NASMLIB)
|
||||
- $(CC) $(LDFLAGS) -o nasm$(X) $(NASM) $(NASMLIB) $(LIBS)
|
||||
+ $(CC) $(ALL_CFLAGS) $(LDFLAGS) -o nasm$(X) $(NASM) $(NASMLIB) $(LIBS)
|
||||
|
||||
ndisasm$(X): $(NDISASM) $(NASMLIB)
|
||||
- $(CC) $(LDFLAGS) -o ndisasm$(X) $(NDISASM) $(NASMLIB) $(LIBS)
|
||||
+ $(CC) $(ALL_CFLAGS) $(LDFLAGS) -o ndisasm$(X) $(NDISASM) $(NASMLIB) $(LIBS)
|
||||
|
||||
#-- Begin Generated File Rules --#
|
||||
|
||||
@@ -335,12 +336,12 @@ nsis: nsis/nasm.nsi nsis/arch.nsh nsis/version.nsh
|
||||
manpages: nasm.1 ndisasm.1
|
||||
|
||||
install: nasm$(X) ndisasm$(X)
|
||||
- $(MKDIR) -p $(INSTALLROOT)$(bindir)
|
||||
- $(INSTALL_PROGRAM) nasm$(X) $(INSTALLROOT)$(bindir)/nasm$(X)
|
||||
- $(INSTALL_PROGRAM) ndisasm$(X) $(INSTALLROOT)$(bindir)/ndisasm$(X)
|
||||
- $(MKDIR) -p $(INSTALLROOT)$(mandir)/man1
|
||||
- $(INSTALL_DATA) $(srcdir)/nasm.1 $(INSTALLROOT)$(mandir)/man1/nasm.1
|
||||
- $(INSTALL_DATA) $(srcdir)/ndisasm.1 $(INSTALLROOT)$(mandir)/man1/ndisasm.1
|
||||
+ $(MKDIR) -p $(DESTDIR)$(bindir)
|
||||
+ $(INSTALL_PROGRAM) nasm$(X) $(DESTDIR)$(bindir)/nasm$(X)
|
||||
+ $(INSTALL_PROGRAM) ndisasm$(X) $(DESTDIR)$(bindir)/ndisasm$(X)
|
||||
+ $(MKDIR) -p $(DESTDIR)$(mandir)/man1
|
||||
+ $(INSTALL_DATA) $(srcdir)/nasm.1 $(DESTDIR)$(mandir)/man1/nasm.1
|
||||
+ $(INSTALL_DATA) $(srcdir)/ndisasm.1 $(DESTDIR)$(mandir)/man1/ndisasm.1
|
||||
|
||||
clean:
|
||||
for d in . $(SUBDIRS) $(XSUBDIRS); do \
|
||||
@@ -364,7 +365,7 @@ distclean: clean
|
||||
|
||||
cleaner: clean
|
||||
$(RM_F) $(PERLREQ) *.1 nasm.spec
|
||||
- cd doc && $(MAKE) clean
|
||||
+ $(MAKE) -C doc clean
|
||||
|
||||
spotless: distclean cleaner
|
||||
$(RM_F) doc/Makefile
|
||||
@@ -386,23 +387,23 @@ cscope:
|
||||
cscope -b -f cscope.out
|
||||
|
||||
rdf_install install_rdf install_rdoff:
|
||||
- $(MKDIR) -p $(INSTALLROOT)$(bindir)
|
||||
+ $(MKDIR) -p $(DESTDIR)$(bindir)
|
||||
for f in $(RDFPROGS); do \
|
||||
- $(INSTALL_PROGRAM) "$$f" '$(INSTALLROOT)$(bindir)'/ ; \
|
||||
+ $(INSTALL_PROGRAM) "$$f" '$(DESTDIR)$(bindir)'/ ; \
|
||||
done
|
||||
- cd '$(INSTALLROOT)$(bindir)' && \
|
||||
+ cd '$(DESTDIR)$(bindir)' && \
|
||||
for f in $(RDF2BINLINKS); do \
|
||||
bn=`basename "$$f"` && $(RM_F) "$$bn" && \
|
||||
$(LN_S) rdf2bin$(X) "$$bn" ; \
|
||||
done
|
||||
- $(MKDIR) -p $(INSTALLROOT)$(mandir)/man1
|
||||
- $(INSTALL_DATA) $(srcdir)/rdoff/*.1 $(INSTALLROOT)$(mandir)/man1/
|
||||
+ $(MKDIR) -p $(DESTDIR)$(mandir)/man1
|
||||
+ $(INSTALL_DATA) $(srcdir)/rdoff/*.1 $(DESTDIR)$(mandir)/man1/
|
||||
|
||||
doc:
|
||||
- cd doc && $(MAKE) all
|
||||
+ $(MAKE) -C doc all
|
||||
|
||||
doc_install install_doc:
|
||||
- cd doc && $(MAKE) install
|
||||
+ $(MAKE) -C doc install
|
||||
|
||||
everything: all manpages doc rdf
|
||||
|
||||
diff --git a/doc/Makefile.in b/doc/Makefile.in
|
||||
index 2ddfd1e..261a791 100644
|
||||
--- a/doc/Makefile.in
|
||||
+++ b/doc/Makefile.in
|
||||
@@ -9,7 +9,8 @@ prefix = @prefix@
|
||||
exec_prefix = @exec_prefix@
|
||||
bindir = @bindir@
|
||||
mandir = @mandir@
|
||||
-docdir = $(prefix)/doc/nasm
|
||||
+docdir = @docdir@
|
||||
+htmldir = @htmldir@
|
||||
infodir = @infodir@
|
||||
datarootdir = @datarootdir@
|
||||
|
||||
@@ -21,6 +22,7 @@ PERL = perl -I$(srcdir)
|
||||
|
||||
PDFOPT = @PDFOPT@
|
||||
|
||||
+MKDIR = mkdir
|
||||
RM_F = rm -f
|
||||
RM_RF = rm -rf
|
||||
CP_F = cp -f
|
||||
@@ -41,7 +43,7 @@ inslist.src: inslist.pl ../x86/insns.dat
|
||||
|
||||
.PHONY: html
|
||||
html: $(HTMLAUX)
|
||||
- mkdir -p html
|
||||
+ $(MKDIR) -p html
|
||||
for f in $(HTMLAUX); do $(CP_UF) "$(srcdir)/$$f" html/; done
|
||||
$(MAKE) html/nasmdoc0.html
|
||||
|
||||
@@ -81,6 +83,7 @@ spotless: clean
|
||||
-$(RM_F) *.hlp nasmdoc.txt *.inf *.pdf *.dvi
|
||||
|
||||
install: all
|
||||
- mkdir -p $(INSTALLROOT)$(docdir)/html
|
||||
- $(INSTALL_DATA) html/* $(INSTALLROOT)$(docdir)/html
|
||||
- $(INSTALL_DATA) nasmdoc.pdf nasmdoc.txt $(INSTALLROOT)$(docdir)
|
||||
+ $(MKDIR) -p $(DESTDIR)$(htmldir)
|
||||
+ $(INSTALL_DATA) html/* $(DESTDIR)$(htmldir)
|
||||
+ $(MKDIR) -p $(DESTDIR)$(docdir)
|
||||
+ $(INSTALL_DATA) nasmdoc.pdf nasmdoc.txt $(DESTDIR)$(docdir)
|
||||
--
|
||||
2.13.2
|
||||
|
15
sdk_container/src/third_party/portage-stable/dev-lang/nasm/files/nasm-2.13.03-bsd-cp-doc.patch
vendored
Normal file
15
sdk_container/src/third_party/portage-stable/dev-lang/nasm/files/nasm-2.13.03-bsd-cp-doc.patch
vendored
Normal file
@ -0,0 +1,15 @@
|
||||
Avoid 'cp -u' as it's not portable.
|
||||
|
||||
In this case we can unconditionally copy files.
|
||||
|
||||
Reported-by: Michał Górny
|
||||
Bug: https://bugs.gentoo.org/655444
|
||||
diff --git a/doc/Makefile.in b/doc/Makefile.in
|
||||
index 261a791..bc9da1e 100644
|
||||
--- a/doc/Makefile.in
|
||||
+++ b/doc/Makefile.in
|
||||
@@ -28,3 +28,3 @@ RM_RF = rm -rf
|
||||
CP_F = cp -f
|
||||
-CP_UF = cp -ufv
|
||||
+CP_UF = cp -fv
|
||||
|
@ -2,8 +2,8 @@
|
||||
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
|
||||
<pkgmetadata>
|
||||
<maintainer type="person">
|
||||
<email>mr_bones_@gentoo.org</email>
|
||||
<name>Michael Sterrett</name>
|
||||
<email>slyfox@gentoo.org</email>
|
||||
<name>Sergei Trofimovich</name>
|
||||
</maintainer>
|
||||
<longdescription>
|
||||
The Netwide Assembler, NASM, is an 80x86 assembler designed for portability
|
||||
|
@ -1,41 +0,0 @@
|
||||
# Copyright 1999-2017 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
|
||||
EAPI=5
|
||||
inherit flag-o-matic
|
||||
|
||||
DESCRIPTION="groovy little assembler"
|
||||
HOMEPAGE="http://nasm.sourceforge.net/"
|
||||
SRC_URI="http://www.nasm.us/pub/nasm/releasebuilds/${PV/_}/${P/_}.tar.xz"
|
||||
|
||||
LICENSE="BSD-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="amd64 ~ia64 x86 ~amd64-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~x64-macos"
|
||||
IUSE="doc"
|
||||
|
||||
DEPEND="dev-lang/perl
|
||||
doc? ( app-text/ghostscript-gpl sys-apps/texinfo )"
|
||||
RDEPEND=""
|
||||
|
||||
S=${WORKDIR}/${P/_}
|
||||
|
||||
src_configure() {
|
||||
strip-flags
|
||||
econf
|
||||
}
|
||||
|
||||
src_compile() {
|
||||
emake nasmlib.o
|
||||
emake all
|
||||
use doc && emake doc
|
||||
}
|
||||
|
||||
src_install() {
|
||||
emake INSTALLROOT="${D}" install install_rdf
|
||||
dodoc AUTHORS CHANGES ChangeLog README TODO
|
||||
if use doc ; then
|
||||
doinfo doc/info/*
|
||||
dohtml doc/html/*
|
||||
dodoc doc/nasmdoc.*
|
||||
fi
|
||||
}
|
@ -1,41 +0,0 @@
|
||||
# Copyright 1999-2017 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
|
||||
EAPI=5
|
||||
inherit flag-o-matic
|
||||
|
||||
DESCRIPTION="groovy little assembler"
|
||||
HOMEPAGE="http://www.nasm.us/"
|
||||
SRC_URI="http://www.nasm.us/pub/nasm/releasebuilds/${PV/_}/${P/_}.tar.xz"
|
||||
|
||||
LICENSE="BSD-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="amd64 ~ia64 x86 ~x64-cygwin ~amd64-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~x64-macos"
|
||||
IUSE="doc"
|
||||
|
||||
DEPEND="dev-lang/perl
|
||||
doc? ( app-text/ghostscript-gpl sys-apps/texinfo )"
|
||||
RDEPEND=""
|
||||
|
||||
S=${WORKDIR}/${P/_}
|
||||
|
||||
src_configure() {
|
||||
strip-flags
|
||||
econf
|
||||
}
|
||||
|
||||
src_compile() {
|
||||
emake nasmlib.o
|
||||
emake all
|
||||
use doc && emake doc
|
||||
}
|
||||
|
||||
src_install() {
|
||||
emake INSTALLROOT="${D}" install install_rdf
|
||||
dodoc AUTHORS CHANGES ChangeLog README TODO
|
||||
if use doc ; then
|
||||
doinfo doc/info/*
|
||||
dohtml doc/html/*
|
||||
dodoc doc/nasmdoc.*
|
||||
fi
|
||||
}
|
@ -1,44 +0,0 @@
|
||||
# Copyright 1999-2017 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
|
||||
EAPI=6
|
||||
|
||||
inherit flag-o-matic
|
||||
|
||||
DESCRIPTION="groovy little assembler"
|
||||
HOMEPAGE="http://www.nasm.us/"
|
||||
SRC_URI="http://www.nasm.us/pub/nasm/releasebuilds/${PV/_}/${P/_}.tar.xz"
|
||||
|
||||
LICENSE="BSD-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="~amd64 ~x86 ~x64-cygwin ~amd64-linux ~x86-linux ~x64-macos"
|
||||
IUSE="doc"
|
||||
|
||||
DEPEND="
|
||||
dev-lang/perl
|
||||
doc? (
|
||||
app-text/ghostscript-gpl
|
||||
dev-perl/Font-TTF
|
||||
dev-perl/Sort-Versions
|
||||
media-fonts/clearsans
|
||||
virtual/perl-File-Spec
|
||||
)
|
||||
"
|
||||
|
||||
S=${WORKDIR}/${P/_}
|
||||
PATCHES=( "${FILESDIR}"/${PN}-2.13.01-fix-docdir.patch )
|
||||
|
||||
src_configure() {
|
||||
strip-flags
|
||||
default
|
||||
}
|
||||
|
||||
src_compile() {
|
||||
default
|
||||
use doc && emake doc
|
||||
}
|
||||
|
||||
src_install() {
|
||||
default
|
||||
emake DESTDIR="${D}" install_rdf $(usex doc install_doc '')
|
||||
}
|
52
sdk_container/src/third_party/portage-stable/dev-lang/nasm/nasm-2.14.02.ebuild
vendored
Normal file
52
sdk_container/src/third_party/portage-stable/dev-lang/nasm/nasm-2.14.02.ebuild
vendored
Normal file
@ -0,0 +1,52 @@
|
||||
# Copyright 1999-2019 Gentoo Authors
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
|
||||
EAPI=7
|
||||
|
||||
inherit flag-o-matic
|
||||
|
||||
DESCRIPTION="groovy little assembler"
|
||||
HOMEPAGE="https://www.nasm.us/"
|
||||
SRC_URI="https://www.nasm.us/pub/nasm/releasebuilds/${PV/_}/${P/_}.tar.xz"
|
||||
|
||||
LICENSE="BSD-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="amd64 ~ia64 x86 ~x64-cygwin ~amd64-fbsd ~amd64-linux ~x86-linux ~x64-macos"
|
||||
IUSE="doc"
|
||||
|
||||
RDEPEND=""
|
||||
DEPEND=""
|
||||
# [fonts note] doc/psfonts.ph defines ordered list of font preference.
|
||||
# Currently 'media-fonts/source-pro' is most preferred and is able to
|
||||
# satisfy all 6 font flavours: tilt, chapter, head, etc.
|
||||
BDEPEND="
|
||||
dev-lang/perl
|
||||
doc? (
|
||||
app-text/ghostscript-gpl
|
||||
dev-perl/Font-TTF
|
||||
dev-perl/Sort-Versions
|
||||
media-fonts/source-pro
|
||||
virtual/perl-File-Spec
|
||||
)
|
||||
"
|
||||
|
||||
S=${WORKDIR}/${P/_}
|
||||
|
||||
PATCHES=(
|
||||
"${FILESDIR}"/${PN}-2.13.03-bsd-cp-doc.patch
|
||||
)
|
||||
|
||||
src_configure() {
|
||||
strip-flags
|
||||
default
|
||||
}
|
||||
|
||||
src_compile() {
|
||||
default
|
||||
use doc && emake doc
|
||||
}
|
||||
|
||||
src_install() {
|
||||
default
|
||||
emake DESTDIR="${D}" install_rdf $(usex doc install_doc '')
|
||||
}
|
@ -1,23 +1,23 @@
|
||||
-----BEGIN PGP SIGNED MESSAGE-----
|
||||
Hash: SHA512
|
||||
|
||||
MANIFEST Manifest.files.gz 437750 BLAKE2B e4c6b7d5ec709b50478a92e61fd043c3784eb62915f4d39921a1c91a36627c315752406124b99ad4af39a3380f0f1c4b9ccabb34323d36427251a04d374298bd SHA512 31716069b15e65375ed6e961b9459069e7ce8ef8e807f89b733a3fd83d7d24cc1a5166f4e9df1134d130ee61e231e8958fee715eba64b4e57349f5a4b6f22879
|
||||
TIMESTAMP 2019-03-20T14:08:40Z
|
||||
MANIFEST Manifest.files.gz 438854 BLAKE2B ca65213463786d39d41485af7ea84eff3024cf674a90349e25e12c216efcd63b50848be0dd7fb7c54db79b6279385d7b09488386ffd96909db99671090ea4f08 SHA512 6572d8ad2e9aad4fbe11ff52d8aa91113cb87e207974cdb6aa98101ae4a50b77b173f68eba733267e1a109e70f86139ed901b5a4ee05472f22a8d3024aa9acb5
|
||||
TIMESTAMP 2019-03-28T13:38:46Z
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
|
||||
iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlySSWhfFIAAAAAALgAo
|
||||
iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlyczmZfFIAAAAAALgAo
|
||||
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx
|
||||
RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY
|
||||
klAGHBAAie17TMYJuUaFIcborhrkjUGykwyzXp3d/RBt9kjIZFoqDAHjYD5+Wlet
|
||||
xi0aBUzYmWx2HGuW0DpKGr6Wa4vDktJKY+hNI4rocY1WdNxXtQiw7eKLlbKgYXFy
|
||||
f/9ylhxNKUeh72Cak1yNUDarC5B8MJGyNp5vrU4TUPs6mJNd/fbbXyhISOwvbRmU
|
||||
zHwgtFrVRVYuGlT/BC3ZNp2tAp8aiTOa9su63eFJF3Mk4Qm9wgYaT+2+wXuMxt8y
|
||||
CWy3yazdUQnsKOEJ2Uk1r71Khb/k/4uFgTgQli/QBFIgNAXOk6kozHuQE1DLvoue
|
||||
nHFuf32luDHqZ1k6uhRjQC8QHXCXSeooBvoph+J/ppRB9KmBs0mLGzIMOa3iJ8ti
|
||||
um4W2huqGWhwakx0zTS3Hj+udcGIHKmq7ynSD2JCclAX0Y1L4feGLr6Q5XuTEnTN
|
||||
KlCmYKL4UQOHKhgZMhz9LqteWjQc40kZbC2dXldFg/xMMEeIdFMVVz/QgQxUHX9b
|
||||
vyXkluS7I8GnzBf2BhhJdUIu9gCuILL/c+sk7YYvNZp4mmTe6/JzYxlBJHVQsq9+
|
||||
rDUwCLFNftc+u5tDDjLprrJXJK2Fq25wGTISLIs+nvrJsx+h5mcydHq/e40dN6UM
|
||||
syOsTDuxkNwClqxLKgBjWeHO0AM6orLLN2mA61rR9z3mkWHwhoE=
|
||||
=dL/y
|
||||
klDYWhAAo1sblmnGYIlx9TtDfDwZAhcScB0WxacZHB1VfQlHTv99u5+rtGZHRbrS
|
||||
OgsjKvrvHGyAdL11mOncCxusWKLMICEbukgv9bAwPDSe4ZJssgCA6dWBlKqs08rD
|
||||
9T+xcGop/7L9hOOOjRCkjp5oiT11XT1QO3CmxCAudvBGWL3warElsl0NqXlR3pQU
|
||||
2wFHj1VjlN5TZ3aAKx327N+TO4PzV7OI4IXz1F1I40H3o7df4k1QA01QMKwqngov
|
||||
fcVUpuCaS6j+szZg/34On/eGqL6P3Zlgi2nA1Bj/L39DoCRzzdsWo50qhD8ckApa
|
||||
VLVqL7mur7j8h0Q4cStu/7F0H66cEpqEvRfiEv6eMEQ2QWPoGWTI3lo+Rmoz3QC/
|
||||
fIrCsAWMxWIZCNbtSdDLKklhPFsDcTFyBpUF1ZBS0oFWkQioK8BWvs0A5w/sLVL1
|
||||
sat5Apk1ygCTeeeX8KBQizu3I6uKco17SqihcAwRHooCJuNPAPRxM9lbpWiQ+PPE
|
||||
C+w0MSbDD77Vq89+BKo8eA/LGvaIn4pfV+39ijhhsEIWmv/RjXMr9noKkID8wTAK
|
||||
Dfe2HY9P/o6zhziXpiskTN8hk5ootmODbC3jAPOAfLqQeDIHyTXN+bYKpVtZCFh7
|
||||
lWdqHx9+3V3xlcBrW8MDxMq0Gpghcc0eCLPx3kSHYzgoXvi3ZPg=
|
||||
=0j+W
|
||||
-----END PGP SIGNATURE-----
|
||||
|
Binary file not shown.
@ -17,23 +17,10 @@
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="dev-lang/python" auto="yes" arch="*">
|
||||
<unaffected range="rge">3.2.5-r1</unaffected>
|
||||
<unaffected range="rge">2.6.8</unaffected>
|
||||
<unaffected range="rge">2.7.3-r1</unaffected>
|
||||
<unaffected range="ge">3.2.5-r1</unaffected>
|
||||
<unaffected range="ge">2.6.8</unaffected>
|
||||
<unaffected range="ge">2.7.3-r1</unaffected>
|
||||
<unaffected range="ge">3.3.2-r1</unaffected>
|
||||
<unaffected range="rge">2.6.9</unaffected>
|
||||
<unaffected range="rge">2.7.4</unaffected>
|
||||
<unaffected range="rge">2.7.5</unaffected>
|
||||
<unaffected range="rge">2.7.6</unaffected>
|
||||
<unaffected range="rge">2.7.7</unaffected>
|
||||
<unaffected range="rge">2.7.8</unaffected>
|
||||
<unaffected range="rge">2.7.9</unaffected>
|
||||
<unaffected range="rge">2.7.10</unaffected>
|
||||
<unaffected range="rge">2.7.11</unaffected>
|
||||
<unaffected range="rge">2.7.12</unaffected>
|
||||
<unaffected range="rge">2.7.13</unaffected>
|
||||
<unaffected range="rge">2.7.14</unaffected>
|
||||
<unaffected range="rge">2.7.15</unaffected>
|
||||
<vulnerable range="lt">3.3.2-r1</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
|
@ -19,13 +19,7 @@
|
||||
<affected>
|
||||
<package name="dev-lang/python" auto="yes" arch="*">
|
||||
<unaffected range="ge">3.3.5-r1</unaffected>
|
||||
<unaffected range="rge">2.7.9-r1</unaffected>
|
||||
<unaffected range="rge">2.7.10</unaffected>
|
||||
<unaffected range="rge">2.7.11</unaffected>
|
||||
<unaffected range="rge">2.7.12</unaffected>
|
||||
<unaffected range="rge">2.7.13</unaffected>
|
||||
<unaffected range="rge">2.7.14</unaffected>
|
||||
<unaffected range="rge">2.7.15</unaffected>
|
||||
<unaffected range="ge">2.7.9-r1</unaffected>
|
||||
<vulnerable range="lt">3.3.5-r1</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
|
@ -12,8 +12,8 @@
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="dev-lang/python" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.7.15</unaffected>
|
||||
<vulnerable range="lt">2.7.15</vulnerable>
|
||||
<unaffected range="ge" slot="2.7">2.7.15</unaffected>
|
||||
<vulnerable range="lt" slot="2.7">2.7.15</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
@ -39,7 +39,7 @@
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=dev-lang/python-2.7.15"
|
||||
# emerge --ask --oneshot --verbose ">=dev-lang/python-2.7.15:2.7"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
|
65
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-17.xml
vendored
Normal file
65
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-17.xml
vendored
Normal file
@ -0,0 +1,65 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201903-17">
|
||||
<title>SDL2_Image: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in the image loading
|
||||
library
|
||||
for Simple DirectMedia Layer, the worst of which could result in the remote
|
||||
execution of arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">sdl_image</product>
|
||||
<announced>2019-03-28</announced>
|
||||
<revised count="1">2019-03-28</revised>
|
||||
<bug>655226</bug>
|
||||
<bug>674132</bug>
|
||||
<access>local, remote</access>
|
||||
<affected>
|
||||
<package name="media-libs/sdl2-image" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.0.4</unaffected>
|
||||
<vulnerable range="lt">2.0.4</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>SDL_image is an image file library that loads images as SDL surfaces,
|
||||
and supports various formats like BMP, GIF, JPEG, LBM, PCX, PNG, PNM,
|
||||
TGA, TIFF, XCF, XPM, and XV.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in SDL2_Image. Please
|
||||
review the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker, by enticing a user to process a specially crafted
|
||||
image file, could execute arbitrary code, cause a Denial of Service
|
||||
condition, or obtain sensitive information.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All SDL2_Image users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=media-libs/sdl2-image-2.0.4"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-12122">CVE-2017-12122</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-14440">CVE-2017-14440</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-14441">CVE-2017-14441</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-14442">CVE-2017-14442</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-14448">CVE-2017-14448</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-14449">CVE-2017-14449</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-14450">CVE-2017-14450</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-3837">CVE-2018-3837</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-3838">CVE-2018-3838</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-3839">CVE-2018-3839</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-3977">CVE-2018-3977</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2018-12-02T21:13:59Z">b-man</metadata>
|
||||
<metadata tag="submitter" timestamp="2019-03-28T02:06:35Z">b-man</metadata>
|
||||
</glsa>
|
55
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-18.xml
vendored
Normal file
55
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-18.xml
vendored
Normal file
@ -0,0 +1,55 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201903-18">
|
||||
<title>GD: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in GD, the worst of which
|
||||
could result in the remote execution of arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">gd</product>
|
||||
<announced>2019-03-28</announced>
|
||||
<revised count="1">2019-03-28</revised>
|
||||
<bug>664732</bug>
|
||||
<bug>679702</bug>
|
||||
<access>local, remote</access>
|
||||
<affected>
|
||||
<package name="media-libs/gd" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.2.5-r2</unaffected>
|
||||
<vulnerable range="lt">2.2.5-r2</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>GD is a graphic library for fast image creation.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in GD. Please review the
|
||||
CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could entice a user to process a specially crafted
|
||||
image, possibly resulting in execution of arbitrary code or a Denial of
|
||||
Service condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All GD users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=media-libs/gd-2.2.5-r2"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-1000222">
|
||||
CVE-2018-1000222
|
||||
</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-5711">CVE-2018-5711</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-6977">CVE-2019-6977</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2019-03-10T05:25:03Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2019-03-28T02:09:10Z">b-man</metadata>
|
||||
</glsa>
|
56
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-19.xml
vendored
Normal file
56
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-19.xml
vendored
Normal file
@ -0,0 +1,56 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201903-19">
|
||||
<title>NASM: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in NASM, the worst of
|
||||
which could result in the remote execution of arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">nasm</product>
|
||||
<announced>2019-03-28</announced>
|
||||
<revised count="1">2019-03-28</revised>
|
||||
<bug>635358</bug>
|
||||
<bug>659550</bug>
|
||||
<bug>670884</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="dev-lang/nasm" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.14.02</unaffected>
|
||||
<vulnerable range="lt">2.14.02</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>NASM is a 80x86 assembler that has been created for portability and
|
||||
modularity. NASM supports Pentium, P6, SSE MMX, and 3DNow extensions. It
|
||||
also supports a wide range of objects formats (ELF, a.out, COFF, etc),
|
||||
and has its own disassembler.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in NASM. Please review the
|
||||
CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="high">
|
||||
<p>A remote attacker could cause a Denial of Service condition or execute
|
||||
arbitrary code.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All NASM users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=dev-lang/nasm-2.14.02"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-10686">CVE-2017-10686</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-11111">CVE-2017-11111</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-14228">CVE-2017-14228</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2019-03-10T04:10:57Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2019-03-28T02:11:39Z">b-man</metadata>
|
||||
</glsa>
|
69
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-20.xml
vendored
Normal file
69
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-20.xml
vendored
Normal file
@ -0,0 +1,69 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201903-20">
|
||||
<title>cabextract, libmspack: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in cabextract and
|
||||
libmspack, the worst of which could result in a Denial of Service.
|
||||
</synopsis>
|
||||
<product type="ebuild">cabextract, libmspack</product>
|
||||
<announced>2019-03-28</announced>
|
||||
<revised count="1">2019-03-28</revised>
|
||||
<bug>662874</bug>
|
||||
<bug>669280</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="app-arch/cabextract" auto="yes" arch="*">
|
||||
<unaffected range="ge">1.8</unaffected>
|
||||
<vulnerable range="lt">1.8</vulnerable>
|
||||
</package>
|
||||
<package name="dev-libs/libmspack" auto="yes" arch="*">
|
||||
<unaffected range="ge">0.8_alpha</unaffected>
|
||||
<vulnerable range="lt">0.8_alpha</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>cabextract is free software for extracting Microsoft cabinet files.</p>
|
||||
|
||||
<p>libmspack is a portable library for some loosely related Microsoft
|
||||
compression formats
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in cabextract and
|
||||
libmspack. Please review the CVE identifiers referenced below for
|
||||
details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>Please review the referenced CVE’s for details.</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All cabextract users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=app-arch/cabextract-1.8"
|
||||
</code>
|
||||
|
||||
<p>All libmspack users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=dev-libs/libmspack-0.8_alpha"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-14680">CVE-2018-14680</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-18584">CVE-2018-18584</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-18585">CVE-2018-18585</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-18586">CVE-2018-18586</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2019-03-24T19:20:01Z">b-man</metadata>
|
||||
<metadata tag="submitter" timestamp="2019-03-28T02:14:01Z">b-man</metadata>
|
||||
</glsa>
|
54
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-21.xml
vendored
Normal file
54
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-21.xml
vendored
Normal file
@ -0,0 +1,54 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201903-21">
|
||||
<title>Apache: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in Apache Web Server, the
|
||||
worst of which could result in a Denial of Service condition.
|
||||
</synopsis>
|
||||
<product type="ebuild">apache</product>
|
||||
<announced>2019-03-28</announced>
|
||||
<revised count="1">2019-03-28</revised>
|
||||
<bug>676064</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="www-servers/apache" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.4.38-r1</unaffected>
|
||||
<vulnerable range="lt">2.4.38-r1</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>The Apache HTTP server is one of the most popular web servers on the
|
||||
Internet.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in Apache. Please review
|
||||
the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker can possibly cause a Denial of Service condition or
|
||||
could bypass mod_session_cookie expiration time.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All Apache users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=www-servers/apache-2.4.38-r1"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-17189">CVE-2018-17189</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-17190">CVE-2018-17190</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-17199">CVE-2018-17199</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-0190">CVE-2019-0190</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2019-03-24T13:34:22Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2019-03-28T02:17:53Z">Zlogene</metadata>
|
||||
</glsa>
|
46
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-22.xml
vendored
Normal file
46
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-22.xml
vendored
Normal file
@ -0,0 +1,46 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201903-22">
|
||||
<title>ZeroMQ: Code execution</title>
|
||||
<synopsis>An overflow was discovered in ZeroMQ which could lead to arbitrary
|
||||
code execution.
|
||||
</synopsis>
|
||||
<product type="ebuild">zeromq</product>
|
||||
<announced>2019-03-28</announced>
|
||||
<revised count="1">2019-03-28</revised>
|
||||
<bug>675376</bug>
|
||||
<access>local, remote</access>
|
||||
<affected>
|
||||
<package name="net-libs/zeromq" auto="yes" arch="*">
|
||||
<unaffected range="ge">4.3.1</unaffected>
|
||||
<vulnerable range="lt">4.3.1</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Looks like an embeddable networking library but acts like a concurrency
|
||||
framework
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Please reference the CVE for details.</p>
|
||||
</description>
|
||||
<impact type="high">
|
||||
<p>Please reference the CVE for details.</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All ZeroMQ users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=net-libs/zeromq-4.3.1"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-6250">CVE-2019-6250</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2019-03-24T14:21:11Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2019-03-28T02:20:04Z">b-man</metadata>
|
||||
</glsa>
|
76
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-23.xml
vendored
Normal file
76
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-23.xml
vendored
Normal file
@ -0,0 +1,76 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201903-23">
|
||||
<title>Chromium: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in Chromium, the worst of
|
||||
which could result in the remote execution of code.
|
||||
</synopsis>
|
||||
<product type="ebuild">chromium</product>
|
||||
<announced>2019-03-28</announced>
|
||||
<revised count="1">2019-03-28</revised>
|
||||
<bug>671550</bug>
|
||||
<bug>677066</bug>
|
||||
<bug>679530</bug>
|
||||
<bug>680242</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="www-client/chromium" auto="yes" arch="*">
|
||||
<unaffected range="ge">73.0.3683.75</unaffected>
|
||||
<vulnerable range="lt">73.0.3683.75</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Chromium is an open-source browser project that aims to build a safer,
|
||||
faster, and more stable way for all users to experience the web.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in Chromium and Google
|
||||
Chrome. Please review the referenced CVE identifiers and Google Chrome
|
||||
Releases for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="high">
|
||||
<p>Please review the referenced CVE identifiers and Google Chrome Releases
|
||||
for details.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All Chromium users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose
|
||||
">=www-client/chromium-73.0.3683.75"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-17479">CVE-2018-17479</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5786">CVE-2019-5786</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5786">CVE-2019-5786</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5787">CVE-2019-5787</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5788">CVE-2019-5788</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5789">CVE-2019-5789</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5790">CVE-2019-5790</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5791">CVE-2019-5791</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5792">CVE-2019-5792</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5793">CVE-2019-5793</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5794">CVE-2019-5794</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5795">CVE-2019-5795</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5796">CVE-2019-5796</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5797">CVE-2019-5797</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5798">CVE-2019-5798</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5799">CVE-2019-5799</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5800">CVE-2019-5800</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5801">CVE-2019-5801</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5802">CVE-2019-5802</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5803">CVE-2019-5803</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5804">CVE-2019-5804</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2019-03-24T22:13:31Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2019-03-28T02:22:18Z">b-man</metadata>
|
||||
</glsa>
|
@ -1 +1 @@
|
||||
Wed, 20 Mar 2019 14:08:36 +0000
|
||||
Thu, 28 Mar 2019 13:38:42 +0000
|
||||
|
@ -1 +1 @@
|
||||
30f2fef098951e797cb4c22b80fbeb640fff7f3f 1553088963 2019-03-20T13:36:03+00:00
|
||||
821df578dd1e4239ed7205c587587491907ef45c 1553739754 2019-03-28T02:22:34+00:00
|
||||
|
@ -1,12 +0,0 @@
|
||||
DEFINED_PHASES=compile configure install
|
||||
DEPEND=dev-lang/perl doc? ( app-text/ghostscript-gpl sys-apps/texinfo )
|
||||
DESCRIPTION=groovy little assembler
|
||||
EAPI=5
|
||||
HOMEPAGE=http://nasm.sourceforge.net/
|
||||
IUSE=doc
|
||||
KEYWORDS=amd64 ~ia64 x86 ~amd64-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~x64-macos
|
||||
LICENSE=BSD-2
|
||||
SLOT=0
|
||||
SRC_URI=http://www.nasm.us/pub/nasm/releasebuilds/2.11.08/nasm-2.11.08.tar.xz
|
||||
_eclasses_=desktop b1d22ac8bdd4679ab79c71aca235009d epatch a1bf4756dba418a7238f3be0cb010c54 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 6e6c2737b59a4b982de6fb3ecefd87f8 flag-o-matic 55aaa148741116aa54ad0d80e361818e ltprune 08f9e1d9ee0af8f5d9a7854efbcd8c0e multilib b2f01ad412baf81650c23fcf0975fa33 preserve-libs ef207dc62baddfddfd39a164d9797648 toolchain-funcs f164325a2cdb5b3ea39311d483988861 vcs-clean 2a0f74a496fa2b1552c4f3398258b7bf
|
||||
_md5_=35526770216e5befb5b23e3ef679cfab
|
@ -1,12 +0,0 @@
|
||||
DEFINED_PHASES=compile configure install
|
||||
DEPEND=dev-lang/perl doc? ( app-text/ghostscript-gpl sys-apps/texinfo )
|
||||
DESCRIPTION=groovy little assembler
|
||||
EAPI=5
|
||||
HOMEPAGE=http://www.nasm.us/
|
||||
IUSE=doc
|
||||
KEYWORDS=amd64 ~ia64 x86 ~x64-cygwin ~amd64-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~x64-macos
|
||||
LICENSE=BSD-2
|
||||
SLOT=0
|
||||
SRC_URI=http://www.nasm.us/pub/nasm/releasebuilds/2.12.01/nasm-2.12.01.tar.xz
|
||||
_eclasses_=desktop b1d22ac8bdd4679ab79c71aca235009d epatch a1bf4756dba418a7238f3be0cb010c54 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 6e6c2737b59a4b982de6fb3ecefd87f8 flag-o-matic 55aaa148741116aa54ad0d80e361818e ltprune 08f9e1d9ee0af8f5d9a7854efbcd8c0e multilib b2f01ad412baf81650c23fcf0975fa33 preserve-libs ef207dc62baddfddfd39a164d9797648 toolchain-funcs f164325a2cdb5b3ea39311d483988861 vcs-clean 2a0f74a496fa2b1552c4f3398258b7bf
|
||||
_md5_=4cc404ae981f6ad79dd1edb90df323d7
|
@ -1,12 +0,0 @@
|
||||
DEFINED_PHASES=compile configure install
|
||||
DEPEND=dev-lang/perl doc? ( app-text/ghostscript-gpl dev-perl/Font-TTF dev-perl/Sort-Versions media-fonts/clearsans virtual/perl-File-Spec )
|
||||
DESCRIPTION=groovy little assembler
|
||||
EAPI=6
|
||||
HOMEPAGE=http://www.nasm.us/
|
||||
IUSE=doc
|
||||
KEYWORDS=~amd64 ~x86 ~x64-cygwin ~amd64-linux ~x86-linux ~x64-macos
|
||||
LICENSE=BSD-2
|
||||
SLOT=0
|
||||
SRC_URI=http://www.nasm.us/pub/nasm/releasebuilds/2.13.01/nasm-2.13.01.tar.xz
|
||||
_eclasses_=desktop b1d22ac8bdd4679ab79c71aca235009d epatch a1bf4756dba418a7238f3be0cb010c54 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 6e6c2737b59a4b982de6fb3ecefd87f8 flag-o-matic 55aaa148741116aa54ad0d80e361818e ltprune 08f9e1d9ee0af8f5d9a7854efbcd8c0e multilib b2f01ad412baf81650c23fcf0975fa33 preserve-libs ef207dc62baddfddfd39a164d9797648 toolchain-funcs f164325a2cdb5b3ea39311d483988861 vcs-clean 2a0f74a496fa2b1552c4f3398258b7bf
|
||||
_md5_=bf24b0cc4876aa67264e6da31be05763
|
12
sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-lang/nasm-2.14.02
vendored
Normal file
12
sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-lang/nasm-2.14.02
vendored
Normal file
@ -0,0 +1,12 @@
|
||||
BDEPEND=dev-lang/perl doc? ( app-text/ghostscript-gpl dev-perl/Font-TTF dev-perl/Sort-Versions media-fonts/source-pro virtual/perl-File-Spec )
|
||||
DEFINED_PHASES=compile configure install
|
||||
DESCRIPTION=groovy little assembler
|
||||
EAPI=7
|
||||
HOMEPAGE=https://www.nasm.us/
|
||||
IUSE=doc
|
||||
KEYWORDS=amd64 ~ia64 x86 ~x64-cygwin ~amd64-fbsd ~amd64-linux ~x86-linux ~x64-macos
|
||||
LICENSE=BSD-2
|
||||
SLOT=0
|
||||
SRC_URI=https://www.nasm.us/pub/nasm/releasebuilds/2.14.02/nasm-2.14.02.tar.xz
|
||||
_eclasses_=eutils 6e6c2737b59a4b982de6fb3ecefd87f8 flag-o-matic 55aaa148741116aa54ad0d80e361818e multilib b2f01ad412baf81650c23fcf0975fa33 toolchain-funcs f164325a2cdb5b3ea39311d483988861
|
||||
_md5_=8d766e63b6e5d6d1f2685182c94ee303
|
Loading…
Reference in New Issue
Block a user