Merge pull request #558 from dm0-/glsa

Fix current GLSAs
This commit is contained in:
David Michael 2017-06-16 15:51:57 -07:00 committed by GitHub
commit 38abe6bf30
38 changed files with 1311 additions and 540 deletions

View File

@ -1,7 +1,8 @@
DIST pcre-8.39.tar.bz2 1560758 SHA256 b858099f82483031ee02092711689e7245586ada49e534a06e678b8ea9549e8b SHA512 8b0f14ae5947c4b2d74876a795b04e532fd71c2479a64dbe0ed817e7c7894ea3cae533413de8c17322d305cb7f4e275d72b43e4e828eaca77dc4bcaf04529cf6 WHIRLPOOL 00e8e7fb3dc60cbbd2ee185e269696058b568a0f269749386bad44cb474f723c9ed3dfd2af91ddce0b5047aab459864f07e05940af17d3d51d2f1b068415b1ed
AUX libpcre-8.40-jit-else.patch 2149 SHA256 a6fb7e204a0a33c12c89983f57f8548998b52137f7964a809c5b6031e37d6829 SHA512 d1d8e7c689402bad4ac26785e1a642978a6e76f83f69d4df251fb7b88108106292f73a43c6f476c226a45ccfab008283f269128e3631930b0f5490b2f46e3b48 WHIRLPOOL 35a3593928463bc3fb8c3c51cb110547fbd55be894d968b0569afcac17a5f268d2347be187d267c58f302f60aa7a00df80d72524a99cb8c6b4491b0a7725e9c2
AUX libpcre-8.40-pcregrep-multiline-1.patch 2688 SHA256 6bc091de8df6715c9cdea6b65d3050112b032915e24e12d5d440434b11d4032a SHA512 c7095a8034db6896c1457e7950a15c00ffd7c08dc29f07ca83e46db63209d42c87e808f328bd2eaaaed0fe4038575629b8e64fa77b4c249ca938fc83415bbe28 WHIRLPOOL 87ae705b53a3227f297cec1036301be32687c02c8b44131b62994663fb2cf2cc0c92c1968627f1238f1985a92a660ccebacc0eda4e05ac315a4672c5b89ab3fa
AUX libpcre-8.40-pcregrep-multiline-2.patch 803 SHA256 01d27d72071e1fc5e90db5da2795b61b19e519097200b891979b02a63222b5ed SHA512 aae538dcf871618d00e9994ab1fd973f491075fc852c45aedd6e99ffd6726aabc9f93fff3e5aebbc1869fd2dd85d6d24f0eded075df857991b0457ca797a25fd WHIRLPOOL 7dc104231878dad7a51a2d0fd95711002780a6c6190af15facda78595ac93befeb0f63c02315a1c528dd2aac7ef17727a5fed0af0fe996f6a0158ea380ffd0e4
DIST pcre-8.40.tar.bz2 1560119 SHA256 00e27a29ead4267e3de8111fcaa59b132d0533cdfdbdddf4b0604279acbcf4f4 SHA512 b4c27eafbdf33bd7a1384655b1936f4be3bc6745c072347eb26e988896c52664bd85ac42444da1be78b6e20f45b6c7e5921f5f20f5b0741b5bd3d9844e5bd4e2 WHIRLPOOL 6711688972b3db4b98902d548b84e8b03b61c3a12d24a4e42fc49ddc5e2b4be51f98f91873166e550866e88b6cd55092ea27704a3b7e71d58a2af21148ad3340
EBUILD libpcre-8.39.ebuild 2804 SHA256 8397835b0303e77a5962d4a784d0d7ad79b7d17f77efff3c70988d18d3c9c8e4 SHA512 6aa289609ca02802f1d6ab8fa4d3344e352789775fa30d3c50b53a4e1145e1d033230d2daad195873d4d2b1d2bcefce6f569f71fc4baf90adc7f2802e67861f9 WHIRLPOOL 12941ae26442a87c52c01816626b01cfb7a80519a9e9263117ae209e8a47afc05d02cb4575ca91a298a2765c4133b50650cd1b1b97bcdfa082d6d84d1d7a9a7f
EBUILD libpcre-8.40.ebuild 2817 SHA256 6f1946adb6214b71649118fc1f6fb4f3c54f32dfebead324fac63c65da39dbf5 SHA512 8c25d21862600348295300cc421e14087f5fd18758af8d9910112826d0ce07820dff412460b44e5a8c52f51fb911f8bef3bf88f3023b2676a48e10260964bac7 WHIRLPOOL 70f1293c70f7365a42bc54899cdd5cba2d6ced27bab68d211f3945ad35c4fe63ee7921e9256f5c921a7024b60c4df9f6ad0e08a115ef99102d522e23737e3427
EBUILD libpcre-8.40-r1.ebuild 2849 SHA256 71b6ae4b11f222072bf9776f4e701cd17e7819b82ce58d62c65a6380fa87f364 SHA512 b6969ee98be6c15c5e698a03c78956159f147a08fa9646711e75122ebae03df3e154d8a394a033a70ac2d5658b02b67626396433993639491b8753cc03fdd02f WHIRLPOOL 99012339d40a2857e83602e58b7b23f89d9385537df57a84b9ff38492ea443d48445d1151c9a442debee19e3fcfda14ae66ac11c50c702640ef18afc05dc8252
MISC ChangeLog 9358 SHA256 6d71cdef5ca28f5d0c3af958daa73122d374a64088bf960961f9eec235572595 SHA512 ad1c6ff26e6198bda9f8c5d31d03a5337b0bd7c620f564b31b98117982d12677426ec4d703325028c44ea371dc15c3b2530d0c91ccd9e8b40b5710761a2e7ef0 WHIRLPOOL c8f1726ad29d83ee380eeeaae0a385a7de8db1e99751357bbf59dcf0af751e4f6ddb8f88d836dda0d0d6e132ef4db126fa3e64610491ceadce550b3017b2ee5d
MISC ChangeLog-2015 35335 SHA256 dfdfc43bcff86898d74db532baf46e6d88c70a3e62e82ceab69c285934f802b5 SHA512 94411b185f75967d240777124272d04b13f3cb3e43de6f751baa9944e07086f9fa2972e4854514fb39f85d69422a07fd1ee1cc7fc587dacf54b777bdf68439ea WHIRLPOOL ec71b8c06e85b5ec0a4040def4447e6aa2589bbaf9bd4b5d7479a2b968357a2b5c4a30e7c2739bd1b4607e074cdc9d15e0f730ed1a69cb936d514056d53578e0
MISC metadata.xml 1112 SHA256 fa2a7f9e7f1ee1c432907cbc5cc0dd23f9636b5f4c51836dbcdbf24f72975c2a SHA512 eb7e2db9932c108442e69bd3ddf04d8d753dede44f7453b1fa33730ec9cda89e618f4444a0adf3f9e7d09baf8c97ff19831906ad7148a26674269f1efd427e6b WHIRLPOOL 7b675f34fbd1f58f42d7ad5c4e39e1d80922474624047165b30d85ecdbbffd1246d68b0dad4d7553c0d2fc900249e3425fc04f9b3821f189b30ebb2d2615dbad

View File

@ -0,0 +1,68 @@
https://bugs.gentoo.org/609592
https://bugs.exim.org/show_bug.cgi?id=2035
From 7ddfbe9d0b9f43402f8043e940172a318cc407c6 Mon Sep 17 00:00:00 2001
From: Zoltan Herczeg <hzmester@freemail.hu>
Date: Tue, 14 Feb 2017 08:48:18 +0000
Subject: [PATCH] Fix a missing else in the JIT compiler reported by
'idaifish'.
git-svn-id: svn://vcs.exim.org/pcre/code/trunk@1680 2f5784b3-3f2a-0410-8824-cb99058d5e15
---
ChangeLog | 2 ++
pcre_jit_compile.c | 2 +-
testdata/testinput12 | 2 ++
testdata/testoutput12 | 2 ++
4 files changed, 7 insertions(+), 1 deletion(-)
diff --git a/ChangeLog b/ChangeLog
index 373ee8422ef5..d813935539bd 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -15,6 +15,8 @@ mode with --only-matching matched several lines, it restarted scanning at the
next line instead of moving on to the end of the matched string, which can be
several lines after the start.
+3. Fix a missing else in the JIT compiler reported by 'idaifish'.
+
Version 8.40 11-January-2017
----------------------------
diff --git a/pcre_jit_compile.c b/pcre_jit_compile.c
index c301f05d5e3f..6ef8e48ff5e8 100644
--- a/pcre_jit_compile.c
+++ b/pcre_jit_compile.c
@@ -8110,7 +8110,7 @@ if (opcode == OP_COND || opcode == OP_SCOND)
if (*matchingpath == OP_FAIL)
stacksize = 0;
- if (*matchingpath == OP_RREF)
+ else if (*matchingpath == OP_RREF)
{
stacksize = GET2(matchingpath, 1);
if (common->currententry == NULL)
diff --git a/testdata/testinput12 b/testdata/testinput12
index 944be6943f5e..89ed4564bcd4 100644
--- a/testdata/testinput12
+++ b/testdata/testinput12
@@ -104,4 +104,6 @@ and a couple of things that are different with JIT. --/
/(.|.)*?bx/
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaabax
+/((?(?!))x)(?'name')(?1)/S++
+
/-- End of testinput12 --/
diff --git a/testdata/testoutput12 b/testdata/testoutput12
index 87911086f498..7632c4e58013 100644
--- a/testdata/testoutput12
+++ b/testdata/testoutput12
@@ -201,4 +201,6 @@ No match, mark = m (JIT)
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaabax
Error -8 (match limit exceeded)
+/((?(?!))x)(?'name')(?1)/S++
+
/-- End of testinput12 --/
--
2.12.0

View File

@ -0,0 +1,69 @@
From 5be027b624bc866702808abadfe5f99360414086 Mon Sep 17 00:00:00 2001
From: Philip Hazel <ph10@cam.ac.uk>
Date: Fri, 10 Feb 2017 17:47:34 +0000
Subject: [PATCH] Correct fix for pcre2grep multiline with --only-matching.
git-svn-id: svn://vcs.exim.org/pcre/code/trunk@1678 2f5784b3-3f2a-0410-8824-cb99058d5e15
---
ChangeLog | 5 +++++
configure.ac | 6 +++---
pcregrep.c | 20 +++++++++++++++-----
3 files changed, 23 insertions(+), 8 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index ab4e053e601e..373ee8422ef5 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -10,6 +10,11 @@ Version 8.41
1. Fixed typo in CMakeLists.txt (wrong number of arguments for
PCRE_STATIC_RUNTIME (affects MSVC only).
+2. Issue 1 for 8.40 below was not correctly fixed. If pcregrep in multiline
+mode with --only-matching matched several lines, it restarted scanning at the
+next line instead of moving on to the end of the matched string, which can be
+several lines after the start.
+
Version 8.40 11-January-2017
----------------------------
diff --git a/pcregrep.c b/pcregrep.c
index fd2a67622baa..2070c057e4a0 100644
--- a/pcregrep.c
+++ b/pcregrep.c
@@ -1804,11 +1804,6 @@ while (ptr < endptr)
if (line_buffered) fflush(stdout);
rc = 0; /* Had some success */
- /* If the current match ended past the end of the line (only possible
- in multiline mode), we are done with this line. */
-
- if ((unsigned int)offsets[1] > linelength) goto END_ONE_MATCH;
-
startoffset = offsets[1]; /* Restart after the match */
if (startoffset <= oldstartoffset)
{
@@ -1818,6 +1813,21 @@ while (ptr < endptr)
if (utf8)
while ((matchptr[startoffset] & 0xc0) == 0x80) startoffset++;
}
+
+ /* If the current match ended past the end of the line (only possible
+ in multiline mode), we must move on to the line in which it did end
+ before searching for more matches. */
+
+ while (startoffset > (int)linelength)
+ {
+ matchptr = ptr += linelength + endlinelength;
+ filepos += (int)(linelength + endlinelength);
+ linenumber++;
+ startoffset -= (int)(linelength + endlinelength);
+ t = end_of_line(ptr, endptr, &endlinelength);
+ linelength = t - ptr - endlinelength;
+ }
+
goto ONLY_MATCHING_RESTART;
}
}
--
2.12.0

View File

@ -0,0 +1,25 @@
From 8b0fdf16e57ce9a653a0a03c39f6cc061e8122e8 Mon Sep 17 00:00:00 2001
From: Philip Hazel <ph10@cam.ac.uk>
Date: Sun, 12 Feb 2017 13:28:11 +0000
Subject: [PATCH] Fix bug in most recent fix for multiline pcre2grep.
git-svn-id: svn://vcs.exim.org/pcre/code/trunk@1679 2f5784b3-3f2a-0410-8824-cb99058d5e15
---
pcregrep.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/pcregrep.c b/pcregrep.c
index 2070c057e4a0..3cd70eeb4261 100644
--- a/pcregrep.c
+++ b/pcregrep.c
@@ -1826,6 +1826,7 @@ while (ptr < endptr)
startoffset -= (int)(linelength + endlinelength);
t = end_of_line(ptr, endptr, &endlinelength);
linelength = t - ptr - endlinelength;
+ length = (size_t)(endptr - ptr);
}
goto ONLY_MATCHING_RESTART;
--
2.12.0

View File

@ -1,6 +1,5 @@
# Copyright 1999-2017 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Id$
EAPI="5"
@ -19,7 +18,7 @@ fi
LICENSE="BSD"
SLOT="3"
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris"
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~x64-cygwin ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris"
IUSE="bzip2 +cxx +jit libedit pcre16 pcre32 +readline +recursion-limit static-libs unicode zlib"
REQUIRED_USE="readline? ( !libedit )
libedit? ( !readline )"
@ -42,11 +41,13 @@ MULTILIB_CHOST_TOOLS=(
/usr/bin/pcre-config
)
#PATCHES=(
#)
PATCHES=(
"${FILESDIR}"/${P}-pcregrep-multiline-{1,2}.patch
"${FILESDIR}"/${P}-jit-else.patch #609592
)
src_prepare() {
#epatch "${PATCHES[@]}"
epatch "${PATCHES[@]}"
sed -i -e "s:-lpcre ::" libpcrecpp.pc.in || die
elibtoolize
}

View File

@ -1,95 +0,0 @@
# Copyright 1999-2017 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Id$
EAPI="5"
inherit eutils multilib libtool flag-o-matic toolchain-funcs multilib-minimal
DESCRIPTION="Perl-compatible regular expression library"
HOMEPAGE="http://www.pcre.org/"
MY_P="pcre-${PV/_rc/-RC}"
if [[ ${PV} != *_rc* ]] ; then
# Only the final releases are available here.
SRC_URI="mirror://sourceforge/pcre/${MY_P}.tar.bz2
ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/${MY_P}.tar.bz2"
else
SRC_URI="ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/Testing/${MY_P}.tar.bz2"
fi
LICENSE="BSD"
SLOT="3"
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris"
IUSE="bzip2 +cxx +jit libedit pcre16 pcre32 +readline +recursion-limit static-libs unicode zlib"
REQUIRED_USE="readline? ( !libedit )
libedit? ( !readline )"
RDEPEND="bzip2? ( app-arch/bzip2 )
zlib? ( sys-libs/zlib )
libedit? ( dev-libs/libedit )
readline? ( sys-libs/readline:0= )"
DEPEND="${RDEPEND}
virtual/pkgconfig"
RDEPEND="${RDEPEND}
abi_x86_32? (
!<=app-emulation/emul-linux-x86-baselibs-20131008-r2
!app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)]
)"
S=${WORKDIR}/${MY_P}
MULTILIB_CHOST_TOOLS=(
/usr/bin/pcre-config
)
#PATCHES=(
#)
src_prepare() {
#epatch "${PATCHES[@]}"
sed -i -e "s:-lpcre ::" libpcrecpp.pc.in || die
elibtoolize
}
multilib_src_configure() {
ECONF_SOURCE="${S}" econf \
--with-match-limit-recursion=$(usex recursion-limit 8192 MATCH_LIMIT) \
$(multilib_native_use_enable bzip2 pcregrep-libbz2) \
$(use_enable cxx cpp) \
$(use_enable jit) $(use_enable jit pcregrep-jit) \
$(use_enable pcre16) \
$(use_enable pcre32) \
$(multilib_native_use_enable libedit pcretest-libedit) \
$(multilib_native_use_enable readline pcretest-libreadline) \
$(use_enable static-libs static) \
$(use_enable unicode utf) $(use_enable unicode unicode-properties) \
$(multilib_native_use_enable zlib pcregrep-libz) \
--enable-pcre8 \
--enable-shared \
--htmldir="${EPREFIX}"/usr/share/doc/${PF}/html \
--docdir="${EPREFIX}"/usr/share/doc/${PF}
}
multilib_src_compile() {
emake V=1 $(multilib_is_native_abi || echo "bin_PROGRAMS=")
}
multilib_src_install() {
emake \
DESTDIR="${D}" \
$(multilib_is_native_abi || echo "bin_PROGRAMS= dist_html_DATA=") \
install
gen_usr_ldscript -a pcre
}
multilib_src_install_all() {
prune_libtool_files
}
pkg_preinst() {
preserve_old_lib /$(get_libdir)/libpcre.so.0
}
pkg_postinst() {
preserve_old_lib_notify /$(get_libdir)/libpcre.so.0
}

View File

@ -7,7 +7,7 @@
</synopsis>
<product type="ebuild">perl</product>
<announced>2017-01-29</announced>
<revised>2017-01-29: 1</revised>
<revised>2017-06-01: 2</revised>
<bug>580612</bug>
<bug>588592</bug>
<bug>589680</bug>
@ -44,6 +44,11 @@
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-lang/perl-5.22.3_rc4"
</code>
<p>Warning: When you are upgrading to a new major Perl version, the
commands above may not be sufficient. Please visit the Gentoo wiki
referenced below to learn how to upgrade to a new major Perl version.
</p>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8607">CVE-2015-8607</uri>
@ -51,7 +56,10 @@
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1238">CVE-2016-1238</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2381">CVE-2016-2381</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6185">CVE-2016-6185</uri>
<uri link="https://wiki.gentoo.org/wiki/Perl#Upgrading_.28major_version.29">
Gentoo Wiki: How to upgrade Perl
</uri>
</references>
<metadata tag="requester" timestamp="2017-01-21T22:09:19Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-29T23:40:34Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-06-01T01:14:59Z">b-man</metadata>
</glsa>

View File

@ -0,0 +1,49 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-01">
<title>MUNGE: Privilege escalation </title>
<synopsis>Gentoo's MUNGE ebuilds are vulnerable to privilege escalation due
to improper permissions.
</synopsis>
<product type="ebuild">munge</product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 1</revised>
<bug>602596</bug>
<access>local</access>
<affected>
<package name="sys-auth/munge" auto="yes" arch="*">
<unaffected range="ge">0.5.10-r2</unaffected>
<vulnerable range="lt">0.5.10-r2</vulnerable>
</package>
</affected>
<background>
<p>An authentication service for creating and validating credentials.</p>
</background>
<description>
<p>It was discovered that Gentoos default MUNGE installation suffered
from a privilege escalation vulnerability (munge user to root) due to
improper permissions and a runscript which called chown() on a user
controlled file.
</p>
</description>
<impact type="high">
<p>A local attacker, who either is already MUNGEs system user or belongs
to MUNGEs group, could potentially escalate privileges.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All MUNGE users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=sys-auth/munge-0.5.10-r2"
</code>
</resolution>
<references>
</references>
<metadata tag="requester" timestamp="2017-01-08T22:27:29Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-06T06:21:40Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,51 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-02">
<title>Shadow: Multiple vulnerabilities </title>
<synopsis>Multiple vulnerabilities have been found in Shadow, the worst of
which might allow privilege escalation.
</synopsis>
<product type="ebuild">shadow</product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 1</revised>
<bug>610804</bug>
<bug>620510</bug>
<access>local</access>
<affected>
<package name="sys-apps/shadow" auto="yes" arch="*">
<unaffected range="ge">4.4-r2</unaffected>
<vulnerable range="lt">4.4-r2</vulnerable>
</package>
</affected>
<background>
<p>Shadow is a set of tools to deal with user accounts.</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in Shadow. Please review
the CVE identifiers referenced below for details.
</p>
</description>
<impact type="high">
<p>A local attacker could possibly cause a Denial of Service condition,
gain privileges via crafted input, or SIGKILL arbitrary processes.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Shadow users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=sys-apps/shadow-4.4-r2"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6252">CVE-2016-6252</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2616">CVE-2017-2616</uri>
</references>
<metadata tag="requester" timestamp="2017-03-07T23:12:11Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T06:29:12Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,76 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-03">
<title>QEMU: Multiple vulnerabilities </title>
<synopsis>Multiple vulnerabilities have been found in QEMU, the worst of
which may allow a remote attacker to cause a Denial of Service or gain
elevated privileges from a guest VM.
</synopsis>
<product type="ebuild">qemu</product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 1</revised>
<bug>614744</bug>
<bug>615874</bug>
<bug>616460</bug>
<bug>616462</bug>
<bug>616482</bug>
<bug>616484</bug>
<bug>616636</bug>
<bug>616870</bug>
<bug>616872</bug>
<bug>616874</bug>
<bug>618808</bug>
<bug>619018</bug>
<bug>619020</bug>
<bug>620322</bug>
<access>local, remote</access>
<affected>
<package name="app-emulation/qemu" auto="yes" arch="*">
<unaffected range="ge">2.9.0-r2</unaffected>
<vulnerable range="lt">2.9.0-r2</vulnerable>
</package>
</affected>
<background>
<p>QEMU is a generic and open source machine emulator and virtualizer.</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in QEMU. Please review the
CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker might cause a Denial of Service or gain escalated
privileges from a guest VM.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All QEMU users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=app-emulation/qemu-2.9.0-r2"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9603">CVE-2016-9603</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7377">CVE-2017-7377</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7471">CVE-2017-7471</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7493">CVE-2017-7493</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7718">CVE-2017-7718</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7980">CVE-2017-7980</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8086">CVE-2017-8086</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8112">CVE-2017-8112</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8309">CVE-2017-8309</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8379">CVE-2017-8379</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8380">CVE-2017-8380</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9060">CVE-2017-9060</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9310">CVE-2017-9310</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9330">CVE-2017-9330</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T06:36:34Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T06:41:28Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,52 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-04">
<title>Git: Security bypass</title>
<synopsis>A vulnerability in Git might allow remote attackers to bypass
security restrictions.
</synopsis>
<product type="ebuild">git</product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 1</revised>
<bug>618126</bug>
<access>remote</access>
<affected>
<package name="dev-vcs/git" auto="yes" arch="*">
<unaffected range="ge">2.13.0</unaffected>
<vulnerable range="lt">2.13.0</vulnerable>
</package>
</affected>
<background>
<p>Git is a free and open source distributed version control system
designed to handle everything from small to very large projects with
speed and efficiency.
</p>
</background>
<description>
<p>Timo Schmid discovered that the Git restricted shell incorrectly
filtered allowed commands.
</p>
</description>
<impact type="normal">
<p>A remote attacker could possibly bypass security restrictions and access
sensitive information.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Git users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-vcs/git-2.13.0"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8386">CVE-2017-8386</uri>
</references>
<metadata tag="requester" timestamp="2017-05-18T06:04:29Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T08:33:25Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,58 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-05">
<title>D-Bus: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities in D-Bus might allow an attacker to
overwrite files with a fixed filename in arbitrary directories or conduct a
symlink attack.
</synopsis>
<product type="ebuild">dbus</product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 1</revised>
<bug>611392</bug>
<access>local, remote</access>
<affected>
<package name="sys-apps/dbus" auto="yes" arch="*">
<unaffected range="ge">1.10.18</unaffected>
<vulnerable range="lt">1.10.18</vulnerable>
</package>
</affected>
<background>
<p>D-Bus is a message bus system which processes can use to talk to each
other.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in D-Bus. Please review
the original report referenced below for details.
</p>
</description>
<impact type="normal">
<p>An attacker could possibly overwrite arbitrary files named “once”
with content not controlled by the attacker.
</p>
<p>A local attacker could perform a symlink attack against D-Bus test
suite.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All D-Bus users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=sys-apps/dbus-1.10.18"
</code>
</resolution>
<references>
<uri link="http://www.openwall.com/lists/oss-security/2017/02/16/4">
Original report
</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:09:05Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T08:33:43Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,61 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-06">
<title>ImageWorsener: Multiple vulnerabilities </title>
<synopsis>Multiple vulnerabilities have been found in ImageWorsener, the
worst of which allows remote attackers to cause a Denial of Service
condition or have other unspecified impact.
</synopsis>
<product type="ebuild">ImageWorsener</product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 1</revised>
<bug>618014</bug>
<access>remote</access>
<affected>
<package name="media-gfx/imageworsener" auto="yes" arch="*">
<unaffected range="ge">1.3.1</unaffected>
<vulnerable range="lt">1.3.1</vulnerable>
</package>
</affected>
<background>
<p>ImageWorsener is a cross-platform command-line utility and library for
image scaling and other image processing.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in ImageWorsener. Please
review the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could entice a user to process a specially crafted
image file using ImageWorsener, possibly resulting in a Denial of Service
condition or have other unspecified impacts.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All ImageWorsener users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=media-gfx/imageworsener-1.3.1"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7452">CVE-2017-7452</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7453">CVE-2017-7453</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7454">CVE-2017-7454</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7939">CVE-2017-7939</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7940">CVE-2017-7940</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7962">CVE-2017-7962</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8325">CVE-2017-8325</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8326">CVE-2017-8326</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8327">CVE-2017-8327</uri>
</references>
<metadata tag="requester" timestamp="2017-05-18T06:32:49Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T08:33:56Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,64 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-07">
<title>Libtirpc and RPCBind: Denial of Service </title>
<synopsis>A vulnerability has been found in Libtirpc and RPCBind which may
allow a remote attacker to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">RPCBind,Libtirpc</product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 2</revised>
<bug>617472</bug>
<access>remote</access>
<affected>
<package name="net-nds/rpcbind" auto="yes" arch="*">
<unaffected range="ge">0.2.4-r1</unaffected>
<vulnerable range="lt">0.2.4-r1</vulnerable>
</package>
<package name="net-libs/libtirpc" auto="yes" arch="*">
<unaffected range="ge">1.0.1-r1</unaffected>
<vulnerable range="lt">1.0.1-r1</vulnerable>
</package>
</affected>
<background>
<p>The RPCBind utility is a server that converts RPC program numbers into
universal addresses.
</p>
<p>Libtirpc is a port of Suns Transport-Independent RPC library to Linux.</p>
</background>
<description>
<p>It was found that due to the way RPCBind uses libtirpc (libntirpc), a
memory leak can occur when parsing specially crafted XDR messages.
</p>
</description>
<impact type="normal">
<p>A remote attacker could send thousands of messages to RPCBind, possibly
resulting in a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All RPCBind users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-nds/rpcbind-0.2.4-r1"
</code>
<p>All Libtirpc users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-libs/libtirpc-1.0.1-r1"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8779">CVE-2017-8779</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:26:12Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T11:58:19Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,57 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-08">
<title>MuPDF: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in MuPDF, the worst of
which allows remote attackers to cause a Denial of Service condition or
have other unspecified impact.
</synopsis>
<product type="ebuild">mupdf</product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 1</revised>
<bug>611444</bug>
<bug>614044</bug>
<bug>614852</bug>
<access>remote</access>
<affected>
<package name="app-text/mupdf" auto="yes" arch="*">
<unaffected range="ge">1.11-r1</unaffected>
<vulnerable range="lt">1.11-r1</vulnerable>
</package>
</affected>
<background>
<p>A lightweight PDF, XPS, and E-book viewer.</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in MuPDF. Please review
the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could entice a user to process a specially crafted PDF
document or image using MuPDF, possibly resulting in a Denial of Service
condition or have other unspecified impact.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All MuPDF users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=app-text/mupdf-1.11-r1"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10221">
CVE-2016-10221
</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5991">CVE-2017-5991</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6060">CVE-2017-6060</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:28:46Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T08:34:32Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,52 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-09">
<title>FileZilla: Buffer overflow</title>
<synopsis>A vulnerability in a bundled copy of PuTTY in FileZilla might allow
remote attackers to execute arbitrary code or cause a denial of service.
</synopsis>
<product type="ebuild">filezilla</product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 1</revised>
<bug>610554</bug>
<access>remote</access>
<affected>
<package name="net-ftp/filezilla" auto="yes" arch="*">
<unaffected range="ge">3.25.2</unaffected>
<vulnerable range="lt">3.25.2</vulnerable>
</package>
</affected>
<background>
<p>FileZilla is an open source FTP client.</p>
</background>
<description>
<p>FileZilla is affected by the same vulnerability as reported in “GLSA
201703-03” because the package included a vulnerable copy of PuTTY.
Please read the GLSA for PuTTY referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker, utilizing the SSH agent forwarding of an SSH server,
could execute arbitrary code with the privileges of the user running
FileZilla or cause a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All FileZilla users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-ftp/filezilla-3.25.2"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6542">CVE-2017-6542</uri>
<uri link="https://security.gentoo.org/glsa/201703-03">GLSA 201703-03</uri>
</references>
<metadata tag="requester" timestamp="2017-06-04T11:05:52Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-06T08:34:45Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,52 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-10">
<title>Pidgin: Arbitrary code execution</title>
<synopsis>A vulnerability in Pidgin might allow remote attackers to execute
arbitrary code.
</synopsis>
<product type="ebuild">pidgin</product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 1</revised>
<bug>612188</bug>
<access>remote</access>
<affected>
<package name="net-im/pidgin" auto="yes" arch="*">
<unaffected range="ge">2.12.0</unaffected>
<vulnerable range="lt">2.12.0</vulnerable>
</package>
</affected>
<background>
<p>Pidgin is a GTK Instant Messenger client for a variety of instant
messaging protocols.
</p>
</background>
<description>
<p>Joseph Bisch discovered that Pidgin incorrectly handled certain xml
messages.
</p>
</description>
<impact type="normal">
<p>A remote attacker could send a specially crafted instant message,
possibly resulting in execution of arbitrary code with the privileges of
the Pidgin process.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Pidgin users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-im/pidgin-2.12.0"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2640">CVE-2017-2640</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T06:30:00Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T19:36:09Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,52 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-11">
<title>PCRE library: Denial of Service</title>
<synopsis>A vulnerability in PCRE library allows remote attackers to cause a
Denial of Service condition.
</synopsis>
<product type="ebuild">PCRE</product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 1</revised>
<bug>609592</bug>
<access>remote</access>
<affected>
<package name="dev-libs/libpcre" auto="yes" arch="*">
<unaffected range="ge">8.40-r1</unaffected>
<vulnerable range="lt">8.40-r1</vulnerable>
</package>
</affected>
<background>
<p>PCRE library is a set of functions that implement regular expression
pattern matching using the same syntax and semantics as Perl 5.
</p>
</background>
<description>
<p>It was found that the compile_bracket_matchingpath function in
pcre_jit_compile.c in PCRE library is vulnerable to an out-of-bounds
read.
</p>
</description>
<impact type="normal">
<p>A remote attacker could possibly cause a Denial of Service condition via
a special crafted regular expression.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All PCRE library users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-libs/libpcre-8.40-r1"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6004">CVE-2017-6004</uri>
</references>
<metadata tag="requester" timestamp="2017-04-26T00:55:28Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T19:43:31Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,57 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-12">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in Wireshark, the worst of
which allows remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">wireshark</product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 1</revised>
<bug>609646</bug>
<bug>615462</bug>
<access>remote</access>
<affected>
<package name="net-analyzer/wireshark" auto="yes" arch="*">
<unaffected range="ge">2.2.6</unaffected>
<vulnerable range="lt">2.2.6</vulnerable>
</package>
</affected>
<background>
<p>Wireshark is a network protocol analyzer formerly known as ethereal.</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in Wireshark. Please
review the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could entice a user to process a specially crafted
network packet using Wireshark, possibly resulting a Denial of Service
condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Wireshark users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-2.2.6"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6014">CVE-2017-6014</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7700">CVE-2017-7700</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7701">CVE-2017-7701</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7702">CVE-2017-7702</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7703">CVE-2017-7703</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7704">CVE-2017-7704</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7705">CVE-2017-7705</uri>
</references>
<metadata tag="requester" timestamp="2017-03-24T05:23:51Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T19:48:46Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,50 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-13">
<title>minicom: Remote execution of arbitrary code</title>
<synopsis>An out-of-bounds data access in minicom might allow remote
attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">minicom</product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 1</revised>
<bug>615996</bug>
<access>remote</access>
<affected>
<package name="net-dialup/minicom" auto="yes" arch="*">
<unaffected range="ge">2.7.1</unaffected>
<vulnerable range="lt">2.7.1</vulnerable>
</package>
</affected>
<background>
<p>Minicom is a text-based serial port communications program.</p>
</background>
<description>
<p>In minicom before version 2.7.1, the escparms[] buffer in vt100.c is
vulnerable to an overflow.
</p>
</description>
<impact type="normal">
<p>A remote attacker, able to connect to a minicom port, could possibly
execute arbitrary code with the privileges of the process, or cause a
Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All minicom users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-dialup/minicom-2.7.1"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7467">CVE-2017-7467</uri>
</references>
<metadata tag="requester" timestamp="2017-04-30T12:15:55Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T20:02:58Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,61 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-14">
<title>FreeType: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in FreeType, the worst of
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">freetype </product>
<announced>2017-06-06</announced>
<revised>2017-06-06: 1</revised>
<bug>612192</bug>
<bug>616730</bug>
<access>remote</access>
<affected>
<package name="media-libs/freetype" auto="yes" arch="*">
<unaffected range="ge">2.8</unaffected>
<vulnerable range="lt">2.8</vulnerable>
</package>
</affected>
<background>
<p>FreeType is a high-quality and portable font engine.</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in FreeType. Please review
the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could entice a user to use a specially crafted font
file using FreeType, possibly resulting in execution of arbitrary code
with the privileges of the process or a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All FreeType users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-2.8"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10244">
CVE-2016-10244
</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10328">
CVE-2016-10328
</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7857">CVE-2017-7857</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7858">CVE-2017-7858</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7864">CVE-2017-7864</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8105">CVE-2017-8105</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8287">CVE-2017-8287</uri>
</references>
<metadata tag="requester" timestamp="2017-04-11T06:23:01Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T20:06:36Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,152 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-15">
<title>WebKitGTK+: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in WebKitGTK+, the worst
of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">webkit-gtk</product>
<announced>2017-06-07</announced>
<revised>2017-06-07: 1</revised>
<bug>543650</bug>
<bug>573656</bug>
<bug>577068</bug>
<bug>608958</bug>
<bug>614876</bug>
<bug>619788</bug>
<access>remote</access>
<affected>
<package name="net-libs/webkit-gtk" auto="yes" arch="*">
<unaffected range="ge">2.16.3</unaffected>
<vulnerable range="lt">2.16.3</vulnerable>
</package>
</affected>
<background>
<p>WebKitGTK+ is a full-featured port of the WebKit rendering engine.</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in WebKitGTK+. Please
review the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attack can use multiple vectors to execute arbitrary code or
cause a denial of service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All WebKitGTK+ users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-libs/webkit-gtk-2.16.3:4"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2330">CVE-2015-2330</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7096">CVE-2015-7096</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7098">CVE-2015-7098</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1723">CVE-2016-1723</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1724">CVE-2016-1724</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1725">CVE-2016-1725</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1726">CVE-2016-1726</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1727">CVE-2016-1727</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1728">CVE-2016-1728</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4692">CVE-2016-4692</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4743">CVE-2016-4743</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7586">CVE-2016-7586</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7587">CVE-2016-7587</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7589">CVE-2016-7589</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7592">CVE-2016-7592</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7598">CVE-2016-7598</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7599">CVE-2016-7599</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7610">CVE-2016-7610</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7611">CVE-2016-7611</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7623">CVE-2016-7623</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7632">CVE-2016-7632</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7635">CVE-2016-7635</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7639">CVE-2016-7639</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7640">CVE-2016-7640</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7641">CVE-2016-7641</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7642">CVE-2016-7642</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7645">CVE-2016-7645</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7646">CVE-2016-7646</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7648">CVE-2016-7648</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7649">CVE-2016-7649</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7652">CVE-2016-7652</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7654">CVE-2016-7654</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7656">CVE-2016-7656</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9642">CVE-2016-9642</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9643">CVE-2016-9643</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2350">CVE-2017-2350</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2354">CVE-2017-2354</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2355">CVE-2017-2355</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2356">CVE-2017-2356</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2362">CVE-2017-2362</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2363">CVE-2017-2363</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2364">CVE-2017-2364</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2365">CVE-2017-2365</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2366">CVE-2017-2366</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2367">CVE-2017-2367</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2369">CVE-2017-2369</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2371">CVE-2017-2371</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2373">CVE-2017-2373</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2376">CVE-2017-2376</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2377">CVE-2017-2377</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2386">CVE-2017-2386</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2392">CVE-2017-2392</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2394">CVE-2017-2394</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2395">CVE-2017-2395</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2396">CVE-2017-2396</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2405">CVE-2017-2405</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2415">CVE-2017-2415</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2419">CVE-2017-2419</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2433">CVE-2017-2433</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2442">CVE-2017-2442</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2445">CVE-2017-2445</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2446">CVE-2017-2446</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2447">CVE-2017-2447</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2454">CVE-2017-2454</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2455">CVE-2017-2455</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2457">CVE-2017-2457</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2459">CVE-2017-2459</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2460">CVE-2017-2460</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2464">CVE-2017-2464</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2465">CVE-2017-2465</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2466">CVE-2017-2466</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2468">CVE-2017-2468</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2469">CVE-2017-2469</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2470">CVE-2017-2470</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2471">CVE-2017-2471</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2475">CVE-2017-2475</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2476">CVE-2017-2476</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2481">CVE-2017-2481</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2496">CVE-2017-2496</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2504">CVE-2017-2504</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2505">CVE-2017-2505</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2506">CVE-2017-2506</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2508">CVE-2017-2508</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2510">CVE-2017-2510</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2514">CVE-2017-2514</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2515">CVE-2017-2515</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2521">CVE-2017-2521</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2525">CVE-2017-2525</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2526">CVE-2017-2526</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2528">CVE-2017-2528</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2530">CVE-2017-2530</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2531">CVE-2017-2531</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2536">CVE-2017-2536</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2539">CVE-2017-2539</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2544">CVE-2017-2544</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2547">CVE-2017-2547</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2549">CVE-2017-2549</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6980">CVE-2017-6980</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6984">CVE-2017-6984</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T06:44:45Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-07T11:52:15Z">whissi</metadata>
</glsa>

View File

@ -1 +1 @@
Wed, 31 May 2017 20:08:57 +0000
Fri, 16 Jun 2017 18:39:35 +0000

View File

@ -1 +1 @@
742dfe25646ca49d62bb5f6452a3600f934c798d 1496157625 2017-05-30T15:20:25+00:00
c2f911fc13b81dd715a1b756f739b077f8718170 1496836599 2017-06-07T11:56:39+00:00

View File

@ -1,14 +0,0 @@
DEFINED_PHASES=compile configure install postinst preinst prepare test
DEPEND=bzip2? ( app-arch/bzip2 ) zlib? ( sys-libs/zlib ) libedit? ( dev-libs/libedit ) readline? ( sys-libs/readline:0= ) virtual/pkgconfig >=app-portage/elt-patches-20170317
DESCRIPTION=Perl-compatible regular expression library
EAPI=5
HOMEPAGE=http://www.pcre.org/
IUSE=bzip2 +cxx +jit libedit pcre16 pcre32 +readline +recursion-limit static-libs unicode zlib abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64
KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris
LICENSE=BSD
RDEPEND=bzip2? ( app-arch/bzip2 ) zlib? ( sys-libs/zlib ) libedit? ( dev-libs/libedit ) readline? ( sys-libs/readline:0= ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20131008-r2 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] )
REQUIRED_USE=readline? ( !libedit ) libedit? ( !readline )
SLOT=3
SRC_URI=mirror://sourceforge/pcre/pcre-8.39.tar.bz2 ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-8.39.tar.bz2
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 0236be304ee52e7f179ed2f337075515 multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
_md5_=8cea658ecb3a8ab68b6c60e71332af64

View File

@ -4,11 +4,11 @@ DESCRIPTION=Perl-compatible regular expression library
EAPI=5
HOMEPAGE=http://www.pcre.org/
IUSE=bzip2 +cxx +jit libedit pcre16 pcre32 +readline +recursion-limit static-libs unicode zlib abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris
KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~x64-cygwin ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris
LICENSE=BSD
RDEPEND=bzip2? ( app-arch/bzip2 ) zlib? ( sys-libs/zlib ) libedit? ( dev-libs/libedit ) readline? ( sys-libs/readline:0= ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20131008-r2 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] )
REQUIRED_USE=readline? ( !libedit ) libedit? ( !readline )
SLOT=3
SRC_URI=mirror://sourceforge/pcre/pcre-8.40.tar.bz2 ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-8.40.tar.bz2
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 0236be304ee52e7f179ed2f337075515 multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
_md5_=e24078c3bf31eeccaf5083daab081345
_md5_=8fa5a2e376df0b50998868f4899fe96b

View File

@ -4,10 +4,10 @@ DESCRIPTION=Serial Communication Program
EAPI=4
HOMEPAGE=http://alioth.debian.org/projects/minicom
IUSE=nls linguas_cs linguas_da linguas_de linguas_es linguas_fi linguas_fr linguas_hu linguas_id linguas_ja linguas_nb linguas_pl linguas_pt_BR linguas_ro linguas_ru linguas_rw linguas_sv linguas_vi linguas_zh_TW
KEYWORDS=alpha amd64 arm arm64 hppa ia64 ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~ia64-linux ~x86-linux
KEYWORDS=alpha amd64 arm arm64 hppa ia64 ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~x86-linux
LICENSE=GPL-2
RDEPEND=sys-libs/ncurses net-dialup/lrzsz
SLOT=0
SRC_URI=http://alioth.debian.org/download.php/3689/minicom-2.6.tar.gz
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
_md5_=d5883eb3bacfd64b966ce7979e837124
_md5_=16f445b91e280f71152813ab9535e2b8

View File

@ -4,10 +4,10 @@ DESCRIPTION=Serial Communication Program
EAPI=5
HOMEPAGE=http://alioth.debian.org/projects/minicom
IUSE=nls linguas_cs linguas_da linguas_de linguas_es linguas_fi linguas_fr linguas_hu linguas_id linguas_ja linguas_nb linguas_pl linguas_pt_BR linguas_ro linguas_ru linguas_rw linguas_sv linguas_vi linguas_zh_TW
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~ia64-linux ~x86-linux
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~x86-linux
LICENSE=GPL-2
RDEPEND=sys-libs/ncurses net-dialup/lrzsz
SLOT=0
SRC_URI=https://alioth.debian.org/frs/download.php/file/3977/minicom-2.7.tar.gz
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
_md5_=9413b7d98cbaf517f463609fc8c2943e
_md5_=cfd66281a0d56f19fd754ba244dc67fb

View File

@ -0,0 +1,13 @@
DEFINED_PHASES=configure install preinst prepare
DEPEND=sys-libs/ncurses:= nls? ( sys-devel/gettext ) >=app-portage/elt-patches-20170317 !<sys-devel/gettext-0.18.1.1-r3 || ( >=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4
DESCRIPTION=Serial Communication Program
EAPI=6
HOMEPAGE=http://alioth.debian.org/projects/minicom
IUSE=nls linguas_cs linguas_da linguas_de linguas_es linguas_fi linguas_fr linguas_hu linguas_id linguas_ja linguas_nb linguas_pl linguas_pt_BR linguas_ro linguas_ru linguas_rw linguas_sv linguas_vi linguas_zh_TW
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~x86-linux
LICENSE=GPL-2
RDEPEND=sys-libs/ncurses:= net-dialup/lrzsz
SLOT=0
SRC_URI=https://alioth.debian.org/frs/download.php/file/3977/minicom-2.7.tar.gz
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
_md5_=a3d9bbae9dfc0269dc8d444b933b5a51

View File

@ -0,0 +1,13 @@
DEFINED_PHASES=configure install preinst prepare
DEPEND=sys-libs/ncurses:= nls? ( sys-devel/gettext ) >=app-portage/elt-patches-20170317 !<sys-devel/gettext-0.18.1.1-r3 || ( >=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4
DESCRIPTION=Serial Communication Program
EAPI=6
HOMEPAGE=http://alioth.debian.org/projects/minicom
IUSE=nls linguas_cs linguas_da linguas_de linguas_es linguas_fi linguas_fr linguas_hu linguas_id linguas_ja linguas_nb linguas_pl linguas_pt_BR linguas_ro linguas_ru linguas_rw linguas_sv linguas_vi linguas_zh_TW
KEYWORDS=alpha amd64 arm ~arm64 hppa ~ia64 ~mips ppc ppc64 ~s390 ~sh sparc x86 ~x86-fbsd ~amd64-linux ~x86-linux
LICENSE=GPL-2
RDEPEND=sys-libs/ncurses:= net-dialup/lrzsz
SLOT=0
SRC_URI=https://alioth.debian.org/frs/download.php/file/3977/minicom-2.7.1.tar.gz
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
_md5_=dd0814779c328ca33c21fd55e5142504

View File

@ -1,387 +0,0 @@
# ChangeLog for net-dialup/minicom
# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2
# $Header: /var/cvsroot/gentoo-x86/net-dialup/minicom/ChangeLog,v 1.106 2015/03/23 15:54:05 radhermit Exp $
23 Mar 2015; Tim Harder <radhermit@gentoo.org> metadata.xml:
Drop myself as maintainer.
19 Jan 2015; Tim Harder <radhermit@gentoo.org> -minicom-2.5.ebuild,
-minicom-2.6.2-r1.ebuild:
Remove old.
03 Aug 2014; <tgall@gentoo.org> minicom-2.6.2-r1.ebuild, minicom-2.6.ebuild,
minicom-2.7.ebuild:
arm64, initial support
01 Jan 2014; Tim Harder <radhermit@gentoo.org> minicom-2.7.ebuild:
Remove unneeded AR export.
*minicom-2.7 (01 Jan 2014)
01 Jan 2014; Tim Harder <radhermit@gentoo.org> +minicom-2.7.ebuild:
Version bump.
*minicom-2.6.2-r1 (30 Oct 2013)
30 Oct 2013; Sergey Popov <pinkbyte@gentoo.org> -minicom-2.6.2.ebuild,
+minicom-2.6.2-r1.ebuild:
Revision bump: respect AR, wrt bug #489734, thanks to Mikle Kolyada for
discovering this issue. Drop old revision
*minicom-2.6.2 (06 Apr 2013)
06 Apr 2013; Tim Harder <radhermit@gentoo.org> +minicom-2.6.2.ebuild:
Version bump.
06 May 2012; Raúl Porcel <armin76@gentoo.org> minicom-2.6.ebuild:
alpha/ia64/s390/sh/sparc stable wrt #409607
05 Apr 2012; Pawel Hajdan jr <phajdan.jr@gentoo.org> minicom-2.6.ebuild:
x86 stable wrt bug #409607
04 Apr 2012; Jeroen Roovers <jer@gentoo.org> minicom-2.6.ebuild:
Stable for HPPA (bug #409607).
31 Mar 2012; Markus Meier <maekke@gentoo.org> minicom-2.6.ebuild:
arm stable, bug #409607
29 Mar 2012; Agostino Sarubbo <ago@gentoo.org> minicom-2.6.ebuild:
Stable for amd64, wrt bug #409607
25 Mar 2012; Brent Baude <ranger@gentoo.org> minicom-2.6.ebuild:
Marking minicom-2.6 ppc64 for bug 409607
25 Mar 2012; Brent Baude <ranger@gentoo.org> minicom-2.6.ebuild:
Marking minicom-2.6 ppc for bug 409607
09 Mar 2012; Naohiro Aota <naota@gentoo.org>
+files/minicom-2.6-etimeout.patch, minicom-2.6.ebuild:
Add ~x86-fbsd; Add upstream patch to use ETIMEOUT instead of ETIME. Bug
#397747
03 Mar 2012; Tim Harder <radhermit@gentoo.org> -minicom-2.4.ebuild:
Remove old.
03 Mar 2012; Brent Baude <ranger@gentoo.org> minicom-2.5.ebuild:
Marking minicom-2.5 ppc64 for bug 389063
01 Feb 2012; Brent Baude <ranger@gentoo.org> minicom-2.5.ebuild:
Marking minicom-2.5 ppc for bug 389063
*minicom-2.6 (28 Dec 2011)
28 Dec 2011; Tim Harder <radhermit@gentoo.org> +minicom-2.6.ebuild:
Version bump.
26 Nov 2011; Raúl Porcel <armin76@gentoo.org> minicom-2.5.ebuild:
alpha/ia64/s390/sh/sparc stable wrt #389063
06 Nov 2011; Markus Meier <maekke@gentoo.org> minicom-2.5.ebuild:
arm stable, bug #389063
02 Nov 2011; Pawel Hajdan jr <phajdan.jr@gentoo.org> minicom-2.5.ebuild:
x86 stable wrt bug #389063
02 Nov 2011; Jeroen Roovers <jer@gentoo.org> minicom-2.5.ebuild:
Stable for HPPA (bug #389063).
01 Nov 2011; Tony Vroon <chainsaw@gentoo.org> minicom-2.5.ebuild:
Marked stable on AMD64 based on arch testing by Agostino "ago" Sarubbo &
Elijah "Armageddon" El Lazkani in bug #389063.
31 Oct 2011; Tim Harder <radhermit@gentoo.org> minicom-2.5.ebuild:
Use default instead of default_src_install.
*minicom-2.5 (03 Feb 2011)
03 Feb 2011; Tim Harder <radhermit@gentoo.org> +minicom-2.5.ebuild,
metadata.xml:
Version bump. Update to EAPI 4 and add myself as maintainer.
23 May 2010; Raúl Porcel <armin76@gentoo.org> minicom-2.4.ebuild:
alpha/arm/ia64/s390/sh/sparc stable wrt #317703
20 May 2010; Peter Volkov <pva@gentoo.org> minicom-2.4.ebuild:
amd64 stable, bug #317703
19 May 2010; Jeroen Roovers <jer@gentoo.org> minicom-2.4.ebuild:
Stable for HPPA (bug #317703).
13 May 2010; Jeremy Olexa <darkside@gentoo.org> minicom-2.4.ebuild:
Add Gentoo Prefix changes. Bump to EAPI3, add keywords. bug 316827
12 May 2010; Joseph Jezak <josejx@gentoo.org> minicom-2.4.ebuild:
Marked ppc/ppc64 stable for bug #317703.
10 May 2010; Pawel Hajdan jr <phajdan.jr@gentoo.org> minicom-2.4.ebuild:
x86 stable wrt bug #317703
*minicom-2.4 (19 Feb 2010)
19 Feb 2010; Patrick Lauer <patrick@gentoo.org> +minicom-2.4.ebuild:
Bump to 2.4, thanks to Tim Harder. Fixes #304167
11 Jul 2009; Joseph Jezak <josejx@gentoo.org> minicom-2.3-r2.ebuild:
Marked ppc stable for bug #274781.
04 Jul 2009; Brent Baude <ranger@gentoo.org> minicom-2.3-r2.ebuild:
stable ppc64, bug 274781
28 Jun 2009; Tobias Klausmann <klausman@gentoo.org> minicom-2.3-r2.ebuild:
Stable on alpha, bug #274781
24 Jun 2009; Jeroen Roovers <jer@gentoo.org> minicom-2.3-r2.ebuild:
Stable for HPPA (bug #274781).
*minicom-2.3-r2 (20 Jun 2009)
20 Jun 2009; Alin Năstac <mrness@gentoo.org>
files/minicom-2.3-getline-rename.patch, -minicom-2.3-r1.ebuild,
+minicom-2.3-r2.ebuild:
Update getline-rename.patch (#270452). Migrate to EAPI 2.
19 May 2009; Markus Ullmann <jokey@gentoo.org> minicom-2.3-r1.ebuild,
+files/minicom-2.3-getline-rename.patch:
Add glibc name conflict fix, thanks to Conrad Kostecki in bug #270452
18 Nov 2008; Alin Năstac <mrness@gentoo.org> minicom-2.2-r1.ebuild,
minicom-2.3-r1.ebuild:
Fix dependency typo (#246829).
21 Jun 2008; Robert Buchholz <rbu@gentoo.org> minicom-2.3-r1.ebuild:
amd64 stable
03 Jun 2008; Raúl Porcel <armin76@gentoo.org> minicom-2.3-r1.ebuild:
ia64/sparc/x86 stable
*minicom-2.3-r1 (20 Apr 2008)
20 Apr 2008; Alin Năstac <mrness@gentoo.org>
files/minicom-2.3-gentoo-runscript.patch,
-files/minicom-2.3-one-off.patch, -minicom-2.3.ebuild,
+minicom-2.3-r1.ebuild:
Correct SRC_URI (#218353).
*minicom-2.3 (14 Apr 2008)
14 Apr 2008; Alin Năstac <mrness@gentoo.org>
+files/minicom-2.3-gentoo-runscript.patch,
+files/minicom-2.3-one-off.patch, +minicom-2.3.ebuild:
Version bump (#215173).
27 Dec 2007; Alin Năstac <mrness@gentoo.org> minicom-2.2-r1.ebuild:
Added nls support (#203225).
11 Jul 2007; Alin Năstac <mrness@gentoo.org>
-files/minicom-2.1-gcc4.patch, -files/minicom-2.1-gentoo-runscript.patch,
-files/minicom-2.1-memcpy-bounds.diff, -minicom-2.1-r2.ebuild,
-minicom-2.2.ebuild:
Remove obsolete versions.
10 Jun 2007; Markus Rothe <corsair@gentoo.org> minicom-2.2-r1.ebuild:
Stable on ppc64 - now really; bug #180120
10 Jun 2007; Joshua Kinard <kumba@gentoo.org> minicom-2.2-r1.ebuild:
Stable on mips, per #180120.
08 Jun 2007; Raúl Porcel <armin76@gentoo.org> minicom-2.2-r1.ebuild:
alpha stable wrt security #180120
01 Jun 2007; Raúl Porcel <armin76@gentoo.org> minicom-2.2-r1.ebuild:
ia64 stable wrt security #180120
31 May 2007; Christian Faulhammer <opfer@gentoo.org>
minicom-2.2-r1.ebuild:
stable x86, security bug 180120
30 May 2007; Peter Weller <welp@gentoo.org> minicom-2.2-r1.ebuild:
Stable on amd64 wrt bug 180120
29 May 2007; Gustavo Zacarias <gustavoz@gentoo.org> minicom-2.2-r1.ebuild:
Stable on sparc wrt #180120
29 May 2007; Mike Frysinger <vapier@gentoo.org> minicom-2.2-r1.ebuild:
Remove bindnow-flags and make sure minirc.dfl check respects ROOT.
29 May 2007; Brent Baude <ranger@gentoo.org> ChangeLog:
Marking minicom-2.1-r2 ppc64 stable for 180120
29 May 2007; Tobias Scherbaum <dertobi123@gentoo.org>
minicom-2.2-r1.ebuild:
ppc stable, bug #180120
29 May 2007; Jeroen Roovers <jer@gentoo.org> minicom-2.2-r1.ebuild:
Stable for HPPA (bug #180120).
*minicom-2.2-r1 (28 May 2007)
28 May 2007; Alin Năstac <mrness@gentoo.org> +minicom-2.2-r1.ebuild:
Remove sgid bit and uucp group from minicom executable (#180120).
12 May 2007; Joshua Kinard <kumba@gentoo.org> minicom-2.2.ebuild:
Stable on mips.
16 Apr 2007; Markus Rothe <corsair@gentoo.org> minicom-2.2.ebuild:
Stable on ppc64
06 Apr 2007; Tobias Scherbaum <dertobi123@gentoo.org> minicom-2.2.ebuild:
ppc stable
13 Mar 2007; Raúl Porcel <armin76@gentoo.org> minicom-2.2.ebuild:
x86 stable
12 Feb 2007; Gustavo Zacarias <gustavoz@gentoo.org> minicom-2.2.ebuild:
Stable on sparc
10 Feb 2007; Alin Năstac <mrness@gentoo.org> minicom-2.2.ebuild:
Stable on amd64.
18 Nov 2006; Alin Nastac <mrness@gentoo.org> -minicom-2.1-r1.ebuild,
minicom-2.1-r2.ebuild:
Stable on amd64. Remove obsolete revision.
04 Nov 2006; Alexander H. Færøy <eroyf@gentoo.org>
minicom-2.1-r2.ebuild:
Stable on alpha.
*minicom-2.2 (31 Oct 2006)
31 Oct 2006; Mike Frysinger <vapier@gentoo.org>
+files/minicom-2.2-gentoo-runscript.patch,
+files/minicom-2.2-one-off.patch, +minicom-2.2.ebuild:
Version bump.
09 Jul 2006; Joshua Kinard <kumba@gentoo.org> minicom-2.1-r2.ebuild:
Marked stable on mips.
22 Mar 2006; Michael Hanselmann <hansmi@gentoo.org> minicom-2.1-r2.ebuild:
Stable on ppc.
19 Mar 2006; Markus Rothe <corsair@gentoo.org> minicom-2.1-r2.ebuild:
Stable on ppc64
13 Mar 2006; Gustavo Zacarias <gustavoz@gentoo.org> minicom-2.1-r2.ebuild:
Stable on hppa
13 Mar 2006; Gustavo Zacarias <gustavoz@gentoo.org> minicom-2.1-r2.ebuild:
Stable on sparc
12 Mar 2006; Alin Nastac <mrness@gentoo.org> metadata.xml,
minicom-2.1-r2.ebuild:
Add package description in metadata.xml. Stable on x86.
25 Dec 2005; Diego Pettenò <flameeyes@gentoo.org> minicom-2.1-r2.ebuild:
Use bindnow-flags function instead of -Wl,-z,now.
*minicom-2.1-r2 (13 Dec 2005)
13 Dec 2005; Alin Nastac <mrness@gentoo.org>
+files/minicom-2.1-gentoo-runscript.patch, +minicom-2.1-r2.ebuild:
Install minicom with group uucp and sgid for allowing normal users to lock
the serial ports that are entitled to use (#108088). Set default script
program by its full path (/usr/bin/runscript) for avoiding usage of
baselayout's runscript (#114754).
04 Oct 2005; Alin Nastac <mrness@gentoo.org> minicom-2.1-r1.ebuild:
Remove INSTALL from docs.
27 Jun 2005; Markus Rothe <corsair@gentoo.org> minicom-2.1-r1.ebuild:
Stable on ppc64
29 May 2005; Alin Nastac <mrness@gentoo.org>
+files/minicom-2.1-gcc4.patch, minicom-2.1-r1.ebuild:
Apply patch from upstream CVS to allow compiling with gcc-4.0 (#93120).
21 May 2005; Markus Rothe <corsair@gentoo.org> minicom-2.1-r1.ebuild:
Added ~ppc64 to KEYWORDS
29 Dec 2004; Ciaran McCreesh <ciaranm@gentoo.org> :
Change encoding to UTF-8 for GLEP 31 compliance
21 Nov 2004; Alin Nastac <mrness@gentoo.org> -minicom-1.83.1-r1.ebuild,
-minicom-2.00.0.ebuild, -minicom-2.1.ebuild:
Removed obsolete ebuilds.
21 Nov 2004; Karol Wojtaszek <sekretarz@gentoo.org> minicom-2.1-r1.ebuild:
Stable on amd64, bug #71817
20 Nov 2004; Daniel Black <dragonheart@gentoo.org> minicom-2.1-r1.ebuild:
ppc stable as per bug #71817
07 Nov 2004; Alin Nastac <mrness@gentoo.org> minicom-2.1.ebuild, minicom-2.1-r1.ebuild:
Added net-misc/lrzsz to RDEPEND, which closes bug #36133
27 Oct 2004; Jason Wever <weeve@gentoo.org> minicom-2.1-r1.ebuild:
Stable on sparc.
05 Jun 2004; Bryan Østergaard <kloeri@gentoo.org> minicom-2.1-r1.ebuild:
Stable on alpha.
27 Apr 2004; Aron Griffis <agriffis@gentoo.org> minicom-2.1-r1.ebuild:
Add inherit eutils
*minicom-2.1-r1 (24 Mar 2004)
24 Mar 2004; <solar@gentoo.org> minicom-1.83.1-r1.ebuild,
minicom-2.00.0.ebuild, minicom-2.1-r1.ebuild, minicom-2.1.ebuild,
files/minicom-2.1-memcpy-bounds.diff:
propolice/ssp caught minicom going out of bounds using memcpy() in the
winschar2() function, so we add some basic sanity checking to the function.
18 Dec 2003; Jason Wever <weeve@gentoo.org> minicom-2.00.0.ebuild:
Marked stable on sparc.
19 Nov 2003; Heinrich Wendel <lanius@gentoo.org> metadata.xml:
metadata.xml
*minicom-2.1 (24 Aug 2003)
30 Sep 2003; Joshua Kinard <kumba@gentoo.org> minicom-2.1.ebuild:
Added ~mips to KEYWORDS
24 Aug 2003; Martin Holzer <mholzer@gentoo.org> minicom-2.1.ebuild:
Version bumped.
21 Jul 2003; Daniel Ahlberg <aliz@gentoo.org> minicom-2.00.0.ebuild :
Fixed typo.
09 Jul 2003; Jason Wever <weeve@gentoo.org> minicom-2.00.0.ebuild:
Added ~sparc to keywords.
*minicom-1.83.1-r1 (24 Apr 2003)
24 Apr 2003; Graham Forest <vladimir@gentoo.org> minicom-1.83.1-r1.eb$
minicom-2.00.0.ebuild:
Added einfo for bug 9526
19 Mar 2003; Guy Martin <gmsoft@gentoo.org> minicom-1.83.1-r1.ebuild :
Added hppa to keywords.
05 Feb 2003; Mark Guetin <gerk@gentoo.org> minicom-2.00.0.ebuild :
Added ppc to keywords, runs great
03 Feb 2003; Aron Griffis <agriffis@gentoo.org> minicom-2.00.0.ebuild :
Add alpha to KEYWORDS
*minicom-2.00.0 (02 Sep 2002)
06 Jul 2003; Guy Martin <gmsoft@gentoo.org> minicom-2.00.0.ebuild :
Added hppa to KEYWORDS.
02 Sep 2002; Brandon Low <lostlogic@gentoo.org> minicom-2.00.0.ebuild :
Use einstall not emakse install to fix sandbox violations.
02 Sep 2002; phoen][x <phoenix@gentoo.org> minicom-2.00.0.ebuild :
Bumped to new version. This closes bug #7337.
*minicom-1.83.1-r1 (1 Feb 2002)
1 Feb 2002; G.Bevin <gbevin@gentoo.org> ChangeLog :
Added initial ChangeLog which should be updated whenever the package is
updated in any way. This changelog is targetted to users. This means that the
comments should well explained and written in clean English. The details about
writing correct changelogs are explained in the skel.ChangeLog file which you
can find in the root directory of the portage repository.

View File

@ -1,23 +1,14 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
AUX minicom-2.3-gentoo-runscript.patch 2382 SHA256 9d79ab8eb2942cdbde2b65ab7958b7c485c83428f31e5644f0f2af2c1d6bffb7 SHA512 f88a54d5d64bec288930eb7d34332d3f4cdf879a90a694c4e538cc92ec213f15816ea9fa1225ea1122b3ee00b69b365cd69a17ec09369f4498b437374d425b5f WHIRLPOOL 74c40c8b81c81ec504d3193175b38c0644809a505f201f5d01cd9d74723336e3b4c1cd5cfd11e55fa528439aaef17bdc2c88b797de63c339c1ce8b51a020387f
AUX minicom-2.6-etimeout.patch 266 SHA256 cce9dfa838f7df59e59e64e0494d98ffe7143512ed419f2034f36e73be80d698 SHA512 623310112fe8c9ca50e2f5bc3c67675d501a96706ff80cb30b0e4da0074c6662f9268bd9aad792e7495f156690755ce7c1625c19efa69ff577a34967646cbb4c WHIRLPOOL 6333f7ae0d68824ae16126705800cc90837a1be4090f423f2bce60e24c2904829044a413fa3a018bc4202ce0ae9bf978877e3c763be670364e878cc249e2db80
AUX minicom-2.7-lockdir.patch 535 SHA256 bfabbe8c36248b57a7ac0ab453e0597f37889791b848610dce15ba4727ba39ba SHA512 7e555046cd58a796f01473e064cbf289bfd467b0ceefbdc49734d5a9ee3c8f41480378cd456e0b30e94bb892b3329959c4c38ecc942e35d3890bc6da515e1f59 WHIRLPOOL 1fe4316e70b4cb2ed26072769f64228f81e80fe9010e11bbdd8be7b499a056d0af7d0c925c3e82da80ac52b3b64e10fa597a607b7871ff84fe9e5dc6ee17a6f3
AUX minirc.dfl 66 SHA256 d7a08c0a5befc155170b8e6009b028c0361e72da6c2c3f55e1858711eaaca5a0 SHA512 dc6f65392ec4ee9e0f499596b6220cb23e443530a3802edc8805412a7999ffb48cb2f9f5c9f7a7ebfbbe166fdbf128847f00141c4f67c0176bb245081814955c WHIRLPOOL 7c245ce32e0e37147974b392ce01a3deb8fc81e692fabc9eada329f00523a6989dffc652b95e2ce6a091b6f199964a038618afced647d2cc85f9556a850490f9
DIST minicom-2.6.tar.gz 830255 SHA256 ea5fe79c22dcb115cf5ed287b0e7a69e069bedd39889aa89b1a23f64f53fceb3 SHA512 96345e0c7b5991d3320fb4478b26717efdcdde307cd1cd065be424456bd90e528405c889a8aebaf6a67f3c614e4858825ec7f32769f2069f1b2e3ec5a2556023 WHIRLPOOL 7bfcb9a9609dc85585c808c8027f14406c1ff72771262d3c5beee9209078db9a58396d272333eb1ec6f97c0013b6a3792e0a1444cb737db4c202ccc90b8b1483
DIST minicom-2.7.1.tar.gz 863544 SHA256 9ac3a663b82f4f5df64114b4792b9926b536c85f59de0f2d2b321c7626a904f4 SHA512 eb9679ac3a3d3585ea06c54407567898e50b981378656e7f8a241071c91054ff0928cc9023d2c79d1936588cdffa9426f4962b556e8daa1783add0c5ac59b5af WHIRLPOOL f93642d6cc3c8dee987d461a67e4a98b55d0ebea1a0c1b2dc8564a9af66dbf9aaad3e4cb2e161d127b965d955637882eda601034b863b32ee776925db969418e
DIST minicom-2.7.tar.gz 863544 SHA256 9ac3a663b82f4f5df64114b4792b9926b536c85f59de0f2d2b321c7626a904f4 SHA512 eb9679ac3a3d3585ea06c54407567898e50b981378656e7f8a241071c91054ff0928cc9023d2c79d1936588cdffa9426f4962b556e8daa1783add0c5ac59b5af WHIRLPOOL f93642d6cc3c8dee987d461a67e4a98b55d0ebea1a0c1b2dc8564a9af66dbf9aaad3e4cb2e161d127b965d955637882eda601034b863b32ee776925db969418e
EBUILD minicom-2.6.ebuild 1421 SHA256 e0a6cb6d9aa3de6d3a903154e496ac533a5def19baab408e1d77ddd00f0bf631 SHA512 140d68425ab3296376c371e9015311fca6dfda552a4ac88ed881bd7f469769899d920b7f52c119dd41929535fe483aef13ddf29df0afefc9449c4dd022a6740d WHIRLPOOL b321e26d4413297fa9b1909c7977626644f278d2857be80f17990336c949c459986d1146b409f6d3687cdaae1da6c68f342e6326804b5224d9f0fdcadd2fa89b
EBUILD minicom-2.7.ebuild 1392 SHA256 31a691d5d7b271ebc23175f0eec037c10f4570e479a4a027bad6475d4fc7b001 SHA512 c52c990d34659221522f1ea36f9d4e1aa17b8730f80503f59fb02cf79704596319012531fe98c5f7228aa9319a2162e0a8503a42a640ebc78a73434269b862e5 WHIRLPOOL 5c34888db674efe02a2c42191349a70aaa2caecaf01004d1e73350071dd371a85e6cf0081d7a2d872849bc47838f3d98b8b63c6e370d2f5d1aef12e2a45c5f66
MISC ChangeLog 13282 SHA256 6ab75410072149bf7acf3b1eadc1776505be34fe46f2cb014d0f543b7a572c1f SHA512 d0bcb42be3439cba34194e75146cf0cb83039fd57ac4dfd262ee4201ee40e810aedbc8eeca1cf2ecf07cc9481a5f703a3b407cf7938cde0e5f7eed74d0e854fc WHIRLPOOL 7c00c6208af8e3a38c7e61d55f54046ddd9e318d8075a50ad13ab9359efa87b717a4cda516ac4730f3024053d4a6577e369c9f32683f97196c3876677fda6ed3
MISC metadata.xml 368 SHA256 1c7f407d62ea9d46dc95154aa4776af937da63c6f4de0ab4731dadefd0129792 SHA512 ca31f2130230d06f0233d7ee2d775cca80074858550772fe050bd9d3a45d1e3531a77cece4877644b332c6264e4c2a5b314b5940ce15115104b1fa6208aca4c9 WHIRLPOOL d851332243adcdb7a8f14fbdb8fe14944e6b465bbd01998a674efe20c2f4fc695d42d65cd0544e9f6d606d23de9f5e6627e6a012ff5631c937286f81cbfc902f
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQEcBAEBCAAGBQJVEDcqAAoJEEqz6FtPBkyjMR0H/AtFv71Jj7yaXO51Ov1JDu09
6zIWBwjXB3ad9bISCCRYIC7ReqDrDlXAHa9PDL/vTHxurDHyUVjKZjxU9XFiW8FS
lxAc84SUc+m6C20IFlZqGoiOGDDovn0V32osbMXXAt4Ca8INIjO5B15WSxwUJXm+
JyKgjE2oE2ekQV4P7/9jT/rjtpHsy8Dhr+ACjWOkWsY7g5kIdMR6RKp5YMKukT1+
o1llVRO2ZAfFvSivlddgayshjRCVpRJNYGsCYeyIkep+0Smx3hlFQPnvff2NVCuK
aD7e8fUA3J6F2ICnGCRUtr5nz734PIPRe3ikaIUhQXEP9ORFCJNjhXFC6EqIJ/U=
=sA3D
-----END PGP SIGNATURE-----
EBUILD minicom-2.6.ebuild 1297 SHA256 42e94f0256f5fd0c14261fe94837e6df86d9981296641ef01f4067c52d79aebb SHA512 414e4a77e21a7a2158047e9f645f3304c78e40eccb28e7d3071227814cbdd740089f928f38fbe867c943f173b86f78a9c0afa6d9aa8604d69effa57ed8c78388 WHIRLPOOL 359e1fe14b87a5ebb76f35590fd9587dd638e8f780e5160640cbeaed2a49bff066d4172f1b422de9515b2849036b9c93a57dd948d3cdc029415d6a7cc5f82712
EBUILD minicom-2.7-r1.ebuild 1515 SHA256 ed53a8057ff1d0003e6651959c7c00713d91dbab0b32e0c32fb5b2420383655c SHA512 277c4fc3446b1ec23853ab521ee6c5a90f2b8f8d18875ccc9d5a704c6c51504f65542c3cfb5b882b7f54f77435f84f6655123dde5c9f4b971da6b424db525fbc WHIRLPOOL 7d3bf88a0fe302c4c45f9c2cd0a45da0b93a2c94784b286736082e08f982a4a37558ded750abab285659b741cce9fe11ffc21712f47b8043b25563e874329581
EBUILD minicom-2.7.1.ebuild 1549 SHA256 f98acfc71ba9aebc5443f534d1a0c6c1b30084e1e4bfa7aed8bc8517fe37966c SHA512 e48de13f90d97ae188307573e49b96db8c5865751ce73b76d95a7adc301c2b81a1eb1f00c4b8774c2669a51101f3104a3a2273df1c118e5b458f895989bc1373 WHIRLPOOL ef50d9106fc72943a31654aa9661dba6383151e7aece6d2e26496424cb1b1fdb0ef2023769fbf65a2a707f2e7f5271a079a3ca804302c39ea562798a78dac7f7
EBUILD minicom-2.7.ebuild 1269 SHA256 1eea7fdf8aa21e4410b22dfd80ca6c14698240e81d67d13041f67630305d57ca SHA512 9bcfbecd8f3a639ae8d98d104a08d95af9f9735d75dcd026c7965e86dc9648a1c06a9b152c182f466ac72db594a4c07ec7565cc65c95d0d5721a6c60c498a7b8 WHIRLPOOL 19a585000c1b9c5c458d47c4757df7fc0d1d9a40928f4028db9959167ddf3f2536c1ea649ed85a400c5336fe97ba61a8c4c583894eeb12c705cbec9557fd302c
MISC ChangeLog 3104 SHA256 b48e3e7269765489b1d0eceaec11062fa87a474bb7c692d91254604ff6c12280 SHA512 cad2f9a88ab489f90f9ecb3f8e638eacbd96a7ade1db9fb84aaf3f9d2390afb491ce8c611c25d51c18432c8446496894f16b44c44326f04b7530dda8faafd9e0 WHIRLPOOL 11d9797df2dbdbaac2da09e32052b75a29dc24cd36996ef42398a38641927ec186422525d9d63edc3d9222d53786b041153ac7eca3c77eaa61bf10532e8ced36
MISC ChangeLog-2015 13282 SHA256 6ab75410072149bf7acf3b1eadc1776505be34fe46f2cb014d0f543b7a572c1f SHA512 d0bcb42be3439cba34194e75146cf0cb83039fd57ac4dfd262ee4201ee40e810aedbc8eeca1cf2ecf07cc9481a5f703a3b407cf7938cde0e5f7eed74d0e854fc WHIRLPOOL 7c00c6208af8e3a38c7e61d55f54046ddd9e318d8075a50ad13ab9359efa87b717a4cda516ac4730f3024053d4a6577e369c9f32683f97196c3876677fda6ed3
MISC metadata.xml 456 SHA256 6e64d84b244d1d177d3c88778c94b0a4b6af1f5c3124d720a6a403b7c4d0d6eb SHA512 9d7b2e8de12baea7bbc03a2031caf9e791b1168eb70a8100edbedea42344a26421e7f8e11b114ff86677799583d471220da2973c1395a0fe13d9f33b3a22c336 WHIRLPOOL 359c9ed736edd57e648262f37fbf138bf7f62ed826b323dfa236a77b8214ff48821504742902329568880f5366d8a39141792f49ddc6f5375183ded85386597f

View File

@ -0,0 +1,14 @@
--- minicom-2.7.orig/configure.in 2013-12-31 07:14:09.000000000 -0800
+++ minicom-2.7/configure.in 2017-03-05 11:25:01.379020326 -0800
@@ -217,7 +217,10 @@
if test "x$UUCPLOCK" != x
then
- if test -d $UUCPLOCK
+ dnl If a lock directory was manually specified, do not test it actually
+ dnl exists, as that might not be true during a chroot build, and the
+ dnl packager is responsible for making sure it exists at runtime.
+ if true
then
AC_MSG_RESULT($UUCPLOCK)
AC_DEFINE_UNQUOTED(UUCPLOCK, "$UUCPLOCK", [Lock directory])

View File

@ -1,7 +1,10 @@
<?xml version = '1.0' encoding = 'UTF-8'?>
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<herd>net-dialup</herd>
<maintainer type="project">
<email>embedded@gentoo.org</email>
<name>Embedded Gentoo</name>
</maintainer>
<longdescription lang="en">
Minicom is a menu driven communications program. It emulates ANSI and VT102
terminals. It has a dialing directory and auto zmodem download.

View File

@ -1,6 +1,5 @@
# Copyright 1999-2014 Gentoo Foundation
# Copyright 1999-2017 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/net-dialup/minicom/minicom-2.6.ebuild,v 1.10 2014/08/03 06:14:05 tgall Exp $
EAPI="4"
@ -14,7 +13,7 @@ SRC_URI="http://alioth.debian.org/download.php/${STUPID_NUM}/${P}.tar.gz"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm arm64 hppa ia64 ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~ia64-linux ~x86-linux"
KEYWORDS="alpha amd64 arm arm64 hppa ia64 ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~x86-linux"
IUSE="nls"
COMMON_DEPEND="sys-libs/ncurses"

View File

@ -0,0 +1,59 @@
# Copyright 1999-2017 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
EAPI=6
inherit eutils autotools
STUPID_NUM="3977"
DESCRIPTION="Serial Communication Program"
HOMEPAGE="http://alioth.debian.org/projects/minicom"
SRC_URI="https://alioth.debian.org/frs/download.php/file/${STUPID_NUM}/${P}.tar.gz"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~x86-linux"
IUSE="nls"
COMMON_DEPEND="sys-libs/ncurses:="
DEPEND="${COMMON_DEPEND}
nls? ( sys-devel/gettext )"
RDEPEND="${COMMON_DEPEND}
net-dialup/lrzsz"
DOCS="AUTHORS ChangeLog NEWS README doc/minicom.FAQ"
# Supported languages and translated documentation
# Be sure all languages are prefixed with a single space!
MY_AVAILABLE_LINGUAS=" cs da de es fi fr hu id ja nb pl pt_BR ro ru rw sv vi zh_TW"
IUSE="${IUSE} ${MY_AVAILABLE_LINGUAS// / linguas_}"
PATCHES=(
"${FILESDIR}"/${PN}-2.3-gentoo-runscript.patch
"${FILESDIR}"/${PN}-2.7-lockdir.patch
)
src_prepare() {
default
mv "${S}"/configure.{in,ac}
eautoreconf
}
src_configure() {
# Lockdir must exist if not manually specified.
# /var/lock is created by openrc.
LOCKDIR=/var/lock
econf \
--sysconfdir="${EPREFIX}"/etc/${PN} \
--enable-lock-dir="${LOCKDIR}" \
$(use_enable nls)
}
src_install() {
default
insinto /etc/minicom
doins "${FILESDIR}"/minirc.dfl
}
pkg_preinst() {
[[ -s ${EROOT}/etc/minicom/minirc.dfl ]] && rm -f "${ED}"/etc/minicom/minirc.dfl
}

View File

@ -0,0 +1,60 @@
# Copyright 1999-2017 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
EAPI=6
inherit eutils autotools
STUPID_NUM="3977"
DESCRIPTION="Serial Communication Program"
HOMEPAGE="http://alioth.debian.org/projects/minicom"
SRC_URI="https://alioth.debian.org/frs/download.php/file/${STUPID_NUM}/${P}.tar.gz"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm ~arm64 hppa ~ia64 ~mips ppc ppc64 ~s390 ~sh sparc x86 ~x86-fbsd ~amd64-linux ~x86-linux"
IUSE="nls"
COMMON_DEPEND="sys-libs/ncurses:="
DEPEND="${COMMON_DEPEND}
nls? ( sys-devel/gettext )"
RDEPEND="${COMMON_DEPEND}
net-dialup/lrzsz"
DOCS="AUTHORS ChangeLog NEWS README doc/minicom.FAQ"
S="${WORKDIR}/${PN}-2.7" # 2.7.1 specific
# Supported languages and translated documentation
# Be sure all languages are prefixed with a single space!
MY_AVAILABLE_LINGUAS=" cs da de es fi fr hu id ja nb pl pt_BR ro ru rw sv vi zh_TW"
IUSE="${IUSE} ${MY_AVAILABLE_LINGUAS// / linguas_}"
PATCHES=(
"${FILESDIR}"/${PN}-2.3-gentoo-runscript.patch
"${FILESDIR}"/${PN}-2.7-lockdir.patch
)
src_prepare() {
default
mv "${S}"/configure.{in,ac}
eautoreconf
}
src_configure() {
# Lockdir must exist if not manually specified.
# /var/lock is created by openrc.
LOCKDIR=/var/lock
econf \
--sysconfdir="${EPREFIX}"/etc/${PN} \
--enable-lock-dir="${LOCKDIR}" \
$(use_enable nls)
}
src_install() {
default
insinto /etc/minicom
doins "${FILESDIR}"/minirc.dfl
}
pkg_preinst() {
[[ -s ${EROOT}/etc/minicom/minirc.dfl ]] && rm -f "${ED}"/etc/minicom/minirc.dfl
}

View File

@ -1,6 +1,5 @@
# Copyright 1999-2014 Gentoo Foundation
# Copyright 1999-2017 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/net-dialup/minicom/minicom-2.7.ebuild,v 1.3 2014/08/03 06:14:05 tgall Exp $
EAPI=5
inherit eutils
@ -12,7 +11,7 @@ SRC_URI="https://alioth.debian.org/frs/download.php/file/${STUPID_NUM}/${P}.tar.
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~ia64-linux ~x86-linux"
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~x86-linux"
IUSE="nls"
COMMON_DEPEND="sys-libs/ncurses"