mirror of
https://github.com/flatcar/scripts.git
synced 2025-08-20 05:51:18 +02:00
commit
38abe6bf30
@ -1,7 +1,8 @@
|
||||
DIST pcre-8.39.tar.bz2 1560758 SHA256 b858099f82483031ee02092711689e7245586ada49e534a06e678b8ea9549e8b SHA512 8b0f14ae5947c4b2d74876a795b04e532fd71c2479a64dbe0ed817e7c7894ea3cae533413de8c17322d305cb7f4e275d72b43e4e828eaca77dc4bcaf04529cf6 WHIRLPOOL 00e8e7fb3dc60cbbd2ee185e269696058b568a0f269749386bad44cb474f723c9ed3dfd2af91ddce0b5047aab459864f07e05940af17d3d51d2f1b068415b1ed
|
||||
AUX libpcre-8.40-jit-else.patch 2149 SHA256 a6fb7e204a0a33c12c89983f57f8548998b52137f7964a809c5b6031e37d6829 SHA512 d1d8e7c689402bad4ac26785e1a642978a6e76f83f69d4df251fb7b88108106292f73a43c6f476c226a45ccfab008283f269128e3631930b0f5490b2f46e3b48 WHIRLPOOL 35a3593928463bc3fb8c3c51cb110547fbd55be894d968b0569afcac17a5f268d2347be187d267c58f302f60aa7a00df80d72524a99cb8c6b4491b0a7725e9c2
|
||||
AUX libpcre-8.40-pcregrep-multiline-1.patch 2688 SHA256 6bc091de8df6715c9cdea6b65d3050112b032915e24e12d5d440434b11d4032a SHA512 c7095a8034db6896c1457e7950a15c00ffd7c08dc29f07ca83e46db63209d42c87e808f328bd2eaaaed0fe4038575629b8e64fa77b4c249ca938fc83415bbe28 WHIRLPOOL 87ae705b53a3227f297cec1036301be32687c02c8b44131b62994663fb2cf2cc0c92c1968627f1238f1985a92a660ccebacc0eda4e05ac315a4672c5b89ab3fa
|
||||
AUX libpcre-8.40-pcregrep-multiline-2.patch 803 SHA256 01d27d72071e1fc5e90db5da2795b61b19e519097200b891979b02a63222b5ed SHA512 aae538dcf871618d00e9994ab1fd973f491075fc852c45aedd6e99ffd6726aabc9f93fff3e5aebbc1869fd2dd85d6d24f0eded075df857991b0457ca797a25fd WHIRLPOOL 7dc104231878dad7a51a2d0fd95711002780a6c6190af15facda78595ac93befeb0f63c02315a1c528dd2aac7ef17727a5fed0af0fe996f6a0158ea380ffd0e4
|
||||
DIST pcre-8.40.tar.bz2 1560119 SHA256 00e27a29ead4267e3de8111fcaa59b132d0533cdfdbdddf4b0604279acbcf4f4 SHA512 b4c27eafbdf33bd7a1384655b1936f4be3bc6745c072347eb26e988896c52664bd85ac42444da1be78b6e20f45b6c7e5921f5f20f5b0741b5bd3d9844e5bd4e2 WHIRLPOOL 6711688972b3db4b98902d548b84e8b03b61c3a12d24a4e42fc49ddc5e2b4be51f98f91873166e550866e88b6cd55092ea27704a3b7e71d58a2af21148ad3340
|
||||
EBUILD libpcre-8.39.ebuild 2804 SHA256 8397835b0303e77a5962d4a784d0d7ad79b7d17f77efff3c70988d18d3c9c8e4 SHA512 6aa289609ca02802f1d6ab8fa4d3344e352789775fa30d3c50b53a4e1145e1d033230d2daad195873d4d2b1d2bcefce6f569f71fc4baf90adc7f2802e67861f9 WHIRLPOOL 12941ae26442a87c52c01816626b01cfb7a80519a9e9263117ae209e8a47afc05d02cb4575ca91a298a2765c4133b50650cd1b1b97bcdfa082d6d84d1d7a9a7f
|
||||
EBUILD libpcre-8.40.ebuild 2817 SHA256 6f1946adb6214b71649118fc1f6fb4f3c54f32dfebead324fac63c65da39dbf5 SHA512 8c25d21862600348295300cc421e14087f5fd18758af8d9910112826d0ce07820dff412460b44e5a8c52f51fb911f8bef3bf88f3023b2676a48e10260964bac7 WHIRLPOOL 70f1293c70f7365a42bc54899cdd5cba2d6ced27bab68d211f3945ad35c4fe63ee7921e9256f5c921a7024b60c4df9f6ad0e08a115ef99102d522e23737e3427
|
||||
EBUILD libpcre-8.40-r1.ebuild 2849 SHA256 71b6ae4b11f222072bf9776f4e701cd17e7819b82ce58d62c65a6380fa87f364 SHA512 b6969ee98be6c15c5e698a03c78956159f147a08fa9646711e75122ebae03df3e154d8a394a033a70ac2d5658b02b67626396433993639491b8753cc03fdd02f WHIRLPOOL 99012339d40a2857e83602e58b7b23f89d9385537df57a84b9ff38492ea443d48445d1151c9a442debee19e3fcfda14ae66ac11c50c702640ef18afc05dc8252
|
||||
MISC ChangeLog 9358 SHA256 6d71cdef5ca28f5d0c3af958daa73122d374a64088bf960961f9eec235572595 SHA512 ad1c6ff26e6198bda9f8c5d31d03a5337b0bd7c620f564b31b98117982d12677426ec4d703325028c44ea371dc15c3b2530d0c91ccd9e8b40b5710761a2e7ef0 WHIRLPOOL c8f1726ad29d83ee380eeeaae0a385a7de8db1e99751357bbf59dcf0af751e4f6ddb8f88d836dda0d0d6e132ef4db126fa3e64610491ceadce550b3017b2ee5d
|
||||
MISC ChangeLog-2015 35335 SHA256 dfdfc43bcff86898d74db532baf46e6d88c70a3e62e82ceab69c285934f802b5 SHA512 94411b185f75967d240777124272d04b13f3cb3e43de6f751baa9944e07086f9fa2972e4854514fb39f85d69422a07fd1ee1cc7fc587dacf54b777bdf68439ea WHIRLPOOL ec71b8c06e85b5ec0a4040def4447e6aa2589bbaf9bd4b5d7479a2b968357a2b5c4a30e7c2739bd1b4607e074cdc9d15e0f730ed1a69cb936d514056d53578e0
|
||||
MISC metadata.xml 1112 SHA256 fa2a7f9e7f1ee1c432907cbc5cc0dd23f9636b5f4c51836dbcdbf24f72975c2a SHA512 eb7e2db9932c108442e69bd3ddf04d8d753dede44f7453b1fa33730ec9cda89e618f4444a0adf3f9e7d09baf8c97ff19831906ad7148a26674269f1efd427e6b WHIRLPOOL 7b675f34fbd1f58f42d7ad5c4e39e1d80922474624047165b30d85ecdbbffd1246d68b0dad4d7553c0d2fc900249e3425fc04f9b3821f189b30ebb2d2615dbad
|
||||
|
68
sdk_container/src/third_party/portage-stable/dev-libs/libpcre/files/libpcre-8.40-jit-else.patch
vendored
Normal file
68
sdk_container/src/third_party/portage-stable/dev-libs/libpcre/files/libpcre-8.40-jit-else.patch
vendored
Normal file
@ -0,0 +1,68 @@
|
||||
https://bugs.gentoo.org/609592
|
||||
https://bugs.exim.org/show_bug.cgi?id=2035
|
||||
|
||||
From 7ddfbe9d0b9f43402f8043e940172a318cc407c6 Mon Sep 17 00:00:00 2001
|
||||
From: Zoltan Herczeg <hzmester@freemail.hu>
|
||||
Date: Tue, 14 Feb 2017 08:48:18 +0000
|
||||
Subject: [PATCH] Fix a missing else in the JIT compiler reported by
|
||||
'idaifish'.
|
||||
|
||||
git-svn-id: svn://vcs.exim.org/pcre/code/trunk@1680 2f5784b3-3f2a-0410-8824-cb99058d5e15
|
||||
---
|
||||
ChangeLog | 2 ++
|
||||
pcre_jit_compile.c | 2 +-
|
||||
testdata/testinput12 | 2 ++
|
||||
testdata/testoutput12 | 2 ++
|
||||
4 files changed, 7 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/ChangeLog b/ChangeLog
|
||||
index 373ee8422ef5..d813935539bd 100644
|
||||
--- a/ChangeLog
|
||||
+++ b/ChangeLog
|
||||
@@ -15,6 +15,8 @@ mode with --only-matching matched several lines, it restarted scanning at the
|
||||
next line instead of moving on to the end of the matched string, which can be
|
||||
several lines after the start.
|
||||
|
||||
+3. Fix a missing else in the JIT compiler reported by 'idaifish'.
|
||||
+
|
||||
|
||||
Version 8.40 11-January-2017
|
||||
----------------------------
|
||||
diff --git a/pcre_jit_compile.c b/pcre_jit_compile.c
|
||||
index c301f05d5e3f..6ef8e48ff5e8 100644
|
||||
--- a/pcre_jit_compile.c
|
||||
+++ b/pcre_jit_compile.c
|
||||
@@ -8110,7 +8110,7 @@ if (opcode == OP_COND || opcode == OP_SCOND)
|
||||
|
||||
if (*matchingpath == OP_FAIL)
|
||||
stacksize = 0;
|
||||
- if (*matchingpath == OP_RREF)
|
||||
+ else if (*matchingpath == OP_RREF)
|
||||
{
|
||||
stacksize = GET2(matchingpath, 1);
|
||||
if (common->currententry == NULL)
|
||||
diff --git a/testdata/testinput12 b/testdata/testinput12
|
||||
index 944be6943f5e..89ed4564bcd4 100644
|
||||
--- a/testdata/testinput12
|
||||
+++ b/testdata/testinput12
|
||||
@@ -104,4 +104,6 @@ and a couple of things that are different with JIT. --/
|
||||
/(.|.)*?bx/
|
||||
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaabax
|
||||
|
||||
+/((?(?!))x)(?'name')(?1)/S++
|
||||
+
|
||||
/-- End of testinput12 --/
|
||||
diff --git a/testdata/testoutput12 b/testdata/testoutput12
|
||||
index 87911086f498..7632c4e58013 100644
|
||||
--- a/testdata/testoutput12
|
||||
+++ b/testdata/testoutput12
|
||||
@@ -201,4 +201,6 @@ No match, mark = m (JIT)
|
||||
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaabax
|
||||
Error -8 (match limit exceeded)
|
||||
|
||||
+/((?(?!))x)(?'name')(?1)/S++
|
||||
+
|
||||
/-- End of testinput12 --/
|
||||
--
|
||||
2.12.0
|
||||
|
@ -0,0 +1,69 @@
|
||||
From 5be027b624bc866702808abadfe5f99360414086 Mon Sep 17 00:00:00 2001
|
||||
From: Philip Hazel <ph10@cam.ac.uk>
|
||||
Date: Fri, 10 Feb 2017 17:47:34 +0000
|
||||
Subject: [PATCH] Correct fix for pcre2grep multiline with --only-matching.
|
||||
|
||||
git-svn-id: svn://vcs.exim.org/pcre/code/trunk@1678 2f5784b3-3f2a-0410-8824-cb99058d5e15
|
||||
---
|
||||
ChangeLog | 5 +++++
|
||||
configure.ac | 6 +++---
|
||||
pcregrep.c | 20 +++++++++++++++-----
|
||||
3 files changed, 23 insertions(+), 8 deletions(-)
|
||||
|
||||
diff --git a/ChangeLog b/ChangeLog
|
||||
index ab4e053e601e..373ee8422ef5 100644
|
||||
--- a/ChangeLog
|
||||
+++ b/ChangeLog
|
||||
@@ -10,6 +10,11 @@ Version 8.41
|
||||
1. Fixed typo in CMakeLists.txt (wrong number of arguments for
|
||||
PCRE_STATIC_RUNTIME (affects MSVC only).
|
||||
|
||||
+2. Issue 1 for 8.40 below was not correctly fixed. If pcregrep in multiline
|
||||
+mode with --only-matching matched several lines, it restarted scanning at the
|
||||
+next line instead of moving on to the end of the matched string, which can be
|
||||
+several lines after the start.
|
||||
+
|
||||
|
||||
Version 8.40 11-January-2017
|
||||
----------------------------
|
||||
diff --git a/pcregrep.c b/pcregrep.c
|
||||
index fd2a67622baa..2070c057e4a0 100644
|
||||
--- a/pcregrep.c
|
||||
+++ b/pcregrep.c
|
||||
@@ -1804,11 +1804,6 @@ while (ptr < endptr)
|
||||
if (line_buffered) fflush(stdout);
|
||||
rc = 0; /* Had some success */
|
||||
|
||||
- /* If the current match ended past the end of the line (only possible
|
||||
- in multiline mode), we are done with this line. */
|
||||
-
|
||||
- if ((unsigned int)offsets[1] > linelength) goto END_ONE_MATCH;
|
||||
-
|
||||
startoffset = offsets[1]; /* Restart after the match */
|
||||
if (startoffset <= oldstartoffset)
|
||||
{
|
||||
@@ -1818,6 +1813,21 @@ while (ptr < endptr)
|
||||
if (utf8)
|
||||
while ((matchptr[startoffset] & 0xc0) == 0x80) startoffset++;
|
||||
}
|
||||
+
|
||||
+ /* If the current match ended past the end of the line (only possible
|
||||
+ in multiline mode), we must move on to the line in which it did end
|
||||
+ before searching for more matches. */
|
||||
+
|
||||
+ while (startoffset > (int)linelength)
|
||||
+ {
|
||||
+ matchptr = ptr += linelength + endlinelength;
|
||||
+ filepos += (int)(linelength + endlinelength);
|
||||
+ linenumber++;
|
||||
+ startoffset -= (int)(linelength + endlinelength);
|
||||
+ t = end_of_line(ptr, endptr, &endlinelength);
|
||||
+ linelength = t - ptr - endlinelength;
|
||||
+ }
|
||||
+
|
||||
goto ONLY_MATCHING_RESTART;
|
||||
}
|
||||
}
|
||||
--
|
||||
2.12.0
|
||||
|
@ -0,0 +1,25 @@
|
||||
From 8b0fdf16e57ce9a653a0a03c39f6cc061e8122e8 Mon Sep 17 00:00:00 2001
|
||||
From: Philip Hazel <ph10@cam.ac.uk>
|
||||
Date: Sun, 12 Feb 2017 13:28:11 +0000
|
||||
Subject: [PATCH] Fix bug in most recent fix for multiline pcre2grep.
|
||||
|
||||
git-svn-id: svn://vcs.exim.org/pcre/code/trunk@1679 2f5784b3-3f2a-0410-8824-cb99058d5e15
|
||||
---
|
||||
pcregrep.c | 1 +
|
||||
1 file changed, 1 insertion(+)
|
||||
|
||||
diff --git a/pcregrep.c b/pcregrep.c
|
||||
index 2070c057e4a0..3cd70eeb4261 100644
|
||||
--- a/pcregrep.c
|
||||
+++ b/pcregrep.c
|
||||
@@ -1826,6 +1826,7 @@ while (ptr < endptr)
|
||||
startoffset -= (int)(linelength + endlinelength);
|
||||
t = end_of_line(ptr, endptr, &endlinelength);
|
||||
linelength = t - ptr - endlinelength;
|
||||
+ length = (size_t)(endptr - ptr);
|
||||
}
|
||||
|
||||
goto ONLY_MATCHING_RESTART;
|
||||
--
|
||||
2.12.0
|
||||
|
@ -1,6 +1,5 @@
|
||||
# Copyright 1999-2017 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Id$
|
||||
|
||||
EAPI="5"
|
||||
|
||||
@ -19,7 +18,7 @@ fi
|
||||
|
||||
LICENSE="BSD"
|
||||
SLOT="3"
|
||||
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris"
|
||||
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~x64-cygwin ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris"
|
||||
IUSE="bzip2 +cxx +jit libedit pcre16 pcre32 +readline +recursion-limit static-libs unicode zlib"
|
||||
REQUIRED_USE="readline? ( !libedit )
|
||||
libedit? ( !readline )"
|
||||
@ -42,11 +41,13 @@ MULTILIB_CHOST_TOOLS=(
|
||||
/usr/bin/pcre-config
|
||||
)
|
||||
|
||||
#PATCHES=(
|
||||
#)
|
||||
PATCHES=(
|
||||
"${FILESDIR}"/${P}-pcregrep-multiline-{1,2}.patch
|
||||
"${FILESDIR}"/${P}-jit-else.patch #609592
|
||||
)
|
||||
|
||||
src_prepare() {
|
||||
#epatch "${PATCHES[@]}"
|
||||
epatch "${PATCHES[@]}"
|
||||
sed -i -e "s:-lpcre ::" libpcrecpp.pc.in || die
|
||||
elibtoolize
|
||||
}
|
@ -1,95 +0,0 @@
|
||||
# Copyright 1999-2017 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Id$
|
||||
|
||||
EAPI="5"
|
||||
|
||||
inherit eutils multilib libtool flag-o-matic toolchain-funcs multilib-minimal
|
||||
|
||||
DESCRIPTION="Perl-compatible regular expression library"
|
||||
HOMEPAGE="http://www.pcre.org/"
|
||||
MY_P="pcre-${PV/_rc/-RC}"
|
||||
if [[ ${PV} != *_rc* ]] ; then
|
||||
# Only the final releases are available here.
|
||||
SRC_URI="mirror://sourceforge/pcre/${MY_P}.tar.bz2
|
||||
ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/${MY_P}.tar.bz2"
|
||||
else
|
||||
SRC_URI="ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/Testing/${MY_P}.tar.bz2"
|
||||
fi
|
||||
|
||||
LICENSE="BSD"
|
||||
SLOT="3"
|
||||
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris"
|
||||
IUSE="bzip2 +cxx +jit libedit pcre16 pcre32 +readline +recursion-limit static-libs unicode zlib"
|
||||
REQUIRED_USE="readline? ( !libedit )
|
||||
libedit? ( !readline )"
|
||||
|
||||
RDEPEND="bzip2? ( app-arch/bzip2 )
|
||||
zlib? ( sys-libs/zlib )
|
||||
libedit? ( dev-libs/libedit )
|
||||
readline? ( sys-libs/readline:0= )"
|
||||
DEPEND="${RDEPEND}
|
||||
virtual/pkgconfig"
|
||||
RDEPEND="${RDEPEND}
|
||||
abi_x86_32? (
|
||||
!<=app-emulation/emul-linux-x86-baselibs-20131008-r2
|
||||
!app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)]
|
||||
)"
|
||||
|
||||
S=${WORKDIR}/${MY_P}
|
||||
|
||||
MULTILIB_CHOST_TOOLS=(
|
||||
/usr/bin/pcre-config
|
||||
)
|
||||
|
||||
#PATCHES=(
|
||||
#)
|
||||
|
||||
src_prepare() {
|
||||
#epatch "${PATCHES[@]}"
|
||||
sed -i -e "s:-lpcre ::" libpcrecpp.pc.in || die
|
||||
elibtoolize
|
||||
}
|
||||
|
||||
multilib_src_configure() {
|
||||
ECONF_SOURCE="${S}" econf \
|
||||
--with-match-limit-recursion=$(usex recursion-limit 8192 MATCH_LIMIT) \
|
||||
$(multilib_native_use_enable bzip2 pcregrep-libbz2) \
|
||||
$(use_enable cxx cpp) \
|
||||
$(use_enable jit) $(use_enable jit pcregrep-jit) \
|
||||
$(use_enable pcre16) \
|
||||
$(use_enable pcre32) \
|
||||
$(multilib_native_use_enable libedit pcretest-libedit) \
|
||||
$(multilib_native_use_enable readline pcretest-libreadline) \
|
||||
$(use_enable static-libs static) \
|
||||
$(use_enable unicode utf) $(use_enable unicode unicode-properties) \
|
||||
$(multilib_native_use_enable zlib pcregrep-libz) \
|
||||
--enable-pcre8 \
|
||||
--enable-shared \
|
||||
--htmldir="${EPREFIX}"/usr/share/doc/${PF}/html \
|
||||
--docdir="${EPREFIX}"/usr/share/doc/${PF}
|
||||
}
|
||||
|
||||
multilib_src_compile() {
|
||||
emake V=1 $(multilib_is_native_abi || echo "bin_PROGRAMS=")
|
||||
}
|
||||
|
||||
multilib_src_install() {
|
||||
emake \
|
||||
DESTDIR="${D}" \
|
||||
$(multilib_is_native_abi || echo "bin_PROGRAMS= dist_html_DATA=") \
|
||||
install
|
||||
gen_usr_ldscript -a pcre
|
||||
}
|
||||
|
||||
multilib_src_install_all() {
|
||||
prune_libtool_files
|
||||
}
|
||||
|
||||
pkg_preinst() {
|
||||
preserve_old_lib /$(get_libdir)/libpcre.so.0
|
||||
}
|
||||
|
||||
pkg_postinst() {
|
||||
preserve_old_lib_notify /$(get_libdir)/libpcre.so.0
|
||||
}
|
@ -7,7 +7,7 @@
|
||||
</synopsis>
|
||||
<product type="ebuild">perl</product>
|
||||
<announced>2017-01-29</announced>
|
||||
<revised>2017-01-29: 1</revised>
|
||||
<revised>2017-06-01: 2</revised>
|
||||
<bug>580612</bug>
|
||||
<bug>588592</bug>
|
||||
<bug>589680</bug>
|
||||
@ -44,6 +44,11 @@
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=dev-lang/perl-5.22.3_rc4"
|
||||
</code>
|
||||
|
||||
<p>Warning: When you are upgrading to a new major Perl version, the
|
||||
commands above may not be sufficient. Please visit the Gentoo wiki
|
||||
referenced below to learn how to upgrade to a new major Perl version.
|
||||
</p>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8607">CVE-2015-8607</uri>
|
||||
@ -51,7 +56,10 @@
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1238">CVE-2016-1238</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2381">CVE-2016-2381</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6185">CVE-2016-6185</uri>
|
||||
<uri link="https://wiki.gentoo.org/wiki/Perl#Upgrading_.28major_version.29">
|
||||
Gentoo Wiki: How to upgrade Perl
|
||||
</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-01-21T22:09:19Z">whissi</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-01-29T23:40:34Z">b-man</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-01T01:14:59Z">b-man</metadata>
|
||||
</glsa>
|
||||
|
49
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-01.xml
vendored
Normal file
49
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-01.xml
vendored
Normal file
@ -0,0 +1,49 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-01">
|
||||
<title>MUNGE: Privilege escalation </title>
|
||||
<synopsis>Gentoo's MUNGE ebuilds are vulnerable to privilege escalation due
|
||||
to improper permissions.
|
||||
</synopsis>
|
||||
<product type="ebuild">munge</product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 1</revised>
|
||||
<bug>602596</bug>
|
||||
<access>local</access>
|
||||
<affected>
|
||||
<package name="sys-auth/munge" auto="yes" arch="*">
|
||||
<unaffected range="ge">0.5.10-r2</unaffected>
|
||||
<vulnerable range="lt">0.5.10-r2</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>An authentication service for creating and validating credentials.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>It was discovered that Gentoo’s default MUNGE installation suffered
|
||||
from a privilege escalation vulnerability (munge user to root) due to
|
||||
improper permissions and a runscript which called chown() on a user
|
||||
controlled file.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="high">
|
||||
<p>A local attacker, who either is already MUNGE’s system user or belongs
|
||||
to MUNGE’s group, could potentially escalate privileges.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All MUNGE users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=sys-auth/munge-0.5.10-r2"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-01-08T22:27:29Z">whissi</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T06:21:40Z">whissi</metadata>
|
||||
</glsa>
|
51
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-02.xml
vendored
Normal file
51
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-02.xml
vendored
Normal file
@ -0,0 +1,51 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-02">
|
||||
<title>Shadow: Multiple vulnerabilities </title>
|
||||
<synopsis>Multiple vulnerabilities have been found in Shadow, the worst of
|
||||
which might allow privilege escalation.
|
||||
</synopsis>
|
||||
<product type="ebuild">shadow</product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 1</revised>
|
||||
<bug>610804</bug>
|
||||
<bug>620510</bug>
|
||||
<access>local</access>
|
||||
<affected>
|
||||
<package name="sys-apps/shadow" auto="yes" arch="*">
|
||||
<unaffected range="ge">4.4-r2</unaffected>
|
||||
<vulnerable range="lt">4.4-r2</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Shadow is a set of tools to deal with user accounts.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in Shadow. Please review
|
||||
the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="high">
|
||||
<p>A local attacker could possibly cause a Denial of Service condition,
|
||||
gain privileges via crafted input, or SIGKILL arbitrary processes.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All Shadow users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.4-r2"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6252">CVE-2016-6252</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2616">CVE-2017-2616</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-03-07T23:12:11Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T06:29:12Z">whissi</metadata>
|
||||
</glsa>
|
76
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-03.xml
vendored
Normal file
76
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-03.xml
vendored
Normal file
@ -0,0 +1,76 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-03">
|
||||
<title>QEMU: Multiple vulnerabilities </title>
|
||||
<synopsis>Multiple vulnerabilities have been found in QEMU, the worst of
|
||||
which may allow a remote attacker to cause a Denial of Service or gain
|
||||
elevated privileges from a guest VM.
|
||||
</synopsis>
|
||||
<product type="ebuild">qemu</product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 1</revised>
|
||||
<bug>614744</bug>
|
||||
<bug>615874</bug>
|
||||
<bug>616460</bug>
|
||||
<bug>616462</bug>
|
||||
<bug>616482</bug>
|
||||
<bug>616484</bug>
|
||||
<bug>616636</bug>
|
||||
<bug>616870</bug>
|
||||
<bug>616872</bug>
|
||||
<bug>616874</bug>
|
||||
<bug>618808</bug>
|
||||
<bug>619018</bug>
|
||||
<bug>619020</bug>
|
||||
<bug>620322</bug>
|
||||
<access>local, remote</access>
|
||||
<affected>
|
||||
<package name="app-emulation/qemu" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.9.0-r2</unaffected>
|
||||
<vulnerable range="lt">2.9.0-r2</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>QEMU is a generic and open source machine emulator and virtualizer.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in QEMU. Please review the
|
||||
CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker might cause a Denial of Service or gain escalated
|
||||
privileges from a guest VM.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All QEMU users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=app-emulation/qemu-2.9.0-r2"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9603">CVE-2016-9603</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7377">CVE-2017-7377</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7471">CVE-2017-7471</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7493">CVE-2017-7493</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7718">CVE-2017-7718</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7980">CVE-2017-7980</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8086">CVE-2017-8086</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8112">CVE-2017-8112</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8309">CVE-2017-8309</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8379">CVE-2017-8379</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8380">CVE-2017-8380</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9060">CVE-2017-9060</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9310">CVE-2017-9310</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9330">CVE-2017-9330</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-04-19T06:36:34Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T06:41:28Z">whissi</metadata>
|
||||
</glsa>
|
52
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-04.xml
vendored
Normal file
52
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-04.xml
vendored
Normal file
@ -0,0 +1,52 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-04">
|
||||
<title>Git: Security bypass</title>
|
||||
<synopsis>A vulnerability in Git might allow remote attackers to bypass
|
||||
security restrictions.
|
||||
</synopsis>
|
||||
<product type="ebuild">git</product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 1</revised>
|
||||
<bug>618126</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="dev-vcs/git" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.13.0</unaffected>
|
||||
<vulnerable range="lt">2.13.0</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Git is a free and open source distributed version control system
|
||||
designed to handle everything from small to very large projects with
|
||||
speed and efficiency.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Timo Schmid discovered that the Git restricted shell incorrectly
|
||||
filtered allowed commands.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could possibly bypass security restrictions and access
|
||||
sensitive information.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All Git users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=dev-vcs/git-2.13.0"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8386">CVE-2017-8386</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-05-18T06:04:29Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T08:33:25Z">whissi</metadata>
|
||||
</glsa>
|
58
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-05.xml
vendored
Normal file
58
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-05.xml
vendored
Normal file
@ -0,0 +1,58 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-05">
|
||||
<title>D-Bus: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities in D-Bus might allow an attacker to
|
||||
overwrite files with a fixed filename in arbitrary directories or conduct a
|
||||
symlink attack.
|
||||
</synopsis>
|
||||
<product type="ebuild">dbus</product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 1</revised>
|
||||
<bug>611392</bug>
|
||||
<access>local, remote</access>
|
||||
<affected>
|
||||
<package name="sys-apps/dbus" auto="yes" arch="*">
|
||||
<unaffected range="ge">1.10.18</unaffected>
|
||||
<vulnerable range="lt">1.10.18</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>D-Bus is a message bus system which processes can use to talk to each
|
||||
other.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in D-Bus. Please review
|
||||
the original report referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>An attacker could possibly overwrite arbitrary files named “once”
|
||||
with content not controlled by the attacker.
|
||||
</p>
|
||||
|
||||
<p>A local attacker could perform a symlink attack against D-Bus’ test
|
||||
suite.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All D-Bus users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=sys-apps/dbus-1.10.18"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://www.openwall.com/lists/oss-security/2017/02/16/4">
|
||||
Original report
|
||||
</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-05-21T07:09:05Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T08:33:43Z">whissi</metadata>
|
||||
</glsa>
|
61
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-06.xml
vendored
Normal file
61
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-06.xml
vendored
Normal file
@ -0,0 +1,61 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-06">
|
||||
<title>ImageWorsener: Multiple vulnerabilities </title>
|
||||
<synopsis>Multiple vulnerabilities have been found in ImageWorsener, the
|
||||
worst of which allows remote attackers to cause a Denial of Service
|
||||
condition or have other unspecified impact.
|
||||
</synopsis>
|
||||
<product type="ebuild">ImageWorsener</product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 1</revised>
|
||||
<bug>618014</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="media-gfx/imageworsener" auto="yes" arch="*">
|
||||
<unaffected range="ge">1.3.1</unaffected>
|
||||
<vulnerable range="lt">1.3.1</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>ImageWorsener is a cross-platform command-line utility and library for
|
||||
image scaling and other image processing.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in ImageWorsener. Please
|
||||
review the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could entice a user to process a specially crafted
|
||||
image file using ImageWorsener, possibly resulting in a Denial of Service
|
||||
condition or have other unspecified impacts.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All ImageWorsener users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=media-gfx/imageworsener-1.3.1"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7452">CVE-2017-7452</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7453">CVE-2017-7453</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7454">CVE-2017-7454</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7939">CVE-2017-7939</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7940">CVE-2017-7940</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7962">CVE-2017-7962</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8325">CVE-2017-8325</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8326">CVE-2017-8326</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8327">CVE-2017-8327</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-05-18T06:32:49Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T08:33:56Z">whissi</metadata>
|
||||
</glsa>
|
64
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-07.xml
vendored
Normal file
64
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-07.xml
vendored
Normal file
@ -0,0 +1,64 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-07">
|
||||
<title>Libtirpc and RPCBind: Denial of Service </title>
|
||||
<synopsis>A vulnerability has been found in Libtirpc and RPCBind which may
|
||||
allow a remote attacker to cause a Denial of Service condition.
|
||||
</synopsis>
|
||||
<product type="ebuild">RPCBind,Libtirpc</product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 2</revised>
|
||||
<bug>617472</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="net-nds/rpcbind" auto="yes" arch="*">
|
||||
<unaffected range="ge">0.2.4-r1</unaffected>
|
||||
<vulnerable range="lt">0.2.4-r1</vulnerable>
|
||||
</package>
|
||||
<package name="net-libs/libtirpc" auto="yes" arch="*">
|
||||
<unaffected range="ge">1.0.1-r1</unaffected>
|
||||
<vulnerable range="lt">1.0.1-r1</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>The RPCBind utility is a server that converts RPC program numbers into
|
||||
universal addresses.
|
||||
</p>
|
||||
|
||||
<p>Libtirpc is a port of Suns Transport-Independent RPC library to Linux.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>It was found that due to the way RPCBind uses libtirpc (libntirpc), a
|
||||
memory leak can occur when parsing specially crafted XDR messages.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could send thousands of messages to RPCBind, possibly
|
||||
resulting in a Denial of Service condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All RPCBind users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=net-nds/rpcbind-0.2.4-r1"
|
||||
</code>
|
||||
|
||||
<p>All Libtirpc users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=net-libs/libtirpc-1.0.1-r1"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8779">CVE-2017-8779</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-05-21T07:26:12Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T11:58:19Z">whissi</metadata>
|
||||
</glsa>
|
57
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-08.xml
vendored
Normal file
57
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-08.xml
vendored
Normal file
@ -0,0 +1,57 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-08">
|
||||
<title>MuPDF: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in MuPDF, the worst of
|
||||
which allows remote attackers to cause a Denial of Service condition or
|
||||
have other unspecified impact.
|
||||
</synopsis>
|
||||
<product type="ebuild">mupdf</product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 1</revised>
|
||||
<bug>611444</bug>
|
||||
<bug>614044</bug>
|
||||
<bug>614852</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="app-text/mupdf" auto="yes" arch="*">
|
||||
<unaffected range="ge">1.11-r1</unaffected>
|
||||
<vulnerable range="lt">1.11-r1</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>A lightweight PDF, XPS, and E-book viewer.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in MuPDF. Please review
|
||||
the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could entice a user to process a specially crafted PDF
|
||||
document or image using MuPDF, possibly resulting in a Denial of Service
|
||||
condition or have other unspecified impact.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All MuPDF users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=app-text/mupdf-1.11-r1"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10221">
|
||||
CVE-2016-10221
|
||||
</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5991">CVE-2017-5991</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6060">CVE-2017-6060</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-05-21T07:28:46Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T08:34:32Z">whissi</metadata>
|
||||
</glsa>
|
52
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-09.xml
vendored
Normal file
52
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-09.xml
vendored
Normal file
@ -0,0 +1,52 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-09">
|
||||
<title>FileZilla: Buffer overflow</title>
|
||||
<synopsis>A vulnerability in a bundled copy of PuTTY in FileZilla might allow
|
||||
remote attackers to execute arbitrary code or cause a denial of service.
|
||||
</synopsis>
|
||||
<product type="ebuild">filezilla</product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 1</revised>
|
||||
<bug>610554</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="net-ftp/filezilla" auto="yes" arch="*">
|
||||
<unaffected range="ge">3.25.2</unaffected>
|
||||
<vulnerable range="lt">3.25.2</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>FileZilla is an open source FTP client.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>FileZilla is affected by the same vulnerability as reported in “GLSA
|
||||
201703-03” because the package included a vulnerable copy of PuTTY.
|
||||
Please read the GLSA for PuTTY referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker, utilizing the SSH agent forwarding of an SSH server,
|
||||
could execute arbitrary code with the privileges of the user running
|
||||
FileZilla or cause a Denial of Service condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All FileZilla users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=net-ftp/filezilla-3.25.2"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6542">CVE-2017-6542</uri>
|
||||
<uri link="https://security.gentoo.org/glsa/201703-03">GLSA 201703-03</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-06-04T11:05:52Z">whissi</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T08:34:45Z">whissi</metadata>
|
||||
</glsa>
|
52
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-10.xml
vendored
Normal file
52
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-10.xml
vendored
Normal file
@ -0,0 +1,52 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-10">
|
||||
<title>Pidgin: Arbitrary code execution</title>
|
||||
<synopsis>A vulnerability in Pidgin might allow remote attackers to execute
|
||||
arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">pidgin</product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 1</revised>
|
||||
<bug>612188</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="net-im/pidgin" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.12.0</unaffected>
|
||||
<vulnerable range="lt">2.12.0</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Pidgin is a GTK Instant Messenger client for a variety of instant
|
||||
messaging protocols.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Joseph Bisch discovered that Pidgin incorrectly handled certain xml
|
||||
messages.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could send a specially crafted instant message,
|
||||
possibly resulting in execution of arbitrary code with the privileges of
|
||||
the Pidgin process.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All Pidgin users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=net-im/pidgin-2.12.0"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2640">CVE-2017-2640</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-04-19T06:30:00Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T19:36:09Z">whissi</metadata>
|
||||
</glsa>
|
52
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-11.xml
vendored
Normal file
52
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-11.xml
vendored
Normal file
@ -0,0 +1,52 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-11">
|
||||
<title>PCRE library: Denial of Service</title>
|
||||
<synopsis>A vulnerability in PCRE library allows remote attackers to cause a
|
||||
Denial of Service condition.
|
||||
</synopsis>
|
||||
<product type="ebuild">PCRE</product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 1</revised>
|
||||
<bug>609592</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="dev-libs/libpcre" auto="yes" arch="*">
|
||||
<unaffected range="ge">8.40-r1</unaffected>
|
||||
<vulnerable range="lt">8.40-r1</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>PCRE library is a set of functions that implement regular expression
|
||||
pattern matching using the same syntax and semantics as Perl 5.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>It was found that the compile_bracket_matchingpath function in
|
||||
pcre_jit_compile.c in PCRE library is vulnerable to an out-of-bounds
|
||||
read.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could possibly cause a Denial of Service condition via
|
||||
a special crafted regular expression.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All PCRE library users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=dev-libs/libpcre-8.40-r1"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6004">CVE-2017-6004</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-04-26T00:55:28Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T19:43:31Z">whissi</metadata>
|
||||
</glsa>
|
57
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-12.xml
vendored
Normal file
57
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-12.xml
vendored
Normal file
@ -0,0 +1,57 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-12">
|
||||
<title>Wireshark: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in Wireshark, the worst of
|
||||
which allows remote attackers to cause a Denial of Service condition.
|
||||
</synopsis>
|
||||
<product type="ebuild">wireshark</product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 1</revised>
|
||||
<bug>609646</bug>
|
||||
<bug>615462</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="net-analyzer/wireshark" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.2.6</unaffected>
|
||||
<vulnerable range="lt">2.2.6</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Wireshark is a network protocol analyzer formerly known as ethereal.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in Wireshark. Please
|
||||
review the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could entice a user to process a specially crafted
|
||||
network packet using Wireshark, possibly resulting a Denial of Service
|
||||
condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All Wireshark users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-2.2.6"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6014">CVE-2017-6014</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7700">CVE-2017-7700</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7701">CVE-2017-7701</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7702">CVE-2017-7702</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7703">CVE-2017-7703</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7704">CVE-2017-7704</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7705">CVE-2017-7705</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-03-24T05:23:51Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T19:48:46Z">whissi</metadata>
|
||||
</glsa>
|
50
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-13.xml
vendored
Normal file
50
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-13.xml
vendored
Normal file
@ -0,0 +1,50 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-13">
|
||||
<title>minicom: Remote execution of arbitrary code</title>
|
||||
<synopsis>An out-of-bounds data access in minicom might allow remote
|
||||
attackers to execute arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">minicom</product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 1</revised>
|
||||
<bug>615996</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="net-dialup/minicom" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.7.1</unaffected>
|
||||
<vulnerable range="lt">2.7.1</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Minicom is a text-based serial port communications program.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>In minicom before version 2.7.1, the escparms[] buffer in vt100.c is
|
||||
vulnerable to an overflow.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker, able to connect to a minicom port, could possibly
|
||||
execute arbitrary code with the privileges of the process, or cause a
|
||||
Denial of Service condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All minicom users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=net-dialup/minicom-2.7.1"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7467">CVE-2017-7467</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-04-30T12:15:55Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T20:02:58Z">whissi</metadata>
|
||||
</glsa>
|
61
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-14.xml
vendored
Normal file
61
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-14.xml
vendored
Normal file
@ -0,0 +1,61 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-14">
|
||||
<title>FreeType: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in FreeType, the worst of
|
||||
which allows remote attackers to execute arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">freetype </product>
|
||||
<announced>2017-06-06</announced>
|
||||
<revised>2017-06-06: 1</revised>
|
||||
<bug>612192</bug>
|
||||
<bug>616730</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="media-libs/freetype" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.8</unaffected>
|
||||
<vulnerable range="lt">2.8</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>FreeType is a high-quality and portable font engine.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in FreeType. Please review
|
||||
the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could entice a user to use a specially crafted font
|
||||
file using FreeType, possibly resulting in execution of arbitrary code
|
||||
with the privileges of the process or a Denial of Service condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All FreeType users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=media-libs/freetype-2.8"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10244">
|
||||
CVE-2016-10244
|
||||
</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10328">
|
||||
CVE-2016-10328
|
||||
</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7857">CVE-2017-7857</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7858">CVE-2017-7858</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7864">CVE-2017-7864</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8105">CVE-2017-8105</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8287">CVE-2017-8287</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-04-11T06:23:01Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-06T20:06:36Z">whissi</metadata>
|
||||
</glsa>
|
152
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-15.xml
vendored
Normal file
152
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-15.xml
vendored
Normal file
@ -0,0 +1,152 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-15">
|
||||
<title>WebKitGTK+: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in WebKitGTK+, the worst
|
||||
of which allows remote attackers to execute arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">webkit-gtk</product>
|
||||
<announced>2017-06-07</announced>
|
||||
<revised>2017-06-07: 1</revised>
|
||||
<bug>543650</bug>
|
||||
<bug>573656</bug>
|
||||
<bug>577068</bug>
|
||||
<bug>608958</bug>
|
||||
<bug>614876</bug>
|
||||
<bug>619788</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="net-libs/webkit-gtk" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.16.3</unaffected>
|
||||
<vulnerable range="lt">2.16.3</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>WebKitGTK+ is a full-featured port of the WebKit rendering engine.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in WebKitGTK+. Please
|
||||
review the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attack can use multiple vectors to execute arbitrary code or
|
||||
cause a denial of service condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All WebKitGTK+ users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.16.3:4"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2330">CVE-2015-2330</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7096">CVE-2015-7096</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7098">CVE-2015-7098</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1723">CVE-2016-1723</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1724">CVE-2016-1724</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1725">CVE-2016-1725</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1726">CVE-2016-1726</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1727">CVE-2016-1727</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1728">CVE-2016-1728</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4692">CVE-2016-4692</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4743">CVE-2016-4743</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7586">CVE-2016-7586</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7587">CVE-2016-7587</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7589">CVE-2016-7589</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7592">CVE-2016-7592</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7598">CVE-2016-7598</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7599">CVE-2016-7599</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7610">CVE-2016-7610</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7611">CVE-2016-7611</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7623">CVE-2016-7623</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7632">CVE-2016-7632</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7635">CVE-2016-7635</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7639">CVE-2016-7639</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7640">CVE-2016-7640</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7641">CVE-2016-7641</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7642">CVE-2016-7642</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7645">CVE-2016-7645</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7646">CVE-2016-7646</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7648">CVE-2016-7648</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7649">CVE-2016-7649</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7652">CVE-2016-7652</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7654">CVE-2016-7654</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7656">CVE-2016-7656</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9642">CVE-2016-9642</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9643">CVE-2016-9643</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2350">CVE-2017-2350</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2354">CVE-2017-2354</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2355">CVE-2017-2355</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2356">CVE-2017-2356</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2362">CVE-2017-2362</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2363">CVE-2017-2363</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2364">CVE-2017-2364</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2365">CVE-2017-2365</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2366">CVE-2017-2366</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2367">CVE-2017-2367</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2369">CVE-2017-2369</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2371">CVE-2017-2371</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2373">CVE-2017-2373</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2376">CVE-2017-2376</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2377">CVE-2017-2377</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2386">CVE-2017-2386</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2392">CVE-2017-2392</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2394">CVE-2017-2394</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2395">CVE-2017-2395</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2396">CVE-2017-2396</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2405">CVE-2017-2405</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2415">CVE-2017-2415</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2419">CVE-2017-2419</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2433">CVE-2017-2433</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2442">CVE-2017-2442</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2445">CVE-2017-2445</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2446">CVE-2017-2446</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2447">CVE-2017-2447</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2454">CVE-2017-2454</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2455">CVE-2017-2455</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2457">CVE-2017-2457</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2459">CVE-2017-2459</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2460">CVE-2017-2460</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2464">CVE-2017-2464</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2465">CVE-2017-2465</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2466">CVE-2017-2466</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2468">CVE-2017-2468</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2469">CVE-2017-2469</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2470">CVE-2017-2470</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2471">CVE-2017-2471</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2475">CVE-2017-2475</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2476">CVE-2017-2476</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2481">CVE-2017-2481</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2496">CVE-2017-2496</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2504">CVE-2017-2504</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2505">CVE-2017-2505</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2506">CVE-2017-2506</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2508">CVE-2017-2508</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2510">CVE-2017-2510</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2514">CVE-2017-2514</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2515">CVE-2017-2515</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2521">CVE-2017-2521</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2525">CVE-2017-2525</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2526">CVE-2017-2526</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2528">CVE-2017-2528</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2530">CVE-2017-2530</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2531">CVE-2017-2531</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2536">CVE-2017-2536</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2539">CVE-2017-2539</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2544">CVE-2017-2544</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2547">CVE-2017-2547</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2549">CVE-2017-2549</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6980">CVE-2017-6980</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6984">CVE-2017-6984</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-04-19T06:44:45Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-07T11:52:15Z">whissi</metadata>
|
||||
</glsa>
|
@ -1 +1 @@
|
||||
Wed, 31 May 2017 20:08:57 +0000
|
||||
Fri, 16 Jun 2017 18:39:35 +0000
|
||||
|
@ -1 +1 @@
|
||||
742dfe25646ca49d62bb5f6452a3600f934c798d 1496157625 2017-05-30T15:20:25+00:00
|
||||
c2f911fc13b81dd715a1b756f739b077f8718170 1496836599 2017-06-07T11:56:39+00:00
|
||||
|
@ -1,14 +0,0 @@
|
||||
DEFINED_PHASES=compile configure install postinst preinst prepare test
|
||||
DEPEND=bzip2? ( app-arch/bzip2 ) zlib? ( sys-libs/zlib ) libedit? ( dev-libs/libedit ) readline? ( sys-libs/readline:0= ) virtual/pkgconfig >=app-portage/elt-patches-20170317
|
||||
DESCRIPTION=Perl-compatible regular expression library
|
||||
EAPI=5
|
||||
HOMEPAGE=http://www.pcre.org/
|
||||
IUSE=bzip2 +cxx +jit libedit pcre16 pcre32 +readline +recursion-limit static-libs unicode zlib abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64
|
||||
KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris
|
||||
LICENSE=BSD
|
||||
RDEPEND=bzip2? ( app-arch/bzip2 ) zlib? ( sys-libs/zlib ) libedit? ( dev-libs/libedit ) readline? ( sys-libs/readline:0= ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20131008-r2 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] )
|
||||
REQUIRED_USE=readline? ( !libedit ) libedit? ( !readline )
|
||||
SLOT=3
|
||||
SRC_URI=mirror://sourceforge/pcre/pcre-8.39.tar.bz2 ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-8.39.tar.bz2
|
||||
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 0236be304ee52e7f179ed2f337075515 multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
|
||||
_md5_=8cea658ecb3a8ab68b6c60e71332af64
|
@ -4,11 +4,11 @@ DESCRIPTION=Perl-compatible regular expression library
|
||||
EAPI=5
|
||||
HOMEPAGE=http://www.pcre.org/
|
||||
IUSE=bzip2 +cxx +jit libedit pcre16 pcre32 +readline +recursion-limit static-libs unicode zlib abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64
|
||||
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris
|
||||
KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~x64-cygwin ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris
|
||||
LICENSE=BSD
|
||||
RDEPEND=bzip2? ( app-arch/bzip2 ) zlib? ( sys-libs/zlib ) libedit? ( dev-libs/libedit ) readline? ( sys-libs/readline:0= ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20131008-r2 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] )
|
||||
REQUIRED_USE=readline? ( !libedit ) libedit? ( !readline )
|
||||
SLOT=3
|
||||
SRC_URI=mirror://sourceforge/pcre/pcre-8.40.tar.bz2 ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-8.40.tar.bz2
|
||||
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 0236be304ee52e7f179ed2f337075515 multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
|
||||
_md5_=e24078c3bf31eeccaf5083daab081345
|
||||
_md5_=8fa5a2e376df0b50998868f4899fe96b
|
@ -4,10 +4,10 @@ DESCRIPTION=Serial Communication Program
|
||||
EAPI=4
|
||||
HOMEPAGE=http://alioth.debian.org/projects/minicom
|
||||
IUSE=nls linguas_cs linguas_da linguas_de linguas_es linguas_fi linguas_fr linguas_hu linguas_id linguas_ja linguas_nb linguas_pl linguas_pt_BR linguas_ro linguas_ru linguas_rw linguas_sv linguas_vi linguas_zh_TW
|
||||
KEYWORDS=alpha amd64 arm arm64 hppa ia64 ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~ia64-linux ~x86-linux
|
||||
KEYWORDS=alpha amd64 arm arm64 hppa ia64 ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~x86-linux
|
||||
LICENSE=GPL-2
|
||||
RDEPEND=sys-libs/ncurses net-dialup/lrzsz
|
||||
SLOT=0
|
||||
SRC_URI=http://alioth.debian.org/download.php/3689/minicom-2.6.tar.gz
|
||||
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
|
||||
_md5_=d5883eb3bacfd64b966ce7979e837124
|
||||
_md5_=16f445b91e280f71152813ab9535e2b8
|
||||
|
@ -4,10 +4,10 @@ DESCRIPTION=Serial Communication Program
|
||||
EAPI=5
|
||||
HOMEPAGE=http://alioth.debian.org/projects/minicom
|
||||
IUSE=nls linguas_cs linguas_da linguas_de linguas_es linguas_fi linguas_fr linguas_hu linguas_id linguas_ja linguas_nb linguas_pl linguas_pt_BR linguas_ro linguas_ru linguas_rw linguas_sv linguas_vi linguas_zh_TW
|
||||
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~ia64-linux ~x86-linux
|
||||
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~x86-linux
|
||||
LICENSE=GPL-2
|
||||
RDEPEND=sys-libs/ncurses net-dialup/lrzsz
|
||||
SLOT=0
|
||||
SRC_URI=https://alioth.debian.org/frs/download.php/file/3977/minicom-2.7.tar.gz
|
||||
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
|
||||
_md5_=9413b7d98cbaf517f463609fc8c2943e
|
||||
_md5_=cfd66281a0d56f19fd754ba244dc67fb
|
||||
|
13
sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-dialup/minicom-2.7-r1
vendored
Normal file
13
sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-dialup/minicom-2.7-r1
vendored
Normal file
@ -0,0 +1,13 @@
|
||||
DEFINED_PHASES=configure install preinst prepare
|
||||
DEPEND=sys-libs/ncurses:= nls? ( sys-devel/gettext ) >=app-portage/elt-patches-20170317 !<sys-devel/gettext-0.18.1.1-r3 || ( >=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4
|
||||
DESCRIPTION=Serial Communication Program
|
||||
EAPI=6
|
||||
HOMEPAGE=http://alioth.debian.org/projects/minicom
|
||||
IUSE=nls linguas_cs linguas_da linguas_de linguas_es linguas_fi linguas_fr linguas_hu linguas_id linguas_ja linguas_nb linguas_pl linguas_pt_BR linguas_ro linguas_ru linguas_rw linguas_sv linguas_vi linguas_zh_TW
|
||||
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~x86-linux
|
||||
LICENSE=GPL-2
|
||||
RDEPEND=sys-libs/ncurses:= net-dialup/lrzsz
|
||||
SLOT=0
|
||||
SRC_URI=https://alioth.debian.org/frs/download.php/file/3977/minicom-2.7.tar.gz
|
||||
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
|
||||
_md5_=a3d9bbae9dfc0269dc8d444b933b5a51
|
13
sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-dialup/minicom-2.7.1
vendored
Normal file
13
sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-dialup/minicom-2.7.1
vendored
Normal file
@ -0,0 +1,13 @@
|
||||
DEFINED_PHASES=configure install preinst prepare
|
||||
DEPEND=sys-libs/ncurses:= nls? ( sys-devel/gettext ) >=app-portage/elt-patches-20170317 !<sys-devel/gettext-0.18.1.1-r3 || ( >=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4
|
||||
DESCRIPTION=Serial Communication Program
|
||||
EAPI=6
|
||||
HOMEPAGE=http://alioth.debian.org/projects/minicom
|
||||
IUSE=nls linguas_cs linguas_da linguas_de linguas_es linguas_fi linguas_fr linguas_hu linguas_id linguas_ja linguas_nb linguas_pl linguas_pt_BR linguas_ro linguas_ru linguas_rw linguas_sv linguas_vi linguas_zh_TW
|
||||
KEYWORDS=alpha amd64 arm ~arm64 hppa ~ia64 ~mips ppc ppc64 ~s390 ~sh sparc x86 ~x86-fbsd ~amd64-linux ~x86-linux
|
||||
LICENSE=GPL-2
|
||||
RDEPEND=sys-libs/ncurses:= net-dialup/lrzsz
|
||||
SLOT=0
|
||||
SRC_URI=https://alioth.debian.org/frs/download.php/file/3977/minicom-2.7.1.tar.gz
|
||||
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
|
||||
_md5_=dd0814779c328ca33c21fd55e5142504
|
@ -1,387 +0,0 @@
|
||||
# ChangeLog for net-dialup/minicom
|
||||
# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/net-dialup/minicom/ChangeLog,v 1.106 2015/03/23 15:54:05 radhermit Exp $
|
||||
|
||||
23 Mar 2015; Tim Harder <radhermit@gentoo.org> metadata.xml:
|
||||
Drop myself as maintainer.
|
||||
|
||||
19 Jan 2015; Tim Harder <radhermit@gentoo.org> -minicom-2.5.ebuild,
|
||||
-minicom-2.6.2-r1.ebuild:
|
||||
Remove old.
|
||||
|
||||
03 Aug 2014; <tgall@gentoo.org> minicom-2.6.2-r1.ebuild, minicom-2.6.ebuild,
|
||||
minicom-2.7.ebuild:
|
||||
arm64, initial support
|
||||
|
||||
01 Jan 2014; Tim Harder <radhermit@gentoo.org> minicom-2.7.ebuild:
|
||||
Remove unneeded AR export.
|
||||
|
||||
*minicom-2.7 (01 Jan 2014)
|
||||
|
||||
01 Jan 2014; Tim Harder <radhermit@gentoo.org> +minicom-2.7.ebuild:
|
||||
Version bump.
|
||||
|
||||
*minicom-2.6.2-r1 (30 Oct 2013)
|
||||
|
||||
30 Oct 2013; Sergey Popov <pinkbyte@gentoo.org> -minicom-2.6.2.ebuild,
|
||||
+minicom-2.6.2-r1.ebuild:
|
||||
Revision bump: respect AR, wrt bug #489734, thanks to Mikle Kolyada for
|
||||
discovering this issue. Drop old revision
|
||||
|
||||
*minicom-2.6.2 (06 Apr 2013)
|
||||
|
||||
06 Apr 2013; Tim Harder <radhermit@gentoo.org> +minicom-2.6.2.ebuild:
|
||||
Version bump.
|
||||
|
||||
06 May 2012; Raúl Porcel <armin76@gentoo.org> minicom-2.6.ebuild:
|
||||
alpha/ia64/s390/sh/sparc stable wrt #409607
|
||||
|
||||
05 Apr 2012; Pawel Hajdan jr <phajdan.jr@gentoo.org> minicom-2.6.ebuild:
|
||||
x86 stable wrt bug #409607
|
||||
|
||||
04 Apr 2012; Jeroen Roovers <jer@gentoo.org> minicom-2.6.ebuild:
|
||||
Stable for HPPA (bug #409607).
|
||||
|
||||
31 Mar 2012; Markus Meier <maekke@gentoo.org> minicom-2.6.ebuild:
|
||||
arm stable, bug #409607
|
||||
|
||||
29 Mar 2012; Agostino Sarubbo <ago@gentoo.org> minicom-2.6.ebuild:
|
||||
Stable for amd64, wrt bug #409607
|
||||
|
||||
25 Mar 2012; Brent Baude <ranger@gentoo.org> minicom-2.6.ebuild:
|
||||
Marking minicom-2.6 ppc64 for bug 409607
|
||||
|
||||
25 Mar 2012; Brent Baude <ranger@gentoo.org> minicom-2.6.ebuild:
|
||||
Marking minicom-2.6 ppc for bug 409607
|
||||
|
||||
09 Mar 2012; Naohiro Aota <naota@gentoo.org>
|
||||
+files/minicom-2.6-etimeout.patch, minicom-2.6.ebuild:
|
||||
Add ~x86-fbsd; Add upstream patch to use ETIMEOUT instead of ETIME. Bug
|
||||
#397747
|
||||
|
||||
03 Mar 2012; Tim Harder <radhermit@gentoo.org> -minicom-2.4.ebuild:
|
||||
Remove old.
|
||||
|
||||
03 Mar 2012; Brent Baude <ranger@gentoo.org> minicom-2.5.ebuild:
|
||||
Marking minicom-2.5 ppc64 for bug 389063
|
||||
|
||||
01 Feb 2012; Brent Baude <ranger@gentoo.org> minicom-2.5.ebuild:
|
||||
Marking minicom-2.5 ppc for bug 389063
|
||||
|
||||
*minicom-2.6 (28 Dec 2011)
|
||||
|
||||
28 Dec 2011; Tim Harder <radhermit@gentoo.org> +minicom-2.6.ebuild:
|
||||
Version bump.
|
||||
|
||||
26 Nov 2011; Raúl Porcel <armin76@gentoo.org> minicom-2.5.ebuild:
|
||||
alpha/ia64/s390/sh/sparc stable wrt #389063
|
||||
|
||||
06 Nov 2011; Markus Meier <maekke@gentoo.org> minicom-2.5.ebuild:
|
||||
arm stable, bug #389063
|
||||
|
||||
02 Nov 2011; Pawel Hajdan jr <phajdan.jr@gentoo.org> minicom-2.5.ebuild:
|
||||
x86 stable wrt bug #389063
|
||||
|
||||
02 Nov 2011; Jeroen Roovers <jer@gentoo.org> minicom-2.5.ebuild:
|
||||
Stable for HPPA (bug #389063).
|
||||
|
||||
01 Nov 2011; Tony Vroon <chainsaw@gentoo.org> minicom-2.5.ebuild:
|
||||
Marked stable on AMD64 based on arch testing by Agostino "ago" Sarubbo &
|
||||
Elijah "Armageddon" El Lazkani in bug #389063.
|
||||
|
||||
31 Oct 2011; Tim Harder <radhermit@gentoo.org> minicom-2.5.ebuild:
|
||||
Use default instead of default_src_install.
|
||||
|
||||
*minicom-2.5 (03 Feb 2011)
|
||||
|
||||
03 Feb 2011; Tim Harder <radhermit@gentoo.org> +minicom-2.5.ebuild,
|
||||
metadata.xml:
|
||||
Version bump. Update to EAPI 4 and add myself as maintainer.
|
||||
|
||||
23 May 2010; Raúl Porcel <armin76@gentoo.org> minicom-2.4.ebuild:
|
||||
alpha/arm/ia64/s390/sh/sparc stable wrt #317703
|
||||
|
||||
20 May 2010; Peter Volkov <pva@gentoo.org> minicom-2.4.ebuild:
|
||||
amd64 stable, bug #317703
|
||||
|
||||
19 May 2010; Jeroen Roovers <jer@gentoo.org> minicom-2.4.ebuild:
|
||||
Stable for HPPA (bug #317703).
|
||||
|
||||
13 May 2010; Jeremy Olexa <darkside@gentoo.org> minicom-2.4.ebuild:
|
||||
Add Gentoo Prefix changes. Bump to EAPI3, add keywords. bug 316827
|
||||
|
||||
12 May 2010; Joseph Jezak <josejx@gentoo.org> minicom-2.4.ebuild:
|
||||
Marked ppc/ppc64 stable for bug #317703.
|
||||
|
||||
10 May 2010; Pawel Hajdan jr <phajdan.jr@gentoo.org> minicom-2.4.ebuild:
|
||||
x86 stable wrt bug #317703
|
||||
|
||||
*minicom-2.4 (19 Feb 2010)
|
||||
|
||||
19 Feb 2010; Patrick Lauer <patrick@gentoo.org> +minicom-2.4.ebuild:
|
||||
Bump to 2.4, thanks to Tim Harder. Fixes #304167
|
||||
|
||||
11 Jul 2009; Joseph Jezak <josejx@gentoo.org> minicom-2.3-r2.ebuild:
|
||||
Marked ppc stable for bug #274781.
|
||||
|
||||
04 Jul 2009; Brent Baude <ranger@gentoo.org> minicom-2.3-r2.ebuild:
|
||||
stable ppc64, bug 274781
|
||||
|
||||
28 Jun 2009; Tobias Klausmann <klausman@gentoo.org> minicom-2.3-r2.ebuild:
|
||||
Stable on alpha, bug #274781
|
||||
|
||||
24 Jun 2009; Jeroen Roovers <jer@gentoo.org> minicom-2.3-r2.ebuild:
|
||||
Stable for HPPA (bug #274781).
|
||||
|
||||
*minicom-2.3-r2 (20 Jun 2009)
|
||||
|
||||
20 Jun 2009; Alin Năstac <mrness@gentoo.org>
|
||||
files/minicom-2.3-getline-rename.patch, -minicom-2.3-r1.ebuild,
|
||||
+minicom-2.3-r2.ebuild:
|
||||
Update getline-rename.patch (#270452). Migrate to EAPI 2.
|
||||
|
||||
19 May 2009; Markus Ullmann <jokey@gentoo.org> minicom-2.3-r1.ebuild,
|
||||
+files/minicom-2.3-getline-rename.patch:
|
||||
Add glibc name conflict fix, thanks to Conrad Kostecki in bug #270452
|
||||
|
||||
18 Nov 2008; Alin Năstac <mrness@gentoo.org> minicom-2.2-r1.ebuild,
|
||||
minicom-2.3-r1.ebuild:
|
||||
Fix dependency typo (#246829).
|
||||
|
||||
21 Jun 2008; Robert Buchholz <rbu@gentoo.org> minicom-2.3-r1.ebuild:
|
||||
amd64 stable
|
||||
|
||||
03 Jun 2008; Raúl Porcel <armin76@gentoo.org> minicom-2.3-r1.ebuild:
|
||||
ia64/sparc/x86 stable
|
||||
|
||||
*minicom-2.3-r1 (20 Apr 2008)
|
||||
|
||||
20 Apr 2008; Alin Năstac <mrness@gentoo.org>
|
||||
files/minicom-2.3-gentoo-runscript.patch,
|
||||
-files/minicom-2.3-one-off.patch, -minicom-2.3.ebuild,
|
||||
+minicom-2.3-r1.ebuild:
|
||||
Correct SRC_URI (#218353).
|
||||
|
||||
*minicom-2.3 (14 Apr 2008)
|
||||
|
||||
14 Apr 2008; Alin Năstac <mrness@gentoo.org>
|
||||
+files/minicom-2.3-gentoo-runscript.patch,
|
||||
+files/minicom-2.3-one-off.patch, +minicom-2.3.ebuild:
|
||||
Version bump (#215173).
|
||||
|
||||
27 Dec 2007; Alin Năstac <mrness@gentoo.org> minicom-2.2-r1.ebuild:
|
||||
Added nls support (#203225).
|
||||
|
||||
11 Jul 2007; Alin Năstac <mrness@gentoo.org>
|
||||
-files/minicom-2.1-gcc4.patch, -files/minicom-2.1-gentoo-runscript.patch,
|
||||
-files/minicom-2.1-memcpy-bounds.diff, -minicom-2.1-r2.ebuild,
|
||||
-minicom-2.2.ebuild:
|
||||
Remove obsolete versions.
|
||||
|
||||
10 Jun 2007; Markus Rothe <corsair@gentoo.org> minicom-2.2-r1.ebuild:
|
||||
Stable on ppc64 - now really; bug #180120
|
||||
|
||||
10 Jun 2007; Joshua Kinard <kumba@gentoo.org> minicom-2.2-r1.ebuild:
|
||||
Stable on mips, per #180120.
|
||||
|
||||
08 Jun 2007; Raúl Porcel <armin76@gentoo.org> minicom-2.2-r1.ebuild:
|
||||
alpha stable wrt security #180120
|
||||
|
||||
01 Jun 2007; Raúl Porcel <armin76@gentoo.org> minicom-2.2-r1.ebuild:
|
||||
ia64 stable wrt security #180120
|
||||
|
||||
31 May 2007; Christian Faulhammer <opfer@gentoo.org>
|
||||
minicom-2.2-r1.ebuild:
|
||||
stable x86, security bug 180120
|
||||
|
||||
30 May 2007; Peter Weller <welp@gentoo.org> minicom-2.2-r1.ebuild:
|
||||
Stable on amd64 wrt bug 180120
|
||||
|
||||
29 May 2007; Gustavo Zacarias <gustavoz@gentoo.org> minicom-2.2-r1.ebuild:
|
||||
Stable on sparc wrt #180120
|
||||
|
||||
29 May 2007; Mike Frysinger <vapier@gentoo.org> minicom-2.2-r1.ebuild:
|
||||
Remove bindnow-flags and make sure minirc.dfl check respects ROOT.
|
||||
|
||||
29 May 2007; Brent Baude <ranger@gentoo.org> ChangeLog:
|
||||
Marking minicom-2.1-r2 ppc64 stable for 180120
|
||||
|
||||
29 May 2007; Tobias Scherbaum <dertobi123@gentoo.org>
|
||||
minicom-2.2-r1.ebuild:
|
||||
ppc stable, bug #180120
|
||||
|
||||
29 May 2007; Jeroen Roovers <jer@gentoo.org> minicom-2.2-r1.ebuild:
|
||||
Stable for HPPA (bug #180120).
|
||||
|
||||
*minicom-2.2-r1 (28 May 2007)
|
||||
|
||||
28 May 2007; Alin Năstac <mrness@gentoo.org> +minicom-2.2-r1.ebuild:
|
||||
Remove sgid bit and uucp group from minicom executable (#180120).
|
||||
|
||||
12 May 2007; Joshua Kinard <kumba@gentoo.org> minicom-2.2.ebuild:
|
||||
Stable on mips.
|
||||
|
||||
16 Apr 2007; Markus Rothe <corsair@gentoo.org> minicom-2.2.ebuild:
|
||||
Stable on ppc64
|
||||
|
||||
06 Apr 2007; Tobias Scherbaum <dertobi123@gentoo.org> minicom-2.2.ebuild:
|
||||
ppc stable
|
||||
|
||||
13 Mar 2007; Raúl Porcel <armin76@gentoo.org> minicom-2.2.ebuild:
|
||||
x86 stable
|
||||
|
||||
12 Feb 2007; Gustavo Zacarias <gustavoz@gentoo.org> minicom-2.2.ebuild:
|
||||
Stable on sparc
|
||||
|
||||
10 Feb 2007; Alin Năstac <mrness@gentoo.org> minicom-2.2.ebuild:
|
||||
Stable on amd64.
|
||||
|
||||
18 Nov 2006; Alin Nastac <mrness@gentoo.org> -minicom-2.1-r1.ebuild,
|
||||
minicom-2.1-r2.ebuild:
|
||||
Stable on amd64. Remove obsolete revision.
|
||||
|
||||
04 Nov 2006; Alexander H. Færøy <eroyf@gentoo.org>
|
||||
minicom-2.1-r2.ebuild:
|
||||
Stable on alpha.
|
||||
|
||||
*minicom-2.2 (31 Oct 2006)
|
||||
|
||||
31 Oct 2006; Mike Frysinger <vapier@gentoo.org>
|
||||
+files/minicom-2.2-gentoo-runscript.patch,
|
||||
+files/minicom-2.2-one-off.patch, +minicom-2.2.ebuild:
|
||||
Version bump.
|
||||
|
||||
09 Jul 2006; Joshua Kinard <kumba@gentoo.org> minicom-2.1-r2.ebuild:
|
||||
Marked stable on mips.
|
||||
|
||||
22 Mar 2006; Michael Hanselmann <hansmi@gentoo.org> minicom-2.1-r2.ebuild:
|
||||
Stable on ppc.
|
||||
|
||||
19 Mar 2006; Markus Rothe <corsair@gentoo.org> minicom-2.1-r2.ebuild:
|
||||
Stable on ppc64
|
||||
|
||||
13 Mar 2006; Gustavo Zacarias <gustavoz@gentoo.org> minicom-2.1-r2.ebuild:
|
||||
Stable on hppa
|
||||
|
||||
13 Mar 2006; Gustavo Zacarias <gustavoz@gentoo.org> minicom-2.1-r2.ebuild:
|
||||
Stable on sparc
|
||||
|
||||
12 Mar 2006; Alin Nastac <mrness@gentoo.org> metadata.xml,
|
||||
minicom-2.1-r2.ebuild:
|
||||
Add package description in metadata.xml. Stable on x86.
|
||||
|
||||
25 Dec 2005; Diego Pettenò <flameeyes@gentoo.org> minicom-2.1-r2.ebuild:
|
||||
Use bindnow-flags function instead of -Wl,-z,now.
|
||||
|
||||
*minicom-2.1-r2 (13 Dec 2005)
|
||||
|
||||
13 Dec 2005; Alin Nastac <mrness@gentoo.org>
|
||||
+files/minicom-2.1-gentoo-runscript.patch, +minicom-2.1-r2.ebuild:
|
||||
Install minicom with group uucp and sgid for allowing normal users to lock
|
||||
the serial ports that are entitled to use (#108088). Set default script
|
||||
program by its full path (/usr/bin/runscript) for avoiding usage of
|
||||
baselayout's runscript (#114754).
|
||||
|
||||
04 Oct 2005; Alin Nastac <mrness@gentoo.org> minicom-2.1-r1.ebuild:
|
||||
Remove INSTALL from docs.
|
||||
|
||||
27 Jun 2005; Markus Rothe <corsair@gentoo.org> minicom-2.1-r1.ebuild:
|
||||
Stable on ppc64
|
||||
|
||||
29 May 2005; Alin Nastac <mrness@gentoo.org>
|
||||
+files/minicom-2.1-gcc4.patch, minicom-2.1-r1.ebuild:
|
||||
Apply patch from upstream CVS to allow compiling with gcc-4.0 (#93120).
|
||||
|
||||
21 May 2005; Markus Rothe <corsair@gentoo.org> minicom-2.1-r1.ebuild:
|
||||
Added ~ppc64 to KEYWORDS
|
||||
|
||||
29 Dec 2004; Ciaran McCreesh <ciaranm@gentoo.org> :
|
||||
Change encoding to UTF-8 for GLEP 31 compliance
|
||||
|
||||
21 Nov 2004; Alin Nastac <mrness@gentoo.org> -minicom-1.83.1-r1.ebuild,
|
||||
-minicom-2.00.0.ebuild, -minicom-2.1.ebuild:
|
||||
Removed obsolete ebuilds.
|
||||
|
||||
21 Nov 2004; Karol Wojtaszek <sekretarz@gentoo.org> minicom-2.1-r1.ebuild:
|
||||
Stable on amd64, bug #71817
|
||||
|
||||
20 Nov 2004; Daniel Black <dragonheart@gentoo.org> minicom-2.1-r1.ebuild:
|
||||
ppc stable as per bug #71817
|
||||
|
||||
07 Nov 2004; Alin Nastac <mrness@gentoo.org> minicom-2.1.ebuild, minicom-2.1-r1.ebuild:
|
||||
Added net-misc/lrzsz to RDEPEND, which closes bug #36133
|
||||
|
||||
27 Oct 2004; Jason Wever <weeve@gentoo.org> minicom-2.1-r1.ebuild:
|
||||
Stable on sparc.
|
||||
|
||||
05 Jun 2004; Bryan Østergaard <kloeri@gentoo.org> minicom-2.1-r1.ebuild:
|
||||
Stable on alpha.
|
||||
|
||||
27 Apr 2004; Aron Griffis <agriffis@gentoo.org> minicom-2.1-r1.ebuild:
|
||||
Add inherit eutils
|
||||
|
||||
*minicom-2.1-r1 (24 Mar 2004)
|
||||
|
||||
24 Mar 2004; <solar@gentoo.org> minicom-1.83.1-r1.ebuild,
|
||||
minicom-2.00.0.ebuild, minicom-2.1-r1.ebuild, minicom-2.1.ebuild,
|
||||
files/minicom-2.1-memcpy-bounds.diff:
|
||||
propolice/ssp caught minicom going out of bounds using memcpy() in the
|
||||
winschar2() function, so we add some basic sanity checking to the function.
|
||||
|
||||
18 Dec 2003; Jason Wever <weeve@gentoo.org> minicom-2.00.0.ebuild:
|
||||
Marked stable on sparc.
|
||||
|
||||
19 Nov 2003; Heinrich Wendel <lanius@gentoo.org> metadata.xml:
|
||||
metadata.xml
|
||||
|
||||
*minicom-2.1 (24 Aug 2003)
|
||||
|
||||
30 Sep 2003; Joshua Kinard <kumba@gentoo.org> minicom-2.1.ebuild:
|
||||
Added ~mips to KEYWORDS
|
||||
|
||||
24 Aug 2003; Martin Holzer <mholzer@gentoo.org> minicom-2.1.ebuild:
|
||||
Version bumped.
|
||||
|
||||
21 Jul 2003; Daniel Ahlberg <aliz@gentoo.org> minicom-2.00.0.ebuild :
|
||||
Fixed typo.
|
||||
|
||||
09 Jul 2003; Jason Wever <weeve@gentoo.org> minicom-2.00.0.ebuild:
|
||||
Added ~sparc to keywords.
|
||||
|
||||
*minicom-1.83.1-r1 (24 Apr 2003)
|
||||
|
||||
24 Apr 2003; Graham Forest <vladimir@gentoo.org> minicom-1.83.1-r1.eb$
|
||||
minicom-2.00.0.ebuild:
|
||||
Added einfo for bug 9526
|
||||
|
||||
19 Mar 2003; Guy Martin <gmsoft@gentoo.org> minicom-1.83.1-r1.ebuild :
|
||||
Added hppa to keywords.
|
||||
|
||||
05 Feb 2003; Mark Guetin <gerk@gentoo.org> minicom-2.00.0.ebuild :
|
||||
Added ppc to keywords, runs great
|
||||
|
||||
03 Feb 2003; Aron Griffis <agriffis@gentoo.org> minicom-2.00.0.ebuild :
|
||||
Add alpha to KEYWORDS
|
||||
|
||||
*minicom-2.00.0 (02 Sep 2002)
|
||||
|
||||
06 Jul 2003; Guy Martin <gmsoft@gentoo.org> minicom-2.00.0.ebuild :
|
||||
Added hppa to KEYWORDS.
|
||||
|
||||
02 Sep 2002; Brandon Low <lostlogic@gentoo.org> minicom-2.00.0.ebuild :
|
||||
|
||||
Use einstall not emakse install to fix sandbox violations.
|
||||
|
||||
02 Sep 2002; phoen][x <phoenix@gentoo.org> minicom-2.00.0.ebuild :
|
||||
|
||||
Bumped to new version. This closes bug #7337.
|
||||
|
||||
*minicom-1.83.1-r1 (1 Feb 2002)
|
||||
|
||||
1 Feb 2002; G.Bevin <gbevin@gentoo.org> ChangeLog :
|
||||
|
||||
Added initial ChangeLog which should be updated whenever the package is
|
||||
updated in any way. This changelog is targetted to users. This means that the
|
||||
comments should well explained and written in clean English. The details about
|
||||
writing correct changelogs are explained in the skel.ChangeLog file which you
|
||||
can find in the root directory of the portage repository.
|
@ -1,23 +1,14 @@
|
||||
-----BEGIN PGP SIGNED MESSAGE-----
|
||||
Hash: SHA256
|
||||
|
||||
AUX minicom-2.3-gentoo-runscript.patch 2382 SHA256 9d79ab8eb2942cdbde2b65ab7958b7c485c83428f31e5644f0f2af2c1d6bffb7 SHA512 f88a54d5d64bec288930eb7d34332d3f4cdf879a90a694c4e538cc92ec213f15816ea9fa1225ea1122b3ee00b69b365cd69a17ec09369f4498b437374d425b5f WHIRLPOOL 74c40c8b81c81ec504d3193175b38c0644809a505f201f5d01cd9d74723336e3b4c1cd5cfd11e55fa528439aaef17bdc2c88b797de63c339c1ce8b51a020387f
|
||||
AUX minicom-2.6-etimeout.patch 266 SHA256 cce9dfa838f7df59e59e64e0494d98ffe7143512ed419f2034f36e73be80d698 SHA512 623310112fe8c9ca50e2f5bc3c67675d501a96706ff80cb30b0e4da0074c6662f9268bd9aad792e7495f156690755ce7c1625c19efa69ff577a34967646cbb4c WHIRLPOOL 6333f7ae0d68824ae16126705800cc90837a1be4090f423f2bce60e24c2904829044a413fa3a018bc4202ce0ae9bf978877e3c763be670364e878cc249e2db80
|
||||
AUX minicom-2.7-lockdir.patch 535 SHA256 bfabbe8c36248b57a7ac0ab453e0597f37889791b848610dce15ba4727ba39ba SHA512 7e555046cd58a796f01473e064cbf289bfd467b0ceefbdc49734d5a9ee3c8f41480378cd456e0b30e94bb892b3329959c4c38ecc942e35d3890bc6da515e1f59 WHIRLPOOL 1fe4316e70b4cb2ed26072769f64228f81e80fe9010e11bbdd8be7b499a056d0af7d0c925c3e82da80ac52b3b64e10fa597a607b7871ff84fe9e5dc6ee17a6f3
|
||||
AUX minirc.dfl 66 SHA256 d7a08c0a5befc155170b8e6009b028c0361e72da6c2c3f55e1858711eaaca5a0 SHA512 dc6f65392ec4ee9e0f499596b6220cb23e443530a3802edc8805412a7999ffb48cb2f9f5c9f7a7ebfbbe166fdbf128847f00141c4f67c0176bb245081814955c WHIRLPOOL 7c245ce32e0e37147974b392ce01a3deb8fc81e692fabc9eada329f00523a6989dffc652b95e2ce6a091b6f199964a038618afced647d2cc85f9556a850490f9
|
||||
DIST minicom-2.6.tar.gz 830255 SHA256 ea5fe79c22dcb115cf5ed287b0e7a69e069bedd39889aa89b1a23f64f53fceb3 SHA512 96345e0c7b5991d3320fb4478b26717efdcdde307cd1cd065be424456bd90e528405c889a8aebaf6a67f3c614e4858825ec7f32769f2069f1b2e3ec5a2556023 WHIRLPOOL 7bfcb9a9609dc85585c808c8027f14406c1ff72771262d3c5beee9209078db9a58396d272333eb1ec6f97c0013b6a3792e0a1444cb737db4c202ccc90b8b1483
|
||||
DIST minicom-2.7.1.tar.gz 863544 SHA256 9ac3a663b82f4f5df64114b4792b9926b536c85f59de0f2d2b321c7626a904f4 SHA512 eb9679ac3a3d3585ea06c54407567898e50b981378656e7f8a241071c91054ff0928cc9023d2c79d1936588cdffa9426f4962b556e8daa1783add0c5ac59b5af WHIRLPOOL f93642d6cc3c8dee987d461a67e4a98b55d0ebea1a0c1b2dc8564a9af66dbf9aaad3e4cb2e161d127b965d955637882eda601034b863b32ee776925db969418e
|
||||
DIST minicom-2.7.tar.gz 863544 SHA256 9ac3a663b82f4f5df64114b4792b9926b536c85f59de0f2d2b321c7626a904f4 SHA512 eb9679ac3a3d3585ea06c54407567898e50b981378656e7f8a241071c91054ff0928cc9023d2c79d1936588cdffa9426f4962b556e8daa1783add0c5ac59b5af WHIRLPOOL f93642d6cc3c8dee987d461a67e4a98b55d0ebea1a0c1b2dc8564a9af66dbf9aaad3e4cb2e161d127b965d955637882eda601034b863b32ee776925db969418e
|
||||
EBUILD minicom-2.6.ebuild 1421 SHA256 e0a6cb6d9aa3de6d3a903154e496ac533a5def19baab408e1d77ddd00f0bf631 SHA512 140d68425ab3296376c371e9015311fca6dfda552a4ac88ed881bd7f469769899d920b7f52c119dd41929535fe483aef13ddf29df0afefc9449c4dd022a6740d WHIRLPOOL b321e26d4413297fa9b1909c7977626644f278d2857be80f17990336c949c459986d1146b409f6d3687cdaae1da6c68f342e6326804b5224d9f0fdcadd2fa89b
|
||||
EBUILD minicom-2.7.ebuild 1392 SHA256 31a691d5d7b271ebc23175f0eec037c10f4570e479a4a027bad6475d4fc7b001 SHA512 c52c990d34659221522f1ea36f9d4e1aa17b8730f80503f59fb02cf79704596319012531fe98c5f7228aa9319a2162e0a8503a42a640ebc78a73434269b862e5 WHIRLPOOL 5c34888db674efe02a2c42191349a70aaa2caecaf01004d1e73350071dd371a85e6cf0081d7a2d872849bc47838f3d98b8b63c6e370d2f5d1aef12e2a45c5f66
|
||||
MISC ChangeLog 13282 SHA256 6ab75410072149bf7acf3b1eadc1776505be34fe46f2cb014d0f543b7a572c1f SHA512 d0bcb42be3439cba34194e75146cf0cb83039fd57ac4dfd262ee4201ee40e810aedbc8eeca1cf2ecf07cc9481a5f703a3b407cf7938cde0e5f7eed74d0e854fc WHIRLPOOL 7c00c6208af8e3a38c7e61d55f54046ddd9e318d8075a50ad13ab9359efa87b717a4cda516ac4730f3024053d4a6577e369c9f32683f97196c3876677fda6ed3
|
||||
MISC metadata.xml 368 SHA256 1c7f407d62ea9d46dc95154aa4776af937da63c6f4de0ab4731dadefd0129792 SHA512 ca31f2130230d06f0233d7ee2d775cca80074858550772fe050bd9d3a45d1e3531a77cece4877644b332c6264e4c2a5b314b5940ce15115104b1fa6208aca4c9 WHIRLPOOL d851332243adcdb7a8f14fbdb8fe14944e6b465bbd01998a674efe20c2f4fc695d42d65cd0544e9f6d606d23de9f5e6627e6a012ff5631c937286f81cbfc902f
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
Version: GnuPG v2
|
||||
|
||||
iQEcBAEBCAAGBQJVEDcqAAoJEEqz6FtPBkyjMR0H/AtFv71Jj7yaXO51Ov1JDu09
|
||||
6zIWBwjXB3ad9bISCCRYIC7ReqDrDlXAHa9PDL/vTHxurDHyUVjKZjxU9XFiW8FS
|
||||
lxAc84SUc+m6C20IFlZqGoiOGDDovn0V32osbMXXAt4Ca8INIjO5B15WSxwUJXm+
|
||||
JyKgjE2oE2ekQV4P7/9jT/rjtpHsy8Dhr+ACjWOkWsY7g5kIdMR6RKp5YMKukT1+
|
||||
o1llVRO2ZAfFvSivlddgayshjRCVpRJNYGsCYeyIkep+0Smx3hlFQPnvff2NVCuK
|
||||
aD7e8fUA3J6F2ICnGCRUtr5nz734PIPRe3ikaIUhQXEP9ORFCJNjhXFC6EqIJ/U=
|
||||
=sA3D
|
||||
-----END PGP SIGNATURE-----
|
||||
EBUILD minicom-2.6.ebuild 1297 SHA256 42e94f0256f5fd0c14261fe94837e6df86d9981296641ef01f4067c52d79aebb SHA512 414e4a77e21a7a2158047e9f645f3304c78e40eccb28e7d3071227814cbdd740089f928f38fbe867c943f173b86f78a9c0afa6d9aa8604d69effa57ed8c78388 WHIRLPOOL 359e1fe14b87a5ebb76f35590fd9587dd638e8f780e5160640cbeaed2a49bff066d4172f1b422de9515b2849036b9c93a57dd948d3cdc029415d6a7cc5f82712
|
||||
EBUILD minicom-2.7-r1.ebuild 1515 SHA256 ed53a8057ff1d0003e6651959c7c00713d91dbab0b32e0c32fb5b2420383655c SHA512 277c4fc3446b1ec23853ab521ee6c5a90f2b8f8d18875ccc9d5a704c6c51504f65542c3cfb5b882b7f54f77435f84f6655123dde5c9f4b971da6b424db525fbc WHIRLPOOL 7d3bf88a0fe302c4c45f9c2cd0a45da0b93a2c94784b286736082e08f982a4a37558ded750abab285659b741cce9fe11ffc21712f47b8043b25563e874329581
|
||||
EBUILD minicom-2.7.1.ebuild 1549 SHA256 f98acfc71ba9aebc5443f534d1a0c6c1b30084e1e4bfa7aed8bc8517fe37966c SHA512 e48de13f90d97ae188307573e49b96db8c5865751ce73b76d95a7adc301c2b81a1eb1f00c4b8774c2669a51101f3104a3a2273df1c118e5b458f895989bc1373 WHIRLPOOL ef50d9106fc72943a31654aa9661dba6383151e7aece6d2e26496424cb1b1fdb0ef2023769fbf65a2a707f2e7f5271a079a3ca804302c39ea562798a78dac7f7
|
||||
EBUILD minicom-2.7.ebuild 1269 SHA256 1eea7fdf8aa21e4410b22dfd80ca6c14698240e81d67d13041f67630305d57ca SHA512 9bcfbecd8f3a639ae8d98d104a08d95af9f9735d75dcd026c7965e86dc9648a1c06a9b152c182f466ac72db594a4c07ec7565cc65c95d0d5721a6c60c498a7b8 WHIRLPOOL 19a585000c1b9c5c458d47c4757df7fc0d1d9a40928f4028db9959167ddf3f2536c1ea649ed85a400c5336fe97ba61a8c4c583894eeb12c705cbec9557fd302c
|
||||
MISC ChangeLog 3104 SHA256 b48e3e7269765489b1d0eceaec11062fa87a474bb7c692d91254604ff6c12280 SHA512 cad2f9a88ab489f90f9ecb3f8e638eacbd96a7ade1db9fb84aaf3f9d2390afb491ce8c611c25d51c18432c8446496894f16b44c44326f04b7530dda8faafd9e0 WHIRLPOOL 11d9797df2dbdbaac2da09e32052b75a29dc24cd36996ef42398a38641927ec186422525d9d63edc3d9222d53786b041153ac7eca3c77eaa61bf10532e8ced36
|
||||
MISC ChangeLog-2015 13282 SHA256 6ab75410072149bf7acf3b1eadc1776505be34fe46f2cb014d0f543b7a572c1f SHA512 d0bcb42be3439cba34194e75146cf0cb83039fd57ac4dfd262ee4201ee40e810aedbc8eeca1cf2ecf07cc9481a5f703a3b407cf7938cde0e5f7eed74d0e854fc WHIRLPOOL 7c00c6208af8e3a38c7e61d55f54046ddd9e318d8075a50ad13ab9359efa87b717a4cda516ac4730f3024053d4a6577e369c9f32683f97196c3876677fda6ed3
|
||||
MISC metadata.xml 456 SHA256 6e64d84b244d1d177d3c88778c94b0a4b6af1f5c3124d720a6a403b7c4d0d6eb SHA512 9d7b2e8de12baea7bbc03a2031caf9e791b1168eb70a8100edbedea42344a26421e7f8e11b114ff86677799583d471220da2973c1395a0fe13d9f33b3a22c336 WHIRLPOOL 359c9ed736edd57e648262f37fbf138bf7f62ed826b323dfa236a77b8214ff48821504742902329568880f5366d8a39141792f49ddc6f5375183ded85386597f
|
||||
|
14
sdk_container/src/third_party/portage-stable/net-dialup/minicom/files/minicom-2.7-lockdir.patch
vendored
Normal file
14
sdk_container/src/third_party/portage-stable/net-dialup/minicom/files/minicom-2.7-lockdir.patch
vendored
Normal file
@ -0,0 +1,14 @@
|
||||
--- minicom-2.7.orig/configure.in 2013-12-31 07:14:09.000000000 -0800
|
||||
+++ minicom-2.7/configure.in 2017-03-05 11:25:01.379020326 -0800
|
||||
@@ -217,7 +217,10 @@
|
||||
|
||||
if test "x$UUCPLOCK" != x
|
||||
then
|
||||
- if test -d $UUCPLOCK
|
||||
+ dnl If a lock directory was manually specified, do not test it actually
|
||||
+ dnl exists, as that might not be true during a chroot build, and the
|
||||
+ dnl packager is responsible for making sure it exists at runtime.
|
||||
+ if true
|
||||
then
|
||||
AC_MSG_RESULT($UUCPLOCK)
|
||||
AC_DEFINE_UNQUOTED(UUCPLOCK, "$UUCPLOCK", [Lock directory])
|
@ -1,7 +1,10 @@
|
||||
<?xml version = '1.0' encoding = 'UTF-8'?>
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
|
||||
<pkgmetadata>
|
||||
<herd>net-dialup</herd>
|
||||
<maintainer type="project">
|
||||
<email>embedded@gentoo.org</email>
|
||||
<name>Embedded Gentoo</name>
|
||||
</maintainer>
|
||||
<longdescription lang="en">
|
||||
Minicom is a menu driven communications program. It emulates ANSI and VT102
|
||||
terminals. It has a dialing directory and auto zmodem download.
|
||||
|
@ -1,6 +1,5 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Copyright 1999-2017 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/net-dialup/minicom/minicom-2.6.ebuild,v 1.10 2014/08/03 06:14:05 tgall Exp $
|
||||
|
||||
EAPI="4"
|
||||
|
||||
@ -14,7 +13,7 @@ SRC_URI="http://alioth.debian.org/download.php/${STUPID_NUM}/${P}.tar.gz"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="alpha amd64 arm arm64 hppa ia64 ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~ia64-linux ~x86-linux"
|
||||
KEYWORDS="alpha amd64 arm arm64 hppa ia64 ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~x86-linux"
|
||||
IUSE="nls"
|
||||
|
||||
COMMON_DEPEND="sys-libs/ncurses"
|
||||
|
59
sdk_container/src/third_party/portage-stable/net-dialup/minicom/minicom-2.7-r1.ebuild
vendored
Normal file
59
sdk_container/src/third_party/portage-stable/net-dialup/minicom/minicom-2.7-r1.ebuild
vendored
Normal file
@ -0,0 +1,59 @@
|
||||
# Copyright 1999-2017 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
|
||||
EAPI=6
|
||||
inherit eutils autotools
|
||||
|
||||
STUPID_NUM="3977"
|
||||
DESCRIPTION="Serial Communication Program"
|
||||
HOMEPAGE="http://alioth.debian.org/projects/minicom"
|
||||
SRC_URI="https://alioth.debian.org/frs/download.php/file/${STUPID_NUM}/${P}.tar.gz"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~x86-linux"
|
||||
IUSE="nls"
|
||||
|
||||
COMMON_DEPEND="sys-libs/ncurses:="
|
||||
DEPEND="${COMMON_DEPEND}
|
||||
nls? ( sys-devel/gettext )"
|
||||
RDEPEND="${COMMON_DEPEND}
|
||||
net-dialup/lrzsz"
|
||||
|
||||
DOCS="AUTHORS ChangeLog NEWS README doc/minicom.FAQ"
|
||||
|
||||
# Supported languages and translated documentation
|
||||
# Be sure all languages are prefixed with a single space!
|
||||
MY_AVAILABLE_LINGUAS=" cs da de es fi fr hu id ja nb pl pt_BR ro ru rw sv vi zh_TW"
|
||||
IUSE="${IUSE} ${MY_AVAILABLE_LINGUAS// / linguas_}"
|
||||
|
||||
PATCHES=(
|
||||
"${FILESDIR}"/${PN}-2.3-gentoo-runscript.patch
|
||||
"${FILESDIR}"/${PN}-2.7-lockdir.patch
|
||||
)
|
||||
|
||||
src_prepare() {
|
||||
default
|
||||
mv "${S}"/configure.{in,ac}
|
||||
eautoreconf
|
||||
}
|
||||
|
||||
src_configure() {
|
||||
# Lockdir must exist if not manually specified.
|
||||
# /var/lock is created by openrc.
|
||||
LOCKDIR=/var/lock
|
||||
econf \
|
||||
--sysconfdir="${EPREFIX}"/etc/${PN} \
|
||||
--enable-lock-dir="${LOCKDIR}" \
|
||||
$(use_enable nls)
|
||||
}
|
||||
|
||||
src_install() {
|
||||
default
|
||||
insinto /etc/minicom
|
||||
doins "${FILESDIR}"/minirc.dfl
|
||||
}
|
||||
|
||||
pkg_preinst() {
|
||||
[[ -s ${EROOT}/etc/minicom/minirc.dfl ]] && rm -f "${ED}"/etc/minicom/minirc.dfl
|
||||
}
|
60
sdk_container/src/third_party/portage-stable/net-dialup/minicom/minicom-2.7.1.ebuild
vendored
Normal file
60
sdk_container/src/third_party/portage-stable/net-dialup/minicom/minicom-2.7.1.ebuild
vendored
Normal file
@ -0,0 +1,60 @@
|
||||
# Copyright 1999-2017 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
|
||||
EAPI=6
|
||||
inherit eutils autotools
|
||||
|
||||
STUPID_NUM="3977"
|
||||
DESCRIPTION="Serial Communication Program"
|
||||
HOMEPAGE="http://alioth.debian.org/projects/minicom"
|
||||
SRC_URI="https://alioth.debian.org/frs/download.php/file/${STUPID_NUM}/${P}.tar.gz"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="alpha amd64 arm ~arm64 hppa ~ia64 ~mips ppc ppc64 ~s390 ~sh sparc x86 ~x86-fbsd ~amd64-linux ~x86-linux"
|
||||
IUSE="nls"
|
||||
|
||||
COMMON_DEPEND="sys-libs/ncurses:="
|
||||
DEPEND="${COMMON_DEPEND}
|
||||
nls? ( sys-devel/gettext )"
|
||||
RDEPEND="${COMMON_DEPEND}
|
||||
net-dialup/lrzsz"
|
||||
|
||||
DOCS="AUTHORS ChangeLog NEWS README doc/minicom.FAQ"
|
||||
S="${WORKDIR}/${PN}-2.7" # 2.7.1 specific
|
||||
|
||||
# Supported languages and translated documentation
|
||||
# Be sure all languages are prefixed with a single space!
|
||||
MY_AVAILABLE_LINGUAS=" cs da de es fi fr hu id ja nb pl pt_BR ro ru rw sv vi zh_TW"
|
||||
IUSE="${IUSE} ${MY_AVAILABLE_LINGUAS// / linguas_}"
|
||||
|
||||
PATCHES=(
|
||||
"${FILESDIR}"/${PN}-2.3-gentoo-runscript.patch
|
||||
"${FILESDIR}"/${PN}-2.7-lockdir.patch
|
||||
)
|
||||
|
||||
src_prepare() {
|
||||
default
|
||||
mv "${S}"/configure.{in,ac}
|
||||
eautoreconf
|
||||
}
|
||||
|
||||
src_configure() {
|
||||
# Lockdir must exist if not manually specified.
|
||||
# /var/lock is created by openrc.
|
||||
LOCKDIR=/var/lock
|
||||
econf \
|
||||
--sysconfdir="${EPREFIX}"/etc/${PN} \
|
||||
--enable-lock-dir="${LOCKDIR}" \
|
||||
$(use_enable nls)
|
||||
}
|
||||
|
||||
src_install() {
|
||||
default
|
||||
insinto /etc/minicom
|
||||
doins "${FILESDIR}"/minirc.dfl
|
||||
}
|
||||
|
||||
pkg_preinst() {
|
||||
[[ -s ${EROOT}/etc/minicom/minirc.dfl ]] && rm -f "${ED}"/etc/minicom/minirc.dfl
|
||||
}
|
@ -1,6 +1,5 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Copyright 1999-2017 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/net-dialup/minicom/minicom-2.7.ebuild,v 1.3 2014/08/03 06:14:05 tgall Exp $
|
||||
|
||||
EAPI=5
|
||||
inherit eutils
|
||||
@ -12,7 +11,7 @@ SRC_URI="https://alioth.debian.org/frs/download.php/file/${STUPID_NUM}/${P}.tar.
|
||||
|
||||
LICENSE="GPL-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~ia64-linux ~x86-linux"
|
||||
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~x86-linux"
|
||||
IUSE="nls"
|
||||
|
||||
COMMON_DEPEND="sys-libs/ncurses"
|
||||
|
Loading…
x
Reference in New Issue
Block a user