Merge pull request #725 from dm0-/glsa

Fix GLSAs
This commit is contained in:
David Michael 2019-04-18 13:56:59 -04:00 committed by GitHub
commit 870f7b904a
34 changed files with 715 additions and 730 deletions

View File

@ -1,23 +1,23 @@
-----BEGIN PGP SIGNED MESSAGE----- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512 Hash: SHA512
MANIFEST Manifest.files.gz 441389 BLAKE2B 093e93262bf483b8a2bcc307a67ed12b9a008b091206b3199a591d3750f160ecd8d405fa2d589c50e6bc2325d61eb79b1d8446527955e000c6a79db6428aa4c4 SHA512 94781b7611851868089b1a2920af50bbaa946ae05421f4009d9efb8e3c447cfa812f2ffd4557a4e7723d44d2c3de8d5f75a986179eb0599749c45f97424f8f9a MANIFEST Manifest.files.gz 441860 BLAKE2B 42660ae46077e4a9e7437540059276e5d8c03bba0cbf41ae4d1528525d01c1f1aa20986d326ca29f6b004f9ed6d1432a8d0d2105937171bf162dea272120291b SHA512 1f444ca7421a7efb1ae619b481942be43c32f3ca1b877de6feb5d595fd24bd2f5594ee8a4f3f194f5a5b6f9006b608396118df784309aa0cc2de9b3e6a17424a
TIMESTAMP 2019-04-15T22:38:45Z TIMESTAMP 2019-04-17T20:08:50Z
-----BEGIN PGP SIGNATURE----- -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAly1B/VfFIAAAAAALgAo iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAly3h9JfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx
RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY
klCTTQ/+LoyNjk0WaohJfdGwelXIvxc8PK+Es4GejfugAVE8Kw4j5avBTRncesRy klCosw/+Jsxx5eQYhfqE+nllUNMvYqnA4JGQvF4sx9iE4taLkgObjgtPJtplUmFY
0K66JbwrVDHapotEGCgebVXlF/aorinnWl/9fImUIgcQ7carpH8w8OZYSFmT6ZLI we74NGpt6LzSHq2RBCw8A6Dmely8aHrIR8qI0WX+LzsPfTKBTiMRUFEkP1kbG5SA
Wz2VKDJUS/3bhHw4no+MwXYKkG/z4q+EEo29aXVtDs7tWh8I+XNn3Bc5pf7eOyWv MgRROa7kwt8BIMgHbBVjg09ZTZ3TDme7HDitK/a+jtpCaqOtHsGJTVrrzcRyyGj4
Wlf1FqK84D/qoRJJO8P5azocqAQ+B0H0U3J6JkWcms4ks/czq+xTqLMki7o8/J2O zR//jMy6QFU5z6pQAqcUF8qVy0fAQhGx3Q5vO5/FOFt/vo1VC1fsTRnFPi09wv4s
8IeJLOK5kDyYG8wMOLhX2Btnth+2stQDv+vcA+UFcAWkuyPv5VpR7rZizZONz4I8 /hr22RIL/l//CVDCTargPtnXGQGkIualx6ANdvkU5OUsxyppLgMHnt10cJQ21hCS
AcGfd598jYoU1WBvxZ+xDpDe6ryG80RvztSVF3l80t78MoR30vXhLuHHYh3rR9cX CWwQOpql6rXJ1t5ziQwzNaQUzjoVGf3yEu09hUjPkuJCMVszI/6xwDec35iRi/19
Uey+Mdx9wpz7sg3B+kRpvRDxpQ++u6uzhC5hTgmRazVWcJYx27yC7DCMHWWvtto3 9nfVvwlFC3RRCxWTN4928WOSTgCMF9gKQzs1kVuvsENDXq7u9LvXhXdfgg5LK53R
h7aF4gX3e62pUno2pkQAWvjjwEi5elXNeFNE2gK0+jl6msCthv0C5eMEmmjX26m3 m7LAEPez2Fs++LMp9S7q/ldjM6bksdoN+dMiT9jVYf3mNxR4SRoLaghJ9JTr61Ne
wIWdTifPdJt3ACOO4E9MGLm5qn1uMuSVtujiqrwuB+tUF9H5m4unZHKXwatNKr7M d5XnILqhUz6vIRSqFjZnoF3FVlNK3uubRoh8QUWwHoKCFqMzNeGlpP/6c2YbyQB7
lOw3p7j57k0UXu8GyH1lzyxin9ThsA8zTFCeJaoRGmxM1kmNgRV8eGTkllt2xvqZ mfSlVfQN4EuKzDHBv+PAja1oqfTRd8kKfRWpPdFZN4HHeQvRdE3uLyVQMm/BOw2x
+KPpPIoy9Lo/txXM0B1lYoL7B64KWj383VOcx8Eaplc0pgUlti4= uyn2vCYItXQv+Tq3kZ8o9IlsvbczE9Xna0BlRqMEa/6RCUYIrH8=
=Zh34 =6T8P
-----END PGP SIGNATURE----- -----END PGP SIGNATURE-----

View File

@ -0,0 +1,55 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201904-17">
<title>Patch: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in Patch, the worst of
which could result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">patch</product>
<announced>2019-04-17</announced>
<revised count="1">2019-04-17</revised>
<bug>647792</bug>
<bug>647794</bug>
<bug>652710</bug>
<access>remote</access>
<affected>
<package name="sys-devel/patch" auto="yes" arch="*">
<unaffected range="ge">2.7.6-r3</unaffected>
<vulnerable range="lt">2.7.6-r3</vulnerable>
</package>
</affected>
<background>
<p>Patch takes a patch file containing a difference listing produced by the
diff program and applies those differences to one or more original files,
producing patched versions.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in Patch. Please review
the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>Please review the referenced CVE identifiers for details.</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Patch users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=sys-devel/patch-2.7.6-r3"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-1000156">
CVE-2018-1000156
</uri>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-6951">CVE-2018-6951</uri>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-6952">CVE-2018-6952</uri>
</references>
<metadata tag="requester" timestamp="2019-04-11T21:19:29Z">b-man</metadata>
<metadata tag="submitter" timestamp="2019-04-17T18:28:49Z">b-man</metadata>
</glsa>

View File

@ -0,0 +1,44 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201904-18">
<title>libseccomp: Privilege escalation</title>
<synopsis>A vulnerability in libseccomp allows for privilege escalation.</synopsis>
<product type="ebuild">libseccomp</product>
<announced>2019-04-17</announced>
<revised count="1">2019-04-17</revised>
<bug>680442</bug>
<access>remote</access>
<affected>
<package name="sys-libs/libseccomp" auto="yes" arch="*">
<unaffected range="ge">2.4.0</unaffected>
<vulnerable range="lt">2.4.0</vulnerable>
</package>
</affected>
<background>
<p>A library that provides an easy to use, platform independent, interface
to the Linux Kernels syscall filtering mechanism.
</p>
</background>
<description>
<p>Please review the CVE identifier referenced below for details.</p>
</description>
<impact type="normal">
<p>Please review the referenced CVE identifier for details.</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All libseccomp users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=sys-libs/libseccomp-2.4.0"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-9893">CVE-2019-9893</uri>
</references>
<metadata tag="requester" timestamp="2019-03-24T13:22:58Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2019-04-17T18:31:42Z">b-man</metadata>
</glsa>

View File

@ -0,0 +1,48 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201904-19">
<title>Dovecot: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in Dovecot, the worst of
which could result in root privilege escalation.
</synopsis>
<product type="ebuild">dovecot</product>
<announced>2019-04-17</announced>
<revised count="1">2019-04-17</revised>
<bug>677350</bug>
<bug>681922</bug>
<access>remote</access>
<affected>
<package name="net-mail/dovecot" auto="yes" arch="*">
<unaffected range="ge">2.3.5.1</unaffected>
<vulnerable range="lt">2.3.5.1</vulnerable>
</package>
</affected>
<background>
<p>Dovecot is an open source IMAP and POP3 email server.</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in Dovecot. Please review
the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>Please review the referenced CVE identifiers for details</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Dovecot users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-mail/dovecot-2.3.5.1"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-3814">CVE-2019-3814</uri>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-7524">CVE-2019-7524</uri>
</references>
<metadata tag="requester" timestamp="2019-04-02T07:08:40Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2019-04-17T18:33:06Z">b-man</metadata>
</glsa>

View File

@ -1 +1 @@
Mon, 15 Apr 2019 22:38:42 +0000 Wed, 17 Apr 2019 20:08:47 +0000

View File

@ -1 +1 @@
9b59bd6cf27bbcd9bc148340e6758177e493f624 1555361601 2019-04-15T20:53:21+00:00 6c18ba31f4c4516ed01d1b3ca04795cfadc11f86 1555526007 2019-04-17T18:33:27+00:00

View File

@ -1,13 +0,0 @@
DEFINED_PHASES=configure
DEPEND=xattr? ( sys-apps/attr ) test? ( sys-apps/ed )
DESCRIPTION=Utility to apply diffs to files
EAPI=4
HOMEPAGE=https://www.gnu.org/software/patch/patch.html
IUSE=static test xattr
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris
LICENSE=GPL-2
RDEPEND=xattr? ( sys-apps/attr )
SLOT=0
SRC_URI=mirror://gnu/patch/patch-2.7.4.tar.xz
_eclasses_=desktop b1d22ac8bdd4679ab79c71aca235009d epatch a1bf4756dba418a7238f3be0cb010c54 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 6e6c2737b59a4b982de6fb3ecefd87f8 flag-o-matic 55aaa148741116aa54ad0d80e361818e ltprune 08f9e1d9ee0af8f5d9a7854efbcd8c0e multilib b2f01ad412baf81650c23fcf0975fa33 preserve-libs ef207dc62baddfddfd39a164d9797648 toolchain-funcs f164325a2cdb5b3ea39311d483988861 vcs-clean 2a0f74a496fa2b1552c4f3398258b7bf
_md5_=2f302e4847c973782738c2c301d12e86

View File

@ -1,13 +0,0 @@
DEFINED_PHASES=configure
DEPEND=xattr? ( sys-apps/attr ) test? ( sys-apps/ed )
DESCRIPTION=Utility to apply diffs to files
EAPI=4
HOMEPAGE=https://www.gnu.org/software/patch/patch.html
IUSE=static test xattr
KEYWORDS=alpha amd64 arm arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris
LICENSE=GPL-2
RDEPEND=xattr? ( sys-apps/attr )
SLOT=0
SRC_URI=mirror://gnu/patch/patch-2.7.5.tar.xz
_eclasses_=desktop b1d22ac8bdd4679ab79c71aca235009d epatch a1bf4756dba418a7238f3be0cb010c54 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 6e6c2737b59a4b982de6fb3ecefd87f8 flag-o-matic 55aaa148741116aa54ad0d80e361818e ltprune 08f9e1d9ee0af8f5d9a7854efbcd8c0e multilib b2f01ad412baf81650c23fcf0975fa33 preserve-libs ef207dc62baddfddfd39a164d9797648 toolchain-funcs f164325a2cdb5b3ea39311d483988861 vcs-clean 2a0f74a496fa2b1552c4f3398258b7bf
_md5_=15dbc095e5ffbfcb79e5e0336000245f

View File

@ -1,13 +1,13 @@
DEFINED_PHASES=configure DEFINED_PHASES=configure
DEPEND=xattr? ( sys-apps/attr ) test? ( sys-apps/ed ) DEPEND=xattr? ( sys-apps/attr ) test? ( sys-apps/ed )
DESCRIPTION=Utility to apply diffs to files DESCRIPTION=Utility to apply diffs to files
EAPI=4 EAPI=6
HOMEPAGE=https://www.gnu.org/software/patch/patch.html HOMEPAGE=https://www.gnu.org/software/patch/patch.html
IUSE=static test xattr IUSE=static test xattr
KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~x64-cygwin ~amd64-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris
LICENSE=GPL-2 LICENSE=GPL-3+
RDEPEND=xattr? ( sys-apps/attr ) RDEPEND=xattr? ( sys-apps/attr )
SLOT=0 SLOT=0
SRC_URI=mirror://gnu/patch/patch-2.7.3.tar.xz SRC_URI=mirror://gnu/patch/patch-2.7.6.tar.xz
_eclasses_=desktop b1d22ac8bdd4679ab79c71aca235009d epatch a1bf4756dba418a7238f3be0cb010c54 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 6e6c2737b59a4b982de6fb3ecefd87f8 flag-o-matic 55aaa148741116aa54ad0d80e361818e ltprune 08f9e1d9ee0af8f5d9a7854efbcd8c0e multilib b2f01ad412baf81650c23fcf0975fa33 preserve-libs ef207dc62baddfddfd39a164d9797648 toolchain-funcs f164325a2cdb5b3ea39311d483988861 vcs-clean 2a0f74a496fa2b1552c4f3398258b7bf _eclasses_=desktop b1d22ac8bdd4679ab79c71aca235009d epatch a1bf4756dba418a7238f3be0cb010c54 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 6e6c2737b59a4b982de6fb3ecefd87f8 flag-o-matic 55aaa148741116aa54ad0d80e361818e ltprune 08f9e1d9ee0af8f5d9a7854efbcd8c0e multilib b2f01ad412baf81650c23fcf0975fa33 preserve-libs ef207dc62baddfddfd39a164d9797648 toolchain-funcs f164325a2cdb5b3ea39311d483988861 vcs-clean 2a0f74a496fa2b1552c4f3398258b7bf
_md5_=c0bb59955ab6007f50fec82692bd3ca7 _md5_=3329200b0c8c61aeb79c4b6ef676759d

View File

@ -1,12 +0,0 @@
DEFINED_PHASES=compile configure install prepare test
DEPEND=>=sys-kernel/linux-headers-4.3
DESCRIPTION=high level interface to Linux seccomp filter
EAPI=5
HOMEPAGE=https://github.com/seccomp/libseccomp
IUSE=static-libs abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64
KEYWORDS=-* amd64 arm arm64 ~mips ppc ppc64 s390 x86
LICENSE=LGPL-2.1
SLOT=0
SRC_URI=https://github.com/seccomp/libseccomp/releases/download/v2.3.0/libseccomp-2.3.0.tar.gz
_eclasses_=desktop b1d22ac8bdd4679ab79c71aca235009d epatch a1bf4756dba418a7238f3be0cb010c54 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 6e6c2737b59a4b982de6fb3ecefd87f8 ltprune 08f9e1d9ee0af8f5d9a7854efbcd8c0e multibuild 40fe59465edacd730c644ec2bc197809 multilib b2f01ad412baf81650c23fcf0975fa33 multilib-build b42436dc1260f475af229754c165cb6b multilib-minimal 8bddda43703ba94d8341f4e247f97566 preserve-libs ef207dc62baddfddfd39a164d9797648 toolchain-funcs f164325a2cdb5b3ea39311d483988861 vcs-clean 2a0f74a496fa2b1552c4f3398258b7bf
_md5_=ba7769427d076b9754351c11ae8e9c86

View File

@ -1,12 +0,0 @@
DEFINED_PHASES=compile configure install prepare test
DEPEND=>=sys-kernel/linux-headers-4.3
DESCRIPTION=high level interface to Linux seccomp filter
EAPI=5
HOMEPAGE=https://github.com/seccomp/libseccomp
IUSE=static-libs abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64
KEYWORDS=-* ~amd64 ~arm ~arm64 ~mips ~ppc ~ppc64 ~s390 ~x86
LICENSE=LGPL-2.1
SLOT=0
SRC_URI=https://github.com/seccomp/libseccomp/releases/download/v2.3.1/libseccomp-2.3.1.tar.gz
_eclasses_=desktop b1d22ac8bdd4679ab79c71aca235009d epatch a1bf4756dba418a7238f3be0cb010c54 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 6e6c2737b59a4b982de6fb3ecefd87f8 ltprune 08f9e1d9ee0af8f5d9a7854efbcd8c0e multibuild 40fe59465edacd730c644ec2bc197809 multilib b2f01ad412baf81650c23fcf0975fa33 multilib-build b42436dc1260f475af229754c165cb6b multilib-minimal 8bddda43703ba94d8341f4e247f97566 preserve-libs ef207dc62baddfddfd39a164d9797648 toolchain-funcs f164325a2cdb5b3ea39311d483988861 vcs-clean 2a0f74a496fa2b1552c4f3398258b7bf
_md5_=051480aa4c37a17729f5818c70fd1cd6

View File

@ -1,12 +0,0 @@
DEFINED_PHASES=compile configure install prepare test
DEPEND=>=sys-kernel/linux-headers-4.3
DESCRIPTION=high level interface to Linux seccomp filter
EAPI=5
HOMEPAGE=https://github.com/seccomp/libseccomp
IUSE=static-libs abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64
KEYWORDS=-* amd64 arm arm64 ~mips ppc ppc64 s390 x86
LICENSE=LGPL-2.1
SLOT=0
SRC_URI=https://github.com/seccomp/libseccomp/releases/download/v2.3.2/libseccomp-2.3.2.tar.gz
_eclasses_=desktop b1d22ac8bdd4679ab79c71aca235009d epatch a1bf4756dba418a7238f3be0cb010c54 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 6e6c2737b59a4b982de6fb3ecefd87f8 ltprune 08f9e1d9ee0af8f5d9a7854efbcd8c0e multibuild 40fe59465edacd730c644ec2bc197809 multilib b2f01ad412baf81650c23fcf0975fa33 multilib-build b42436dc1260f475af229754c165cb6b multilib-minimal 8bddda43703ba94d8341f4e247f97566 preserve-libs ef207dc62baddfddfd39a164d9797648 toolchain-funcs f164325a2cdb5b3ea39311d483988861 vcs-clean 2a0f74a496fa2b1552c4f3398258b7bf
_md5_=b53c1af8bd58bd9201e6bb6fc9f314fa

View File

@ -1,12 +0,0 @@
DEFINED_PHASES=compile configure install prepare test
DEPEND=>=sys-kernel/linux-headers-4.3
DESCRIPTION=high level interface to Linux seccomp filter
EAPI=5
HOMEPAGE=https://github.com/seccomp/libseccomp
IUSE=static-libs abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64
KEYWORDS=-* ~amd64 ~arm ~arm64 ~mips ~ppc ~ppc64 ~s390 ~x86 ~amd64-linux
LICENSE=LGPL-2.1
SLOT=0
SRC_URI=https://github.com/seccomp/libseccomp/releases/download/v2.3.3/libseccomp-2.3.3.tar.gz
_eclasses_=desktop b1d22ac8bdd4679ab79c71aca235009d epatch a1bf4756dba418a7238f3be0cb010c54 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 6e6c2737b59a4b982de6fb3ecefd87f8 ltprune 08f9e1d9ee0af8f5d9a7854efbcd8c0e multibuild 40fe59465edacd730c644ec2bc197809 multilib b2f01ad412baf81650c23fcf0975fa33 multilib-build b42436dc1260f475af229754c165cb6b multilib-minimal 8bddda43703ba94d8341f4e247f97566 preserve-libs ef207dc62baddfddfd39a164d9797648 toolchain-funcs f164325a2cdb5b3ea39311d483988861 vcs-clean 2a0f74a496fa2b1552c4f3398258b7bf
_md5_=736b5b762c9ebb3200852dd90ff4dd5a

View File

@ -0,0 +1,12 @@
DEFINED_PHASES=compile configure install prepare test
DEPEND=>=sys-kernel/linux-headers-4.3
DESCRIPTION=high level interface to Linux seccomp filter
EAPI=6
HOMEPAGE=https://github.com/seccomp/libseccomp
IUSE=static-libs abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64
KEYWORDS=-* amd64 arm arm64 ~hppa ~mips ppc ppc64 s390 x86 ~amd64-linux ~x86-linux
LICENSE=LGPL-2.1
SLOT=0
SRC_URI=https://github.com/seccomp/libseccomp/releases/download/v2.4.0/libseccomp-2.4.0.tar.gz
_eclasses_=multibuild 40fe59465edacd730c644ec2bc197809 multilib b2f01ad412baf81650c23fcf0975fa33 multilib-build b42436dc1260f475af229754c165cb6b multilib-minimal 8bddda43703ba94d8341f4e247f97566 toolchain-funcs f164325a2cdb5b3ea39311d483988861
_md5_=dcba191ef133494626953c8228be4e54

View File

@ -1,89 +0,0 @@
# ChangeLog for sys-devel/patch
# Copyright 1999-2016 Gentoo Foundation; Distributed under the GPL v2
# (auto-generated from git log)
*patch-2.7.5 (09 Aug 2015)
*patch-2.7.4 (09 Aug 2015)
*patch-2.7.3 (09 Aug 2015)
09 Aug 2015; Robin H. Johnson <robbat2@gentoo.org> +metadata.xml,
+patch-2.7.3.ebuild, +patch-2.7.4.ebuild, +patch-2.7.5.ebuild:
proj/gentoo: Initial commit
This commit represents a new era for Gentoo:
Storing the gentoo-x86 tree in Git, as converted from CVS.
This commit is the start of the NEW history.
Any historical data is intended to be grafted onto this point.
Creation process:
1. Take final CVS checkout snapshot
2. Remove ALL ChangeLog* files
3. Transform all Manifests to thin
4. Remove empty Manifests
5. Convert all stale $Header$/$Id$ CVS keywords to non-expanded Git $Id$
5.1. Do not touch files with -kb/-ko keyword flags.
Signed-off-by: Robin H. Johnson <robbat2@gentoo.org>
X-Thanks: Alec Warner <antarus@gentoo.org> - did the GSoC 2006 migration
tests
X-Thanks: Robin H. Johnson <robbat2@gentoo.org> - infra guy, herding this
project
X-Thanks: Nguyen Thai Ngoc Duy <pclouds@gentoo.org> - Former Gentoo
developer, wrote Git features for the migration
X-Thanks: Brian Harring <ferringb@gentoo.org> - wrote much python to improve
cvs2svn
X-Thanks: Rich Freeman <rich0@gentoo.org> - validation scripts
X-Thanks: Patrick Lauer <patrick@gentoo.org> - Gentoo dev, running new 2014
work in migration
X-Thanks: Michał Górny <mgorny@gentoo.org> - scripts, QA, nagging
X-Thanks: All of other Gentoo developers - many ideas and lots of paint on
the bikeshed
24 Aug 2015; Justin Lecher <jlec@gentoo.org> metadata.xml:
Use https by default
Convert all URLs for sites supporting encrypted connections from http to
https
Signed-off-by: Justin Lecher <jlec@gentoo.org>
24 Aug 2015; Justin Lecher <jlec@gentoo.org> patch-2.7.3.ebuild,
patch-2.7.4.ebuild, patch-2.7.5.ebuild:
Use https for most gnu.org URLs
Signed-off-by: Justin Lecher <jlec@gentoo.org>
24 Aug 2015; Mike Gilbert <floppym@gentoo.org> metadata.xml:
Revert DOCTYPE SYSTEM https changes in metadata.xml
repoman does not yet accept the https version.
This partially reverts eaaface92ee81f30a6ac66fe7acbcc42c00dc450.
Bug: https://bugs.gentoo.org/552720
24 Nov 2015; Mike Frysinger <vapier@gentoo.org> metadata.xml:
standardize various metadata.xml style
24 Jan 2016; Michał Górny <mgorny@gentoo.org> metadata.xml:
Unify quoting in metadata.xml files for machine processing
Force unified quoting in all metadata.xml files since lxml does not
preserve original use of single and double quotes. Ensuring unified
quoting before the process allows distinguishing the GLEP 67-related
metadata.xml changes from unrelated quoting changes.
24 Jan 2016; Michał Górny <mgorny@gentoo.org> metadata.xml:
Replace all herds with appropriate projects (GLEP 67)
Replace all uses of herd with appropriate project maintainers, or no
maintainers in case of herds requested to be disbanded.
24 Jan 2016; Michał Górny <mgorny@gentoo.org> metadata.xml:
Set appropriate maintainer types in metadata.xml (GLEP 67)
29 Feb 2016; Steev Klimaszewski <steev@gentoo.org> patch-2.7.5.ebuild:
stable 2.7.5 for arm64
Package-Manager: portage-2.2.27

View File

@ -1,317 +0,0 @@
# ChangeLog for sys-devel/patch
# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2
# $Header: /var/cvsroot/gentoo-x86/sys-devel/patch/ChangeLog,v 1.91 2015/05/20 00:36:19 mattst88 Exp $
20 May 2015; Matt Turner <mattst88@gentoo.org> patch-2.7.5.ebuild:
alpha stable, bug 548120.
15 May 2015; Mikle Kolyada <zlogene@gentoo.org> patch-2.7.5.ebuild:
arm stable wrt bug #548120
15 May 2015; Pacho Ramos <pacho@gentoo.org> patch-2.7.5.ebuild:
ppc stable wrt bug #548120
13 May 2015; Jack Morgan <jmorgan@gentoo.org> patch-2.7.5.ebuild:
ia64 stable wrt bug #548120
11 May 2015; Mikle Kolyada <zlogene@gentoo.org> patch-2.7.5.ebuild:
sparc stable wrt bug #548120
01 May 2015; Mikle Kolyada <zlogene@gentoo.org> patch-2.7.5.ebuild:
x86 stable wrt bug #548120
01 May 2015; Mikle Kolyada <zlogene@gentoo.org> patch-2.7.5.ebuild:
amd64 stable wrt bug #548120
01 May 2015; Jeroen Roovers <jer@gentoo.org> patch-2.7.5.ebuild:
Stable for HPPA PPC64 (bug #548120).
21 Mar 2015; Mike Frysinger <vapier@gentoo.org> patch-2.7.3.ebuild:
Mark arm64/m68k/s390/sh stable.
16 Mar 2015; Lars Wendler <polynomial-c@gentoo.org> -patch-2.6.1.ebuild,
-files/gnulib_strnlen.c:
Removed vulnerable version.
*patch-2.7.5 (08 Mar 2015)
08 Mar 2015; Lars Wendler <polynomial-c@gentoo.org> +patch-2.7.5.ebuild:
Version bump.
24 Feb 2015; Agostino Sarubbo <ago@gentoo.org> patch-2.7.3.ebuild:
Stable for alpha, wrt bug #536614
23 Feb 2015; Agostino Sarubbo <ago@gentoo.org> patch-2.7.3.ebuild:
Stable for ia64, wrt bug #536614
18 Feb 2015; Agostino Sarubbo <ago@gentoo.org> patch-2.7.3.ebuild:
Stable for ppc64, wrt bug #536614
16 Feb 2015; Agostino Sarubbo <ago@gentoo.org> patch-2.7.3.ebuild:
Stable for sparc, wrt bug #536614
15 Feb 2015; Agostino Sarubbo <ago@gentoo.org> patch-2.7.3.ebuild:
Stable for x86, wrt bug #536614
01 Feb 2015; Markus Meier <maekke@gentoo.org> patch-2.7.3.ebuild:
arm stable, bug #536614
*patch-2.7.4 (01 Feb 2015)
01 Feb 2015; Lars Wendler <polynomial-c@gentoo.org> -patch-2.7.1-r3.ebuild,
-patch-2.7.2.ebuild, +patch-2.7.4.ebuild,
-files/patch-2.7.1-Fix-removing-empty-directories.patch,
-files/patch-2.7.1-dry-run-mode-create-temp-files-in-temp-dir.patch,
-files/patch-2.7.1-initialize_data_structures_early_enough.patch,
-files/patch-2.7.1-prevent_depend_on_autotools.patch:
Version bump (bug #538426). Removed old.
31 Jan 2015; Agostino Sarubbo <ago@gentoo.org> patch-2.7.3.ebuild:
Stable for ppc, wrt bug #536614
28 Jan 2015; Agostino Sarubbo <ago@gentoo.org> patch-2.7.3.ebuild:
Stable for amd64, wrt bug #536614
27 Jan 2015; Jeroen Roovers <jer@gentoo.org> patch-2.7.3.ebuild:
Stable for HPPA (bug #536614).
23 Jan 2015; Lars Wendler <polynomial-c@gentoo.org>
-files/patch-2.7.2-fix_for_CVE-2015-1196_fix.patch,
-files/patch-2.7.2-valid_filenames_on_renames_and_copies.patch:
Removed unused patches.
*patch-2.7.3 (23 Jan 2015)
23 Jan 2015; Lars Wendler <polynomial-c@gentoo.org> -patch-2.7.2-r1.ebuild,
+patch-2.7.3.ebuild:
Rather use latest release than patch the previous one (d'oh!)
*patch-2.7.2-r1 (23 Jan 2015)
23 Jan 2015; Lars Wendler <polynomial-c@gentoo.org> +patch-2.7.2-r1.ebuild,
+files/patch-2.7.2-fix_for_CVE-2015-1196_fix.patch,
+files/patch-2.7.2-valid_filenames_on_renames_and_copies.patch:
Revbump to add two upstream fixes.
*patch-2.7.2 (21 Jan 2015)
21 Jan 2015; Lars Wendler <polynomial-c@gentoo.org> -patch-2.5.9.ebuild,
-patch-2.5.9-r1.ebuild, -patch-2.7.1-r2.ebuild, +patch-2.7.2.ebuild,
-files/patch-2.5.9-cr-stripping.patch,
-files/patch-2.7.1-Fix-removing-empty-directories-automake.patch:
Security bump (bug #536614). Removed old.
18 Jan 2014; Mike Frysinger <vapier@gentoo.org> patch-2.6.1.ebuild,
patch-2.7.1-r2.ebuild, patch-2.7.1-r3.ebuild:
Add arm64 love.
*patch-2.7.1-r3 (15 Oct 2013)
15 Oct 2013; Lars Wendler <polynomial-c@gentoo.org> -patch-2.7.1.ebuild,
-patch-2.7.1-r1.ebuild, patch-2.7.1-r2.ebuild, +patch-2.7.1-r3.ebuild,
+files/patch-2.7.1-initialize_data_structures_early_enough.patch,
+files/patch-2.7.1-prevent_depend_on_autotools.patch:
Revbump to fix segfault on nonexisting dir. Thanks to Martin von Gagern for
reporting this in bug #485182. Removed old versions.
*patch-2.7.1-r2 (02 Aug 2013)
02 Aug 2013; Doug Goldstein <cardoe@gentoo.org>
+files/patch-2.7.1-Fix-removing-empty-directories-automake.patch,
+files/patch-2.7.1-Fix-removing-empty-directories.patch,
+files/patch-2.7.1-dry-run-mode-create-temp-files-in-temp-dir.patch,
+patch-2.7.1-r2.ebuild:
Fixes to prevent leaving empty directories around when the wrong patch level
is used or if --dry-run is specified. bug #478548
21 May 2013; Mike Frysinger <vapier@gentoo.org> patch-2.7.1-r1.ebuild:
Do not let $ED from the EAPI mess up the search for `ed` #470210 by Roman
Žilka.
19 Feb 2013; Zac Medico <zmedico@gentoo.org> patch-2.7.1-r1.ebuild:
Add ~arm-linux keyword.
13 Nov 2012; Fabian Groffen <grobian@gentoo.org> patch-2.7.1-r1.ebuild:
Drop useless condition, Prefix always has USERLAND=GNU
*patch-2.7.1-r1 (13 Nov 2012)
13 Nov 2012; Christoph Junghans <ottxor@gentoo.org> +patch-2.7.1-r1.ebuild:
added prefix support (bug #442928)
*patch-2.7.1 (28 Sep 2012)
28 Sep 2012; Mike Frysinger <vapier@gentoo.org> +patch-2.7.1.ebuild,
-patch-2.7.ebuild:
Version bump which should fix #435384 by Ben Kohler and #435862 by Andrey
Volkov.
19 Sep 2012; Alexis Ballier <aballier@gentoo.org> patch-2.7.ebuild:
restore bsd keywords, xattr useflag is now masked, bug #435474
19 Sep 2012; Mike Frysinger <vapier@gentoo.org> patch-2.7.ebuild:
Add USE=xattr flag #435384 by Ben Kohler.
*patch-2.7 (13 Sep 2012)
13 Sep 2012; Mike Frysinger <vapier@gentoo.org> +patch-2.7.ebuild:
Version bump.
26 Apr 2012; Alexis Ballier <aballier@gentoo.org> patch-2.6.1.ebuild:
keyword ~amd64-fbsd
25 Jan 2012; Samuli Suominen <ssuominen@gentoo.org> patch-2.6.1.ebuild:
tidy
25 Jan 2012; Samuli Suominen <ssuominen@gentoo.org> patch-2.6.1.ebuild:
ppc64 stable wrt #387471
04 Jan 2012; Brent Baude <ranger@gentoo.org> patch-2.6.1.ebuild:
Marking patch-2.6.1 ppc for bug 387471
18 Dec 2011; Raúl Porcel <armin76@gentoo.org> patch-2.6.1.ebuild:
alpha/ia64/m68k/s390/sh/sparc stable wrt #387471
03 Dec 2011; Markus Meier <maekke@gentoo.org> patch-2.6.1.ebuild:
arm stable, bug #387471
02 Dec 2011; Steve Dibb <beandog@gentoo.org> patch-2.6.1.ebuild:
amd64 stable, bug 387471
28 Nov 2011; Pawel Hajdan jr <phajdan.jr@gentoo.org> patch-2.6.1.ebuild:
x86 stable wrt bug #387471
22 Nov 2011; Jeroen Roovers <jer@gentoo.org> patch-2.6.1.ebuild:
Stable for HPPA (bug #387471).
06 Feb 2011; Mart Raudsepp <leio@gentoo.org> patch-2.5.9.ebuild:
Drop to ~mips
22 Jan 2010; Jeremy Olexa <darkside@gentoo.org> patch-2.6.1.ebuild,
+files/gnulib_strnlen.c:
Add missing strnlen implementation that upstream apparently forgot to
include, bug #300845
02 Jan 2010; Mike Frysinger <vapier@gentoo.org> patch-2.6.1.ebuild:
Pull in ed for tests #299270 by Patrick Lauer.
*patch-2.6.1 (01 Jan 2010)
01 Jan 2010; Mike Frysinger <vapier@gentoo.org> +patch-2.6.1.ebuild:
Version bump.
*patch-2.6 (14 Nov 2009)
14 Nov 2009; Mike Frysinger <vapier@gentoo.org> +patch-2.6.ebuild:
Version bump.
18 Mar 2008; Mike Frysinger <vapier@gentoo.org> patch-2.5.9.ebuild,
patch-2.5.9-r1.ebuild:
Drop frivolous USE=build.
24 Jun 2007; Mike Frysinger <vapier@gentoo.org> patch-2.5.9-r1.ebuild:
Dont stabilize version 2.5.9-r1.
17 Oct 2006; Roy Marples <uberlord@gentoo.org> patch-2.5.9.ebuild,
patch-2.5.9-r1.ebuild:
Added ~sparc-fbsd keyword.
30 Mar 2006; Diego Pettenò <flameeyes@gentoo.org> patch-2.5.9-r1.ebuild:
Add ~x86-fbsd keyword.
07 May 2005; Mike Frysinger <vapier@gentoo.org> patch-2.5.9-r1.ebuild:
Install as gpatch on non-GNU systems #91560.
*patch-2.5.9-r1 (16 Nov 2004)
16 Nov 2004; Mike Frysinger <vapier@gentoo.org> +files/2.5.9-deb-cr.patch,
+patch-2.5.9-r1.ebuild:
Version bump with debian patch #49823 by JoWilly.
02 Jul 2004; Jeremy Huddleston <eradicator@gentoo.org>
patch-2.5.4-r5.ebuild, patch-2.5.9.ebuild:
virtual/glibc -> virtual/libc
24 Jun 2004; Aron Griffis <agriffis@gentoo.org> patch-2.5.4-r5.ebuild,
patch-2.5.9.ebuild:
QA - fix use invocation. This also fixes an ebuild error due in part to the
less readable use syntax. It was written [ "is-ldflags -pie" ] when it should
have been [ "`is-ldflags -pie`" ]. The way it was written would have always
evaluated to true.
22 Jun 2004; <solar@gentoo.org> patch-2.5.9.ebuild:
Fixed unary operator problem because LDFLAGS_PIE does not exist in most of the
cases. Fixed overwrite of LDFLAGS=
08 May 2004; Danny van Dyk <kugelfang@gentoo.org> patch-2.5.9.ebuild:
Filtering "-pie" from LDFLAGS and appending manually to the Makefile for amd64.
29 Mar 2004; Jon Portnoy <avenj@gentoo.org> patch-2.5.9.ebuild :
Added strip-flags, bug #42698.
21 Oct 2003; Martin Holzer <mholzer@gentoo.org> patch-2.5.9.ebuild:
Adding gentoo mirrors. Closes #30106 .
17 Sep 2003; Jon Portnoy <avenj@gentoo.org> patch-2.5.9.ebuild :
ia64 keywords.
03 Aug 2003; Martin Schlemmer <azarah@gentoo.org> patch-2.5.9.ebuild:
Bump to stable.
*patch-2.5.9 (17 Jun 2003)
06 Jul 2003; Joshua Kinard <kumba@gentoo.org> patch-2.5.9.ebuild:
Changed ~mips to mips in KEYWORDS
01 Jul 2003; Todd Sunderlin <todd@gentoo.org> patch-2.5.9.ebulid:
set stable on sparc
17 Jun 2003; Seemant Kulleen <seemant@gentoo.org> patch-2.5.4-r4.ebuild,
patch-2.5.4-r5.ebuild, patch-2.5.9.ebuild:
bumped -r5 to stable, and put 2.5.9 into ~arch testing. Thanks to Rach for
informing about this new version.
30 May 2003; <msterret@gentoo.org> patch-2.5.4-r5.ebuild:
Added static to IUSE
01 May 2003; <msterret@gentoo.org> patch-2.5.4-r5.ebuild:
added IUSE
some suggested changes from agriffis:
don't export CFLAGS; that's done automatically
use emake
use einstall
other small cleanups
*patch-2.5.4-r5 (01 May 2003)
13 May 2003; <msterret@gentoo.org> patch-2.5.4-r5.ebuild:
new patch ebuild that doesn't use try, but uses || die instead
18 Feb 2003; Zach Welch <zwelch@gentoo.org> patch-2.5.4-r4.ebuild :
Added hppa to keywords.
07 Feb 2003; Guy Martin <gmsoft@gentoo.org> patch-2.5.4-r4.ebuild :
Added hppa to keywords.
06 Dec 2002; Rodney Rees <manson@gentoo.org> : changed sparc ~sparc keywords
*patch-2.5.4-r4 (15 Feb 2002)
18 Jan 2003; Jan Seidel <tuxus@gentoo.org> :
Added mips to keywords
15 Feb 2002; M.Thibaut <murphy@gentoo.org> ChangeLog :
Added configuration flags that ensure correct compilation of the program
on all Linux platforms (more notably 64-bit ones). Fixes bug 1726
"fseek: invalid argument" on sparc64 machines with sparc32 userland.
*patch-2.5.4-r3 (1 Feb 2002)
1 Feb 2002; G.Bevin <gbevin@gentoo.org> ChangeLog :
Added initial ChangeLog which should be updated whenever the package is
updated in any way. This changelog is targetted to users. This means that the
comments should well explained and written in clean English. The details about
writing correct changelogs are explained in the skel.ChangeLog file which you
can find in the root directory of the portage repository.

View File

@ -1,9 +1 @@
DIST patch-2.7.3.tar.xz 684764 SHA256 d09022de9d629561bf4dad44625ef4b1ead15178b210412113531730cdb6f19d SHA512 8d2e3010cfb3283913edb87cbf8d3c474811dc0d288fcb6b87b8ce62296ae95c16dd3b59f21345905d4ffbc572d0be985612eebf90f0e9ee390ca53613402836 WHIRLPOOL 7b4e5471e22c24d97ebac94939582d5d3d311f057e97b43f39def297b7c2db723f5558d66d10c3b289caea241b931dea49beabfe0ec03c0c6d0f91bc526ad52c DIST patch-2.7.6.tar.xz 783756 BLAKE2B e3dd2d155a94c39cb60eafc26677e84de14c3a6d5814dff69de091ded52f21862490970254297795f2c42a0c3203f7e88a8f65bb66968f8dfd6e066bf53f2dfb SHA512 fcca87bdb67a88685a8a25597f9e015f5e60197b9a269fa350ae35a7991ed8da553939b4bbc7f7d3cfd863c67142af403b04165633acbce4339056a905e87fbd
DIST patch-2.7.4.tar.xz 714392 SHA256 0eacbb07ce106fe4dcbfbe6c052e55b50bf3df8e1bb16228c9da77b6659ff109 SHA512 7842ad925c6223b1e106844d403a66151fd511a51bf2c78f3c15aa15f5e923f9b58d139bc098aca7c7c6d07e78c01dba729a7e85e93c1c7d18f3150314be0a6f WHIRLPOOL 71c5643345b6c573afe59b13a9c69c0076b38bbd3448220f645b4bb0fc629dc598e37242770de52fa4f1fb949a90375e1b9dca2d43188342562385ad77512d84
DIST patch-2.7.5.tar.xz 727704 SHA256 fd95153655d6b95567e623843a0e77b81612d502ecf78a489a4aed7867caa299 SHA512 6620ac8101f60c0b456ce339fa5e371f40be0b391e2e9728f34f3625f9907e516de61dac2f91bc76e6fd28a9bd1224efc3ba827cfaa606d857730c1af4195a0f WHIRLPOOL 27e209cd99b0e3366c7e094e54581510fb3018202fc79d6a906e14e87efae1b7b7548fcafb70af6f5db59f08237fd0f5363789d719ff3452925bd99dc41a9cdb
EBUILD patch-2.7.3.ebuild 990 SHA256 9a12926828e2b37569ed29b4fa947f70b5702e310386045fe0b487825aa21d6c SHA512 e374439c43e54b08dcb6196f6b58a7409b65b06ef7b9f9de5dfcaaa9694b2b56b8abf77dd0ae648f1ed8141b7e0958bf5ca073b5e4194f71fc44b09074db776d WHIRLPOOL 301c6605c127962fa5bd170c4000db7d8c5f6b329e15a24aa8553f6360a399df8d3ffd9a7a8285e4cd6f11b2704c5326c2be05b51ea0fcbde3e1fda3670995ae
EBUILD patch-2.7.4.ebuild 1003 SHA256 bc98c8e3feb2f8a09512c6be0f56fc61aa004f456b8f8ffb6e09298bed57f2ef SHA512 c4b50b052f9eab6a99fbf0604efbd400ed08e4b0b3f2a77fa62cff9429537d2e23bc2f1f1f938aa1dcfc8051263f01e416a0a9fdd434cd036eb1e43b0f389e50 WHIRLPOOL 4aed21c70605a5bcf1aedb0d99219ec5e4c59c9562be8689ffbe0a54571edba40547e0872dabe2d2e0e5fe34312ca90347dda7afd875d8198a4d7e3091c1fd4c
EBUILD patch-2.7.5.ebuild 993 SHA256 b443083b36382ce5a41fc24d18209948723bc42bc3f83530c6d1b09977549432 SHA512 c088680612be47ed8bfe68944b2bbeb2c6755e843a678327f18fe7dc1df21ec983f8ecbc7070778a32e714b28203d8ab5aacbc3643a389e8eee84195fde1e0db WHIRLPOOL d2532f393c5a5e9d78ce460c5ee9a907a98076f74b23aaf1dd382dca3faa5758f4b3083e04026f2760ed7cb73b87262c1adf1fa5b54ca8c0a4d12be48ce5a2b8
MISC ChangeLog 3345 SHA256 68fd12a34a0d21c89fbd865131b404e8ca8b12191411a592fd279818922a96cb SHA512 2b88e513aed1874add7c32cb1e6c994ef1919ca3c0daa43a24080ede05f0568c2c5e0adbfbff103341672098f39726ce1cef4b8231be97ccd3e8051558c59eac WHIRLPOOL 93ebc4da7f56eccc6599d7afc41dfca6d47a8d401da0fd08ac4869abd512e5d76344d456ecf5ceffee4b0351aa56f53fb5570ee732adaf43a005c4d5a310074c
MISC ChangeLog-2015 11384 SHA256 51ef22c4293e7c9b7923db88c6fb6a1a27dff39695a21b956e5763a1ddd59a0d SHA512 487894a0cdfd9e9aecb71873c88513be8fa48cd50385c7accb3538bf574dc4e75aad75e585a7acc7836a202bafb9c4389cefe247b6f5919998debe857ac84c56 WHIRLPOOL 28502c53399d9ed89b8bac25918425ef42113499fbeaedcbfb176ac931a0eadad8d527151479dea1f2eefb5573f3ef481856750c3950862a50cfc94dec416645
MISC metadata.xml 253 SHA256 d82c33ef453113a5c1ebe250dcba373c22934a69b0a86c6ab15a5ca589c25b91 SHA512 54a9069aeb4165d2dff3d473c8001bc51613aac9dff3f7f5e9971a9891a737a31511ffa11cbd523febe581ac1d9de2bdf2f40410f0c4239138f2ccca3ef15555 WHIRLPOOL e5aee23acff864609953a1e4de768f0e4aef704b44c53c021f28573e1ca5c99f1a46d92935ecec2449f7b4419a36d8373127d0ecfa8d7bae72d835e1839eb3f8

View File

@ -0,0 +1,150 @@
From 123eaff0d5d1aebe128295959435b9ca5909c26d Mon Sep 17 00:00:00 2001
From: Andreas Gruenbacher <agruen@gnu.org>
Date: Fri, 6 Apr 2018 12:14:49 +0200
Subject: Fix arbitrary command execution in ed-style patches
(CVE-2018-1000156)
* src/pch.c (do_ed_script): Write ed script to a temporary file instead
of piping it to ed: this will cause ed to abort on invalid commands
instead of rejecting them and carrying on.
* tests/ed-style: New test case.
* tests/Makefile.am (TESTS): Add test case.
Without test to avoid automake due to @system package.
---
diff --git a/src/pch.c b/src/pch.c
index 0c5cc26..4fd5a05 100644
--- a/src/pch.c
+++ b/src/pch.c
@@ -33,6 +33,7 @@
# include <io.h>
#endif
#include <safe.h>
+#include <sys/wait.h>
#define INITHUNKMAX 125 /* initial dynamic allocation size */
@@ -2389,24 +2390,28 @@ do_ed_script (char const *inname, char const *outname,
static char const editor_program[] = EDITOR_PROGRAM;
file_offset beginning_of_this_line;
- FILE *pipefp = 0;
size_t chars_read;
+ FILE *tmpfp = 0;
+ char const *tmpname;
+ int tmpfd;
+ pid_t pid;
+
+ if (! dry_run && ! skip_rest_of_patch)
+ {
+ /* Write ed script to a temporary file. This causes ed to abort on
+ invalid commands such as when line numbers or ranges exceed the
+ number of available lines. When ed reads from a pipe, it rejects
+ invalid commands and treats the next line as a new command, which
+ can lead to arbitrary command execution. */
+
+ tmpfd = make_tempfile (&tmpname, 'e', NULL, O_RDWR | O_BINARY, 0);
+ if (tmpfd == -1)
+ pfatal ("Can't create temporary file %s", quotearg (tmpname));
+ tmpfp = fdopen (tmpfd, "w+b");
+ if (! tmpfp)
+ pfatal ("Can't open stream for file %s", quotearg (tmpname));
+ }
- if (! dry_run && ! skip_rest_of_patch) {
- int exclusive = *outname_needs_removal ? 0 : O_EXCL;
- if (inerrno != ENOENT)
- {
- *outname_needs_removal = true;
- copy_file (inname, outname, 0, exclusive, instat.st_mode, true);
- }
- sprintf (buf, "%s %s%s", editor_program,
- verbosity == VERBOSE ? "" : "- ",
- outname);
- fflush (stdout);
- pipefp = popen(buf, binary_transput ? "wb" : "w");
- if (!pipefp)
- pfatal ("Can't open pipe to %s", quotearg (buf));
- }
for (;;) {
char ed_command_letter;
beginning_of_this_line = file_tell (pfp);
@@ -2417,14 +2422,14 @@ do_ed_script (char const *inname, char const *outname,
}
ed_command_letter = get_ed_command_letter (buf);
if (ed_command_letter) {
- if (pipefp)
- if (! fwrite (buf, sizeof *buf, chars_read, pipefp))
+ if (tmpfp)
+ if (! fwrite (buf, sizeof *buf, chars_read, tmpfp))
write_fatal ();
if (ed_command_letter != 'd' && ed_command_letter != 's') {
p_pass_comments_through = true;
while ((chars_read = get_line ()) != 0) {
- if (pipefp)
- if (! fwrite (buf, sizeof *buf, chars_read, pipefp))
+ if (tmpfp)
+ if (! fwrite (buf, sizeof *buf, chars_read, tmpfp))
write_fatal ();
if (chars_read == 2 && strEQ (buf, ".\n"))
break;
@@ -2437,13 +2442,49 @@ do_ed_script (char const *inname, char const *outname,
break;
}
}
- if (!pipefp)
+ if (!tmpfp)
return;
- if (fwrite ("w\nq\n", sizeof (char), (size_t) 4, pipefp) == 0
- || fflush (pipefp) != 0)
+ if (fwrite ("w\nq\n", sizeof (char), (size_t) 4, tmpfp) == 0
+ || fflush (tmpfp) != 0)
write_fatal ();
- if (pclose (pipefp) != 0)
- fatal ("%s FAILED", editor_program);
+
+ if (lseek (tmpfd, 0, SEEK_SET) == -1)
+ pfatal ("Can't rewind to the beginning of file %s", quotearg (tmpname));
+
+ if (! dry_run && ! skip_rest_of_patch) {
+ int exclusive = *outname_needs_removal ? 0 : O_EXCL;
+ *outname_needs_removal = true;
+ if (inerrno != ENOENT)
+ {
+ *outname_needs_removal = true;
+ copy_file (inname, outname, 0, exclusive, instat.st_mode, true);
+ }
+ sprintf (buf, "%s %s%s", editor_program,
+ verbosity == VERBOSE ? "" : "- ",
+ outname);
+ fflush (stdout);
+
+ pid = fork();
+ if (pid == -1)
+ pfatal ("Can't fork");
+ else if (pid == 0)
+ {
+ dup2 (tmpfd, 0);
+ execl ("/bin/sh", "sh", "-c", buf, (char *) 0);
+ _exit (2);
+ }
+ else
+ {
+ int wstatus;
+ if (waitpid (pid, &wstatus, 0) == -1
+ || ! WIFEXITED (wstatus)
+ || WEXITSTATUS (wstatus) != 0)
+ fatal ("%s FAILED", editor_program);
+ }
+ }
+
+ fclose (tmpfp);
+ safe_unlink (tmpname);
if (ofp)
{
--
cgit v1.0-41-gc330

View File

@ -0,0 +1,29 @@
From f290f48a621867084884bfff87f8093c15195e6a Mon Sep 17 00:00:00 2001
From: Andreas Gruenbacher <agruen@gnu.org>
Date: Mon, 12 Feb 2018 16:48:24 +0100
Subject: Fix segfault with mangled rename patch
http://savannah.gnu.org/bugs/?53132
* src/pch.c (intuit_diff_type): Ensure that two filenames are specified
for renames and copies (fix the existing check).
---
src/pch.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/src/pch.c b/src/pch.c
index ff9ed2c..bc6278c 100644
--- a/src/pch.c
+++ b/src/pch.c
@@ -974,7 +974,8 @@ intuit_diff_type (bool need_header, mode_t *p_file_type)
if ((pch_rename () || pch_copy ())
&& ! inname
&& ! ((i == OLD || i == NEW) &&
- p_name[! reverse] &&
+ p_name[reverse] && p_name[! reverse] &&
+ name_is_valid (p_name[reverse]) &&
name_is_valid (p_name[! reverse])))
{
say ("Cannot %s file without two valid file names\n", pch_rename () ? "rename" : "copy");
--
cgit v1.0-41-gc330

View File

@ -0,0 +1,30 @@
From 9c986353e420ead6e706262bf204d6e03322c300 Mon Sep 17 00:00:00 2001
From: Andreas Gruenbacher <agruen@gnu.org>
Date: Fri, 17 Aug 2018 13:35:40 +0200
Subject: Fix swapping fake lines in pch_swap
* src/pch.c (pch_swap): Fix swapping p_bfake and p_efake when there is a
blank line in the middle of a context-diff hunk: that empty line stays
in the middle of the hunk and isn't swapped.
Fixes: https://savannah.gnu.org/bugs/index.php?53133
---
src/pch.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/pch.c b/src/pch.c
index e92bc64..a500ad9 100644
--- a/src/pch.c
+++ b/src/pch.c
@@ -2122,7 +2122,7 @@ pch_swap (void)
}
if (p_efake >= 0) { /* fix non-freeable ptr range */
if (p_efake <= i)
- n = p_end - i + 1;
+ n = p_end - p_ptrn_lines;
else
n = -i;
p_efake += n;
--
cgit v1.0-41-gc330

View File

@ -0,0 +1,25 @@
b5a91a01e5d0897facdd0f49d64b76b0f02b43e1
Allow input files to be missing for ed-style patches
* src/pch.c (do_ed_script): Allow input files to be missing so that new
files will be created as with non-ed-style patches.
diff --git a/src/pch.c b/src/pch.c
index bc6278c..0c5cc26 100644
--- a/src/pch.c
+++ b/src/pch.c
@@ -2394,9 +2394,11 @@ do_ed_script (char const *inname, char const *outname,
if (! dry_run && ! skip_rest_of_patch) {
int exclusive = *outname_needs_removal ? 0 : O_EXCL;
- assert (! inerrno);
- *outname_needs_removal = true;
- copy_file (inname, outname, 0, exclusive, instat.st_mode, true);
+ if (inerrno != ENOENT)
+ {
+ *outname_needs_removal = true;
+ copy_file (inname, outname, 0, exclusive, instat.st_mode, true);
+ }
sprintf (buf, "%s %s%s", editor_program,
verbosity == VERBOSE ? "" : "- ",
outname);

View File

@ -0,0 +1,125 @@
Backport for Gentoo patch-2.7.x.
https://bugs.gentoo.org/664640
Original patch:
Author: Lubomir Rintel <lkundrak@v3.sk>
Date: Tue Feb 27 16:52:00 2018 +0100
Subject: Fix error handling with git-style patches
When an error is encountered in output_files(), the subsequent call to
cleanup() calls back into output_files() resulting in an infinte recursion.
This is trivially reproduced with a git-style patch (which utilizes
output_file_later()) that tries to patch a nonexistent or unreadable
file (see attached test case).
* src/patch.c: (output_files) clear the files_to_output list before
iterating it, so that recursive calls won't iterate the same files.
* tests/git-error: New test case.
* tests/Makefile.am (TESTS): Add test case.
Origin: https://lists.gnu.org/archive/html/bug-patch/2018-02/msg00010.html
--- a/src/patch.c
+++ b/src/patch.c
@@ -1938,8 +1938,12 @@ output_files (struct stat const *st)
{
gl_list_iterator_t iter;
const void *elt;
+ gl_list_t files;
- iter = gl_list_iterator (files_to_output);
+ files = files_to_output;
+ init_files_to_output ();
+
+ iter = gl_list_iterator (files);
while (gl_list_iterator_next (&iter, &elt, NULL))
{
const struct file_to_output *file_to_output = elt;
@@ -1957,8 +1961,8 @@ output_files (struct stat const *st)
/* Free the list up to here. */
for (;;)
{
- const void *elt2 = gl_list_get_at (files_to_output, 0);
- gl_list_remove_at (files_to_output, 0);
+ const void *elt2 = gl_list_get_at (files, 0);
+ gl_list_remove_at (files, 0);
if (elt == elt2)
break;
}
@@ -1967,7 +1971,7 @@ output_files (struct stat const *st)
}
}
gl_list_iterator_free (&iter);
- gl_list_clear (files_to_output);
+ gl_list_free (files);
}
/* Fatal exit with cleanup. */
--- a/tests/Makefile.am
+++ b/tests/Makefile.am
@@ -40,6 +40,7 @@ TESTS = \
filename-choice \
git-binary-diff \
git-cleanup \
+ git-error \
garbage \
global-reject-files \
inname \
--- a/tests/Makefile.in
+++ b/tests/Makefile.in
@@ -1316,6 +1316,7 @@ TESTS = \
filename-choice \
git-binary-diff \
git-cleanup \
+ git-error \
garbage \
global-reject-files \
inname \
@@ -1695,6 +1696,13 @@ git-cleanup.log: git-cleanup
--log-file $$b.log --trs-file $$b.trs \
$(am__common_driver_flags) $(AM_LOG_DRIVER_FLAGS) $(LOG_DRIVER_FLAGS) -- $(LOG_COMPILE) \
"$$tst" $(AM_TESTS_FD_REDIRECT)
+git-error.log: git-error
+ @p='git-error'; \
+ b='git-error'; \
+ $(am__check_pre) $(LOG_DRIVER) --test-name "$$f" \
+ --log-file $$b.log --trs-file $$b.trs \
+ $(am__common_driver_flags) $(AM_LOG_DRIVER_FLAGS) $(LOG_DRIVER_FLAGS) -- $(LOG_COMPILE) \
+ "$$tst" $(AM_TESTS_FD_REDIRECT)
garbage.log: garbage
@p='garbage'; \
b='garbage'; \
--- /dev/null
+++ b/tests/git-error
@@ -0,0 +1,29 @@
+# Copyright (C) 2018 Free Software Foundation, Inc.
+#
+# Copying and distribution of this file, with or without modification,
+# in any medium, are permitted without royalty provided the copyright
+# notice and this notice are preserved.
+
+. $srcdir/test-lib.sh
+
+require cat
+use_local_patch
+use_tmpdir
+
+cat > f.diff <<EOF
+diff --git a/boo b/boo
+--- /dev/fd/63 2018-02-27 16:32:54.861266246 +0100
++++ /dev/fd/62 2018-02-27 16:32:54.861266246 +0100
+@@ -1 +1 @@
+-abc
++def
+
+EOF
+
+check 'patch .nonexistent < f.diff || echo "Status: $?"' <<EOF
+patching file .nonexistent
+Hunk #1 FAILED at 1.
+1 out of 1 hunk FAILED -- saving rejects to file .nonexistent.rej
+$PATCH: **** Can't reopen file .nonexistent : No such file or directory
+Status: 2
+EOF

View File

@ -0,0 +1,120 @@
http://git.savannah.gnu.org/cgit/patch.git/commit/?id=f6bc5b14bd193859851d15a049bafb1007acd288
http://git.savannah.gnu.org/cgit/patch.git/commit/?id=074e2395f81d0ecaa66b71a6c228c70b49db72e5
--- a/tests/crlf-handling
+++ b/tests/crlf-handling
@@ -14,7 +14,7 @@ use_local_patch
use_tmpdir
lf2crlf() {
- while read l; do echo -e "$l\r"; done
+ while read l; do printf "%s\r\n" "$l"; done
}
echo 1 > a
--- a/tests/git-cleanup
+++ b/tests/git-cleanup
@@ -36,8 +36,8 @@ BAD PATCH
EOF
echo 1 > f
-echo -n '' > g
-echo -n '' > h
+printf '' > g
+printf '' > h
check 'patch -f -i 1.diff || echo status: $?' <<EOF
patching file f
--- a/tests/merge
+++ b/tests/merge
@@ -30,30 +30,28 @@ x2() {
while test $# -gt 0 && test "$1" != -- ; do
echo "$1"
shift
- done > a.sed
- echo "$body" | sed -f a.sed > b
+ done > b.sed
+ echo "$body" | sed -f b.sed > b
shift
while test $# -gt 0 ; do
echo "$1"
shift
- done > b.sed
- echo "$body" | sed -f b.sed > c
- rm -f a.sed b.sed
+ done > c.sed
+ echo "$body" | sed -f c.sed > c
+ rm -f b.sed c.sed
output=`diff -u a b | patch $ARGS -f c`
status=$?
echo "$output" | sed -e '/^$/d' -e '/^patching file c$/d'
cat c
- test $status == 0 || echo "Status: $status"
+ test $status = 0 || echo "Status: $status"
}
x() {
- ARGS="$ARGS --merge" x2 "$@"
+ ARGS="--merge" x2 "$@"
echo
- ARGS="$ARGS --merge=diff3" x2 "$@"
+ ARGS="--merge=diff3" x2 "$@"
}
-unset ARGS
-
# ==============================================================
check 'x 3' <<EOF
--- a/tests/test-lib.sh
+++ b/tests/test-lib.sh
@@ -41,7 +41,7 @@ use_local_patch() {
eval 'patch() {
if test -n "$GDB" ; then
- echo -e "\n" >&3
+ printf "\n\n" >&3
gdbserver localhost:53153 $PATCH "$@" 2>&3
else
$PATCH "$@"
@@ -113,22 +113,15 @@ cleanup() {
exit $status
}
-if test -z "`echo -n`"; then
- if eval 'test -n "${BASH_LINENO[0]}" 2>/dev/null'; then
- eval '
- _start_test() {
- echo -n "[${BASH_LINENO[2]}] $* -- "
- }'
- else
- eval '
- _start_test() {
- echo -n "* $* -- "
- }'
- fi
+if eval 'test -n "${BASH_LINENO[0]}" 2>/dev/null'; then
+ eval '
+ _start_test() {
+ printf "[${BASH_LINENO[2]}] %s -- " "$*"
+ }'
else
eval '
_start_test() {
- echo "* $*"
+ printf "* %s -- " "$*"
}'
fi
--- a/tests/merge
+++ b/tests/merge
@@ -32,7 +32,7 @@ x2() {
shift
done > b.sed
echo "$body" | sed -f b.sed > b
- shift
+ test $# -eq 0 || shift
while test $# -gt 0 ; do
echo "$1"
shift
--

View File

@ -1,30 +0,0 @@
# Copyright 1999-2015 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Id$
EAPI=4
inherit flag-o-matic eutils
DESCRIPTION="Utility to apply diffs to files"
HOMEPAGE="https://www.gnu.org/software/patch/patch.html"
SRC_URI="mirror://gnu/patch/${P}.tar.xz"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris"
IUSE="static test xattr"
RDEPEND="xattr? ( sys-apps/attr )"
DEPEND="${RDEPEND}
test? ( sys-apps/ed )"
src_configure() {
use static && append-ldflags -static
# Do not let $ED mess up the search for `ed` 470210.
ac_cv_path_ED=$(type -P ed) \
econf \
$(use_enable xattr) \
--program-prefix="$(use userland_BSD && echo g)"
}

View File

@ -1,30 +0,0 @@
# Copyright 1999-2015 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Id$
EAPI=4
inherit flag-o-matic eutils
DESCRIPTION="Utility to apply diffs to files"
HOMEPAGE="https://www.gnu.org/software/patch/patch.html"
SRC_URI="mirror://gnu/patch/${P}.tar.xz"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris"
IUSE="static test xattr"
RDEPEND="xattr? ( sys-apps/attr )"
DEPEND="${RDEPEND}
test? ( sys-apps/ed )"
src_configure() {
use static && append-ldflags -static
# Do not let $ED mess up the search for `ed` 470210.
ac_cv_path_ED=$(type -P ed) \
econf \
$(use_enable xattr) \
--program-prefix="$(use userland_BSD && echo g)"
}

View File

@ -1,30 +0,0 @@
# Copyright 1999-2016 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Id$
EAPI=4
inherit flag-o-matic eutils
DESCRIPTION="Utility to apply diffs to files"
HOMEPAGE="https://www.gnu.org/software/patch/patch.html"
SRC_URI="mirror://gnu/patch/${P}.tar.xz"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris"
IUSE="static test xattr"
RDEPEND="xattr? ( sys-apps/attr )"
DEPEND="${RDEPEND}
test? ( sys-apps/ed )"
src_configure() {
use static && append-ldflags -static
# Do not let $ED mess up the search for `ed` 470210.
ac_cv_path_ED=$(type -P ed) \
econf \
$(use_enable xattr) \
--program-prefix="$(use userland_BSD && echo g)"
}

View File

@ -0,0 +1,40 @@
# Copyright 1999-2019 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI="6"
inherit flag-o-matic
DESCRIPTION="Utility to apply diffs to files"
HOMEPAGE="https://www.gnu.org/software/patch/patch.html"
SRC_URI="mirror://gnu/patch/${P}.tar.xz"
LICENSE="GPL-3+"
SLOT="0"
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~x64-cygwin ~amd64-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris"
IUSE="static test xattr"
RDEPEND="xattr? ( sys-apps/attr )"
DEPEND="${RDEPEND}
test? ( sys-apps/ed )"
PATCHES=(
"${FILESDIR}"/${P}-fix-test-suite.patch
"${FILESDIR}"/${PN}-2.7.6-fix-error-handling-with-git-style-patches.patch
"${FILESDIR}"/${PN}-2.7.6-CVE-2018-6951.patch
"${FILESDIR}"/${PN}-2.7.6-allow-input-files-to-be-missing-for-ed-style-patches.patch
"${FILESDIR}"/${PN}-2.7.6-CVE-2018-1000156.patch
"${FILESDIR}"/${PN}-2.7.6-CVE-2018-6952.patch
)
src_configure() {
use static && append-ldflags -static
local myeconfargs=(
$(use_enable xattr)
--program-prefix="$(use userland_BSD && echo g)"
)
# Do not let $ED mess up the search for `ed` 470210.
ac_cv_path_ED=$(type -P ed) \
econf "${myeconfargs[@]}"
}

View File

@ -1,4 +1 @@
DIST libseccomp-2.3.0.tar.gz 546948 BLAKE2B 084ad3b0dd9833a5439ab4cfcf3ecf3bfa4f4943a20c249f02229fcfbc60024de18b1593235dd14fa5701d5ab53f29518b5d2fcb39b2b0054b1172238e8a2536 SHA512 398643af0920ff446b37a74e48f7a96ad2bec4f514e92fc6f8242b7515dcb8f5d06c2894790b22f62387c2d9b75efd54a4d5944f973239a05f06ec840f2a5a0b DIST libseccomp-2.4.0.tar.gz 604987 BLAKE2B 2dd84f2c08d40a61dfe4fdc47a9dcdad2701e2918cdcdeae2d15a66eb114221866121bab11a8292f3bd31493b6cd7b370d0728976cb1bbfd0dbb9e32127b9045 SHA512 daa4a32c6c2b2f39aa9db1a4606619f9faeffcd2fca00c25ac5cf95d0405639ec21203293be7c8341317a05b18fd9f603a201544457cac91bf034a0bbd4dfc88
DIST libseccomp-2.3.1.tar.gz 552299 BLAKE2B 24460f29dff3bbbef809fb82c2ee58deb1b659ae236d369c554212dbfb8a27497bc44dc27fc76ad0eed6d1f9c50c52f05e52ce7f4996aa6dbbe3c0d960edae17 SHA512 246b30e1c513d5e1fa35a47905d99036e276c1e6483a96f3e79ddca536a8c6f641c11bf324ed10c9c8d18fa27d73667c9c72fc7459f827d2883926769ac1cb45
DIST libseccomp-2.3.2.tar.gz 559238 BLAKE2B 0040ad977431ae9731dadcae11b0099d3ec788462f89cdf80c77b71405ce02c122c3859836aaa9469ec7112b0bf32cc87c9b102bb3e8b2e669ded54677db64d1 SHA512 0864a53ba2be61d0207f7361af94bcda4acff84a1814f915e6ccb19ab24f6ccc978da0eedc5cee047fa655dc1a583e2eeb7ab985ebfc77491c6a2606727b79ec
DIST libseccomp-2.3.3.tar.gz 564546 BLAKE2B b5249379baf07ab2fef8a8659a30c9e87cbf05f99c38a07c1516948d2ede27d505f6670426f46422d2a927d7bfe97a33d8f871899ae9c30a26fbd10fba609df8 SHA512 845c7e0e916b5f5ad74da446ceff3250148b745c909185f6d5059e807d1b42fa6b74f356cce2a396bff0d4c7a3120e7cdad98d490a97d549327c7693fe1918be

View File

@ -1,39 +0,0 @@
# Copyright 1999-2016 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# TODO: Add python support.
EAPI="5"
inherit eutils multilib-minimal
DESCRIPTION="high level interface to Linux seccomp filter"
HOMEPAGE="https://github.com/seccomp/libseccomp"
SRC_URI="https://github.com/seccomp/libseccomp/releases/download/v${PV}/${P}.tar.gz"
LICENSE="LGPL-2.1"
SLOT="0"
KEYWORDS="-* amd64 arm arm64 ~mips ppc ppc64 s390 x86"
IUSE="static-libs"
# We need newer kernel headers; we don't keep strict control of the exact
# version here, just be safe and pull in the latest stable ones. #551248
DEPEND=">=sys-kernel/linux-headers-4.3"
src_prepare() {
sed -i \
-e '/_LDFLAGS/s:-static::' \
tools/Makefile.in || die
}
multilib_src_configure() {
ECONF_SOURCE=${S} \
econf \
$(use_enable static-libs static) \
--disable-python
}
multilib_src_install_all() {
find "${ED}" -name libseccomp.la -delete
einstalldocs
}

View File

@ -1,39 +0,0 @@
# Copyright 1999-2017 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# TODO: Add python support.
EAPI="5"
inherit eutils multilib-minimal
DESCRIPTION="high level interface to Linux seccomp filter"
HOMEPAGE="https://github.com/seccomp/libseccomp"
SRC_URI="https://github.com/seccomp/libseccomp/releases/download/v${PV}/${P}.tar.gz"
LICENSE="LGPL-2.1"
SLOT="0"
KEYWORDS="-* amd64 arm arm64 ~mips ppc ppc64 s390 x86"
IUSE="static-libs"
# We need newer kernel headers; we don't keep strict control of the exact
# version here, just be safe and pull in the latest stable ones. #551248
DEPEND=">=sys-kernel/linux-headers-4.3"
src_prepare() {
sed -i \
-e '/_LDFLAGS/s:-static::' \
tools/Makefile.in || die
}
multilib_src_configure() {
ECONF_SOURCE=${S} \
econf \
$(use_enable static-libs static) \
--disable-python
}
multilib_src_install_all() {
find "${ED}" -name libseccomp.la -delete
einstalldocs
}

View File

@ -1,39 +0,0 @@
# Copyright 1999-2018 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# TODO: Add python support.
EAPI="5"
inherit eutils multilib-minimal
DESCRIPTION="high level interface to Linux seccomp filter"
HOMEPAGE="https://github.com/seccomp/libseccomp"
SRC_URI="https://github.com/seccomp/libseccomp/releases/download/v${PV}/${P}.tar.gz"
LICENSE="LGPL-2.1"
SLOT="0"
KEYWORDS="-* ~amd64 ~arm ~arm64 ~mips ~ppc ~ppc64 ~s390 ~x86 ~amd64-linux"
IUSE="static-libs"
# We need newer kernel headers; we don't keep strict control of the exact
# version here, just be safe and pull in the latest stable ones. #551248
DEPEND=">=sys-kernel/linux-headers-4.3"
src_prepare() {
sed -i \
-e '/_LDFLAGS/s:-static::' \
tools/Makefile.in || die
}
multilib_src_configure() {
ECONF_SOURCE=${S} \
econf \
$(use_enable static-libs static) \
--disable-python
}
multilib_src_install_all() {
find "${ED}" -name libseccomp.la -delete
einstalldocs
}

View File

@ -1,11 +1,11 @@
# Copyright 1999-2016 Gentoo Foundation # Copyright 1999-2019 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2 # Distributed under the terms of the GNU General Public License v2
# TODO: Add python support. # TODO: Add python support.
EAPI="5" EAPI=6
inherit eutils multilib-minimal inherit multilib-minimal
DESCRIPTION="high level interface to Linux seccomp filter" DESCRIPTION="high level interface to Linux seccomp filter"
HOMEPAGE="https://github.com/seccomp/libseccomp" HOMEPAGE="https://github.com/seccomp/libseccomp"
@ -13,7 +13,7 @@ SRC_URI="https://github.com/seccomp/libseccomp/releases/download/v${PV}/${P}.tar
LICENSE="LGPL-2.1" LICENSE="LGPL-2.1"
SLOT="0" SLOT="0"
KEYWORDS="-* ~amd64 ~arm ~arm64 ~mips ~ppc ~ppc64 ~s390 ~x86" KEYWORDS="-* amd64 arm arm64 ~hppa ~mips ppc ppc64 s390 x86 ~amd64-linux ~x86-linux"
IUSE="static-libs" IUSE="static-libs"
# We need newer kernel headers; we don't keep strict control of the exact # We need newer kernel headers; we don't keep strict control of the exact
@ -21,16 +21,18 @@ IUSE="static-libs"
DEPEND=">=sys-kernel/linux-headers-4.3" DEPEND=">=sys-kernel/linux-headers-4.3"
src_prepare() { src_prepare() {
default
sed -i \ sed -i \
-e '/_LDFLAGS/s:-static::' \ -e '/_LDFLAGS/s:-static::' \
tools/Makefile.in || die tools/Makefile.in || die
} }
multilib_src_configure() { multilib_src_configure() {
ECONF_SOURCE=${S} \ local myeconfargs=(
econf \ $(use_enable static-libs static)
$(use_enable static-libs static) \
--disable-python --disable-python
)
ECONF_SOURCE="${S}" econf "${myeconfargs[@]}"
} }
multilib_src_install_all() { multilib_src_install_all() {

View File

@ -1,7 +1,10 @@
<?xml version="1.0" encoding="UTF-8"?> <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> <!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata> <pkgmetadata>
<!-- maintainer-needed --> <maintainer type="project">
<email>base-system@gentoo.org</email>
<name>Gentoo Base System</name>
</maintainer>
<upstream> <upstream>
<remote-id type="github">seccomp/libseccomp</remote-id> <remote-id type="github">seccomp/libseccomp</remote-id>
<remote-id type="sourceforge">libseccomp</remote-id> <remote-id type="sourceforge">libseccomp</remote-id>