mirror of
https://github.com/flatcar/scripts.git
synced 2025-12-06 09:52:14 +01:00
commit
ee7a21794d
4
sdk_container/src/third_party/portage-stable/app-text/manpager/Manifest
vendored
Normal file
4
sdk_container/src/third_party/portage-stable/app-text/manpager/Manifest
vendored
Normal file
@ -0,0 +1,4 @@
|
||||
AUX manpager.c 1809 SHA256 bb90bcb9d2efff5db0957b56fdb20bf97ac1aacfe4f71989833dcfa34704c620 SHA512 4f827429dc46993010d0096cb352920dfdcaf2cc97bf10e2155dfea3fda601c011467be65ca3f2e3f5c44cb26de0fd9eb58f7d875f75fd5f1db4b2c6cdabdca2 WHIRLPOOL bb26d082896f41de845fcbe9b5d660b28a14f8afad4f9c266d5fbc04c967858ab72d3b95569cac29e4cd12278ddb6e9589b5fb8d18d157632d6d5adb17e874a8
|
||||
EBUILD manpager-1.ebuild 645 SHA256 ffb747a26a5068eaff117254b1e74a1bac4829f65aab71d73460fa3aca32655b SHA512 67d6377beeb04b161406042b0088a46355014daee05cfce125da2ca00deb1ae70b4d6c1714f26014a25215cdca61810e79bd0dad162b08618330604d8b563d7e WHIRLPOOL 49884adade6e5061dba8c9ec5b4ab31bea30ca9ef38005f2a9964a4929b8051f1116b4d2a0aa1e82fb65ce40a997232b9195933db9e5af8e960c3f1a8c98955d
|
||||
MISC ChangeLog 970 SHA256 476449bcf02927a7044880a4a6760b066e42e9e43d85aa0b7818f4678cac352d SHA512 bda470cedb820caa752f5e40b3ea12ee4dff162591cd443799fdc0df24153c1ead03f5dfefda32a8d22f0b4ac55cb0a8c9d2ebb0c682a500f872956582ee6eee WHIRLPOOL 8db067486f23494239da80bff8a3435caae3eb803f2ebc666103da3e065decd961aebaa2d81384f5bab234d8cfd9a4030e6cd60e222f2a69cf0900c81986e7e1
|
||||
MISC metadata.xml 253 SHA256 d82c33ef453113a5c1ebe250dcba373c22934a69b0a86c6ab15a5ca589c25b91 SHA512 54a9069aeb4165d2dff3d473c8001bc51613aac9dff3f7f5e9971a9891a737a31511ffa11cbd523febe581ac1d9de2bdf2f40410f0c4239138f2ccca3ef15555 WHIRLPOOL e5aee23acff864609953a1e4de768f0e4aef704b44c53c021f28573e1ca5c99f1a46d92935ecec2449f7b4419a36d8373127d0ecfa8d7bae72d835e1839eb3f8
|
||||
74
sdk_container/src/third_party/portage-stable/app-text/manpager/files/manpager.c
vendored
Normal file
74
sdk_container/src/third_party/portage-stable/app-text/manpager/files/manpager.c
vendored
Normal file
@ -0,0 +1,74 @@
|
||||
/*
|
||||
* Wrapper to help enable colorized man page output.
|
||||
* Only works with PAGER=less
|
||||
*
|
||||
* https://bugs.gentoo.org/184604
|
||||
* https://unix.stackexchange.com/questions/108699/documentation-on-less-termcap-variables
|
||||
*
|
||||
* Copyright 2003-2015 Gentoo Foundation
|
||||
* Distributed under the terms of the GNU General Public License v2
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
|
||||
#define COLOR(c, b) "\e[" #c ";" #b "m"
|
||||
|
||||
#define _SE(termcap, col) setenv("LESS_TERMCAP_" #termcap, col, 0)
|
||||
#define SE(termcap, c, b) _SE(termcap, COLOR(c, b))
|
||||
|
||||
static int usage(void)
|
||||
{
|
||||
puts(
|
||||
"manpager: display man pages with color!\n"
|
||||
"\n"
|
||||
"Usage:\n"
|
||||
"\texport MANPAGER=manpager\n"
|
||||
"\tman man\n"
|
||||
"\n"
|
||||
"To control the colorization, set these env vars:\n"
|
||||
"\tLESS_TERMCAP_mb - start blinking\n"
|
||||
"\tLESS_TERMCAP_md - start bolding\n"
|
||||
"\tLESS_TERMCAP_me - stop bolding\n"
|
||||
"\tLESS_TERMCAP_us - start underlining\n"
|
||||
"\tLESS_TERMCAP_ue - stop underlining\n"
|
||||
"\tLESS_TERMCAP_so - start standout (reverse video)\n"
|
||||
"\tLESS_TERMCAP_se - stop standout (reverse video)\n"
|
||||
"\n"
|
||||
"You can do so by doing:\n"
|
||||
"\texport LESS_TERMCAP_md=\"$(printf '\\e[1;36m')\"\n"
|
||||
"\n"
|
||||
"Run 'less --help' or 'man less' for more info"
|
||||
);
|
||||
return 0;
|
||||
}
|
||||
|
||||
int main(int argc, char *argv[])
|
||||
{
|
||||
if (argc == 2 && (!strcmp(argv[1], "-h") || !strcmp(argv[1], "--help")))
|
||||
return usage();
|
||||
|
||||
/* Blinking. */
|
||||
SE(mb, 5, 31); /* Start. */
|
||||
|
||||
/* Bolding. */
|
||||
SE(md, 1, 34); /* Start. */
|
||||
SE(me, 0, 0); /* Stop. */
|
||||
|
||||
/* Underlining. */
|
||||
SE(us, 4, 36); /* Start. */
|
||||
SE(ue, 0, 0); /* Stop. */
|
||||
|
||||
#if 0
|
||||
/* Standout (reverse video). */
|
||||
SE(so, 1, 32); /* Start. */
|
||||
SE(se, 0, 0); /* Stop. */
|
||||
#endif
|
||||
|
||||
argv[0] = getenv("PAGER") ? : "less";
|
||||
execvp(argv[0], argv);
|
||||
perror("could not launch PAGER");
|
||||
return 1;
|
||||
}
|
||||
31
sdk_container/src/third_party/portage-stable/app-text/manpager/manpager-1.ebuild
vendored
Normal file
31
sdk_container/src/third_party/portage-stable/app-text/manpager/manpager-1.ebuild
vendored
Normal file
@ -0,0 +1,31 @@
|
||||
# Copyright 1999-2016 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
|
||||
EAPI="5"
|
||||
|
||||
inherit toolchain-funcs
|
||||
|
||||
DESCRIPTION="Enable colorization of man pages"
|
||||
HOMEPAGE="http://www.gentoo.org/"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-linux ~arm-linux ~x86-linux"
|
||||
IUSE=""
|
||||
|
||||
S=${WORKDIR}
|
||||
|
||||
src_compile() {
|
||||
local cmd=(
|
||||
$(tc-getCC) ${CFLAGS} ${CPPFLAGS} ${LDFLAGS}
|
||||
"${FILESDIR}"/manpager.c -o ${PN}
|
||||
)
|
||||
echo "${cmd[@]}"
|
||||
"${cmd[@]}" || die
|
||||
}
|
||||
|
||||
src_install() {
|
||||
dobin ${PN}
|
||||
insinto /etc/env.d
|
||||
echo "MANPAGER=manpager" | newins - 00manpager
|
||||
}
|
||||
8
sdk_container/src/third_party/portage-stable/app-text/manpager/metadata.xml
vendored
Normal file
8
sdk_container/src/third_party/portage-stable/app-text/manpager/metadata.xml
vendored
Normal file
@ -0,0 +1,8 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
|
||||
<pkgmetadata>
|
||||
<maintainer type="project">
|
||||
<email>base-system@gentoo.org</email>
|
||||
<name>Gentoo Base System</name>
|
||||
</maintainer>
|
||||
</pkgmetadata>
|
||||
@ -1,248 +0,0 @@
|
||||
# ChangeLog for dev-libs/libpipeline
|
||||
# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/dev-libs/libpipeline/ChangeLog,v 1.73 2015/02/28 14:03:35 ago Exp $
|
||||
|
||||
28 Feb 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
|
||||
Stable for ia64, wrt bug #535118
|
||||
|
||||
27 Feb 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
|
||||
Stable for sparc, wrt bug #535118
|
||||
|
||||
24 Feb 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
|
||||
Stable for alpha, wrt bug #535118
|
||||
|
||||
26 Jan 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
|
||||
Stable for x86, wrt bug #535118
|
||||
|
||||
18 Jan 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
|
||||
Stable for ppc64, wrt bug #535118
|
||||
|
||||
17 Jan 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
|
||||
Stable for ppc, wrt bug #535118
|
||||
|
||||
09 Jan 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
|
||||
Stable for amd64, wrt bug #535118
|
||||
|
||||
08 Jan 2015; Jeroen Roovers <jer@gentoo.org> libpipeline-1.4.0.ebuild:
|
||||
Stable for HPPA (bug #535118).
|
||||
|
||||
08 Jan 2015; Markus Meier <maekke@gentoo.org> libpipeline-1.4.0.ebuild:
|
||||
arm stable, bug #535118
|
||||
|
||||
27 Oct 2014; Mike Frysinger <vapier@gentoo.org> libpipeline-1.2.5.ebuild:
|
||||
Mark arm64/m68k/s390/sh stable.
|
||||
|
||||
*libpipeline-1.4.0 (26 Oct 2014)
|
||||
|
||||
26 Oct 2014; Tim Harder <radhermit@gentoo.org> +libpipeline-1.4.0.ebuild:
|
||||
Version bump.
|
||||
|
||||
*libpipeline-1.3.1 (23 Sep 2014)
|
||||
|
||||
23 Sep 2014; Tim Harder <radhermit@gentoo.org> +libpipeline-1.3.1.ebuild:
|
||||
Version bump.
|
||||
|
||||
17 May 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.5.ebuild:
|
||||
Stable for alpha, wrt bug #502722
|
||||
|
||||
14 May 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.5.ebuild:
|
||||
Stable for sparc, wrt bug #502722
|
||||
|
||||
13 May 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.5.ebuild:
|
||||
Stable for ia64, wrt bug #502722
|
||||
|
||||
20 Apr 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.5.ebuild:
|
||||
Stable for ppc64, wrt bug #502722
|
||||
|
||||
13 Apr 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.5.ebuild:
|
||||
Stable for ppc, wrt bug #502722
|
||||
|
||||
05 Apr 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.5.ebuild:
|
||||
Stable for x86, wrt bug #502722
|
||||
|
||||
28 Mar 2014; Tim Harder <radhermit@gentoo.org> -libpipeline-1.1.0.ebuild,
|
||||
-libpipeline-1.2.0.ebuild, -libpipeline-1.2.1.ebuild,
|
||||
-libpipeline-1.2.2.ebuild, -libpipeline-1.2.3.ebuild:
|
||||
Remove old.
|
||||
|
||||
*libpipeline-1.3.0 (28 Mar 2014)
|
||||
|
||||
28 Mar 2014; Tim Harder <radhermit@gentoo.org> +libpipeline-1.3.0.ebuild:
|
||||
Version bump.
|
||||
|
||||
26 Mar 2014; Chema Alonso <nimiux@gentoo.org> libpipeline-1.2.5.ebuild:
|
||||
Stable for amd64 wrt bug #502722
|
||||
|
||||
16 Mar 2014; Markus Meier <maekke@gentoo.org> libpipeline-1.2.5.ebuild:
|
||||
arm stable, bug #502722
|
||||
|
||||
16 Mar 2014; Jeroen Roovers <jer@gentoo.org> libpipeline-1.2.5.ebuild:
|
||||
Stable for HPPA (bug #502722).
|
||||
|
||||
18 Jan 2014; Mike Frysinger <vapier@gentoo.org> libpipeline-1.2.4.ebuild,
|
||||
libpipeline-1.2.5.ebuild:
|
||||
Add arm64 love.
|
||||
|
||||
16 Jan 2014; Mike Frysinger <vapier@gentoo.org> libpipeline-1.2.4.ebuild:
|
||||
Mark m68k/s390/sh stable.
|
||||
|
||||
15 Jan 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.4.ebuild:
|
||||
Stable for ia64, wrt bug #492044
|
||||
|
||||
03 Jan 2014; Matt Turner <mattst88@gentoo.org> libpipeline-1.2.4.ebuild:
|
||||
alpha stable, bug 492044.
|
||||
|
||||
24 Dec 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.4.ebuild:
|
||||
Stable for x86, wrt bug #492044
|
||||
|
||||
23 Dec 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.4.ebuild:
|
||||
Stable for sparc, wrt bug #492044
|
||||
|
||||
22 Dec 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.4.ebuild:
|
||||
Stable for ppc64, wrt bug #492044
|
||||
|
||||
21 Dec 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.4.ebuild:
|
||||
Stable for ppc, wrt bug #492044
|
||||
|
||||
*libpipeline-1.2.5 (21 Dec 2013)
|
||||
|
||||
21 Dec 2013; Tim Harder <radhermit@gentoo.org> +libpipeline-1.2.5.ebuild:
|
||||
Version bump.
|
||||
|
||||
20 Dec 2013; Chema Alonso <nimiux@gentoo.org> libpipeline-1.2.4.ebuild:
|
||||
Stable for amd64 wrt bug #492044
|
||||
|
||||
01 Dec 2013; Markus Meier <maekke@gentoo.org> libpipeline-1.2.4.ebuild:
|
||||
arm stable, bug #492044
|
||||
|
||||
26 Nov 2013; Jeroen Roovers <jer@gentoo.org> libpipeline-1.2.4.ebuild:
|
||||
Stable for HPPA (bug #492044).
|
||||
|
||||
02 Jul 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
|
||||
Stable for sh, wrt bug #473242
|
||||
|
||||
30 Jun 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
|
||||
Stable for s390, wrt bug #473242
|
||||
|
||||
29 Jun 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
|
||||
Stable for sparc, wrt bug #473242
|
||||
|
||||
26 Jun 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
|
||||
Stable for ia64, wrt bug #473242
|
||||
|
||||
26 Jun 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
|
||||
Stable for alpha, wrt bug #473242
|
||||
|
||||
25 Jun 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
|
||||
Stable for ppc64, wrt bug #473242
|
||||
|
||||
24 Jun 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
|
||||
Stable for ppc, wrt bug #473242
|
||||
|
||||
14 Jun 2013; Jeroen Roovers <jer@gentoo.org> libpipeline-1.2.3.ebuild:
|
||||
Stable for HPPA (bug #473242).
|
||||
|
||||
14 Jun 2013; Sergey Popov <pinkbyte@gentoo.org> libpipeline-1.2.3.ebuild:
|
||||
Stable on arm, wrt bug #473242
|
||||
|
||||
14 Jun 2013; Sergey Popov <pinkbyte@gentoo.org> libpipeline-1.2.3.ebuild:
|
||||
Stable on amd64 and x86, wrt bug #473242
|
||||
|
||||
*libpipeline-1.2.4 (14 Jun 2013)
|
||||
|
||||
14 Jun 2013; Tim Harder <radhermit@gentoo.org> +libpipeline-1.2.4.ebuild:
|
||||
Version bump.
|
||||
|
||||
*libpipeline-1.2.3 (10 May 2013)
|
||||
|
||||
10 May 2013; Tim Harder <radhermit@gentoo.org> +libpipeline-1.2.3.ebuild:
|
||||
Version bump.
|
||||
|
||||
09 Apr 2013; Sergey Popov <pinkbyte@gentoo.org> libpipeline-1.2.2.ebuild:
|
||||
Add ~amd64-linux keyword
|
||||
|
||||
24 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
|
||||
Stable for sh, wrt bug #455026
|
||||
|
||||
21 Feb 2013; Zac Medico <zmedico@gentoo.org> libpipeline-1.2.2.ebuild:
|
||||
Add ~arm-linux and ~x86-linux keywords.
|
||||
|
||||
20 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
|
||||
Stable for s390, wrt bug #455026
|
||||
|
||||
10 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
|
||||
Stable for ppc64, wrt bug #455026
|
||||
|
||||
08 Feb 2013; Jeroen Roovers <jer@gentoo.org> libpipeline-1.2.2.ebuild:
|
||||
Stable for HPPA (bug #455026).
|
||||
|
||||
06 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
|
||||
Stable for sparc, wrt bug #455026
|
||||
|
||||
04 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
|
||||
Stable for alpha, wrt bug #455026
|
||||
|
||||
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
|
||||
Stable for ia64, wrt bug #455026
|
||||
|
||||
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
|
||||
Stable for arm, wrt bug #455026
|
||||
|
||||
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
|
||||
Stable for ppc, wrt bug #455026
|
||||
|
||||
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
|
||||
Stable for x86, wrt bug #455026
|
||||
|
||||
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
|
||||
Stable for amd64, wrt bug #455026
|
||||
|
||||
*libpipeline-1.2.2 (23 Oct 2012)
|
||||
|
||||
23 Oct 2012; Tim Harder <radhermit@gentoo.org> +libpipeline-1.2.2.ebuild:
|
||||
Version bump.
|
||||
|
||||
19 Jul 2012; Mike Frysinger <vapier@gentoo.org>
|
||||
+files/libpipeline-1.2.1-no-gets.patch, libpipeline-1.2.1.ebuild:
|
||||
Fix building with glibc-2.16 #427254 by Oschtan.
|
||||
|
||||
14 Jul 2012; Naohiro Aota <naota@gentoo.org> libpipeline-1.2.1.ebuild:
|
||||
Add ~x86-fbsd. #244517
|
||||
|
||||
04 May 2012; Jeff Horelick <jdhore@gentoo.org> libpipeline-1.1.0.ebuild,
|
||||
libpipeline-1.2.0.ebuild, libpipeline-1.2.1.ebuild:
|
||||
dev-util/pkgconfig -> virtual/pkgconfig
|
||||
|
||||
*libpipeline-1.2.1 (23 Mar 2012)
|
||||
|
||||
23 Mar 2012; Tim Harder <radhermit@gentoo.org> +libpipeline-1.2.1.ebuild:
|
||||
Version bump. Update to EAPI 4.
|
||||
|
||||
09 Jul 2011; Kacper Kowalik <xarthisius@gentoo.org> libpipeline-1.2.0.ebuild:
|
||||
Marked ~ppc64 wrt #371687
|
||||
|
||||
09 Jul 2011; Raúl Porcel <armin76@gentoo.org> libpipeline-1.2.0.ebuild:
|
||||
Add ~alpha/~ia64/~m68k/~s390/~sh/~sparc wrt #372785
|
||||
|
||||
23 Jun 2011; Brent Baude <ranger@gentoo.org> libpipeline-1.2.0.ebuild:
|
||||
Marking libpipeline-1.2.0 ~ppc for bug 371687
|
||||
|
||||
19 Jun 2011; Markus Meier <maekke@gentoo.org> libpipeline-1.2.0.ebuild:
|
||||
add ~arm, bug #371687
|
||||
|
||||
15 Jun 2011; Matt Turner <mattst88@gentoo.org> libpipeline-1.2.0.ebuild:
|
||||
Added ~mips, bug 371687
|
||||
|
||||
15 Jun 2011; Jeroen Roovers <jer@gentoo.org> libpipeline-1.2.0.ebuild:
|
||||
Marked ~hppa (bug #371687).
|
||||
|
||||
*libpipeline-1.2.0 (20 Mar 2011)
|
||||
|
||||
20 Mar 2011; Mike Frysinger <vapier@gentoo.org> +libpipeline-1.2.0.ebuild:
|
||||
Version bump #359577 by Colin Watson.
|
||||
|
||||
*libpipeline-1.1.0 (26 Dec 2010)
|
||||
|
||||
26 Dec 2010; Samuli Suominen <ssuominen@gentoo.org>
|
||||
+libpipeline-1.1.0.ebuild:
|
||||
Initial commit wrt #349603 by Colin Watson.
|
||||
@ -1,33 +1,13 @@
|
||||
-----BEGIN PGP SIGNED MESSAGE-----
|
||||
Hash: SHA256
|
||||
|
||||
AUX libpipeline-1.2.1-no-gets.patch 858 SHA256 cb126a74ba7d4b48d7317e8464bdf82aaa64a49ed46f37242f9500ce1449ae9b SHA512 2fc14833a9d31bd551c7df3b469a5317f2c11be2b8a01e75499593a585d6461d41ebd4cb0751e84c9c43def9878c2a01d9c97f650270a844a87be019adc48fb0 WHIRLPOOL f00d0e365f16d6322b3035c05616d6e27fb0c5a678aa937fb306fdd992efbbff397461156d4e853007a0d60ef3fa83a0f9f9f7fbbe2cf2e0fbb8405685051b64
|
||||
DIST libpipeline-1.2.4.tar.gz 764100 SHA256 091ad4ea5c66e91d78e436e0e7673b46b3c5c5f333a14a1298db4bc7bab87b35 SHA512 56d8331f7a7db47fc87f6958a701256b10cdf2444fe1f001945b6ad6b74ffd6e6884db50e3d64d43b7bd8019288393238b03f13cb44aaee8b070d0bf7d874a6b WHIRLPOOL eeda2521059f7e79625eadf17598c4a418da5f8ebcc1b757616cb11724cf2b77ee8ff6a8dbd87fb646d237272bd5edaf7cdc77c72e97741852323b37920818e2
|
||||
AUX libpipeline-1.4.1-gnulib-cygwin-sys_select.patch 850 SHA256 122a069e24ed07bab7a65ea31f10e14f755a1a464acb9568dc610f171b94b0a8 SHA512 1aaac731af050193a67a45aae7c100e8a6c4e5328b60b2e6f89ef774f66b6d997a1558b104157f65183191c9940c9d4a904f8b32666021ae20dff6b3e5726990 WHIRLPOOL befcfb16d080bcce5247705a32b82cca6af4ad5b1a6bd7e143b1eb6d901e4b3c625088f9b741abf2bd4785f37eb1a710f4897ce8f12053abdb84939d84c1658a
|
||||
AUX libpipeline-1.4.1-gnulib-darwin-program_name.patch 683 SHA256 05d93f6ef8e1a94de0739292b9c8d36e14bd29fde83106fbf683fbd7154ac715 SHA512 630d39e2c820935374807f6524ff4ffb0c4b46e7df3b765ca4c794d9fb3cab5882d904bd438ea9351e46e1d66f66c8d3bfb0e376fe24a3b20c8f18f36c47efb8 WHIRLPOOL f67270f796074d8af1b0dd1ce3b1918c7df532c8b72a4ea87986c34d776978f3b53501e874a5e27dc5ebc18ae0c260fe2075a4aec3c6cd74c76ee6d2c6b319e2
|
||||
DIST libpipeline-1.2.5.tar.gz 779072 SHA256 2de10806d9b7dda54f4098d2c12e36e960b954d1325c0885ac01c3c7ee908d5b SHA512 fd6ec96bd78f921a43e6b8fbb0e8ffd4a2bba35fe87a95dbd98e8b83d04fe2fbe34c4b4a008ca027b683d071f0730f8057d3b9aa2d946f2f7808486f16d97b01 WHIRLPOOL 4a600569d651d41abc4c15984edd11198d85bc67d61431aa87dd1d0e9311de2b4f86cc2f1186b359ed2f34b2e7e95261ed2033f24100697c088ead9508d4120a
|
||||
DIST libpipeline-1.3.0.tar.gz 786909 SHA256 f1fcd13e4bb39fec013c2f02bc3c686580f34eda432c31d0b662cf2359a3a689 SHA512 32bfc4a6ee62edc4fe75f5a31e4c295ede39f8840b0de9954d9213d8c0d39b701cd8af76a36c2d3fcd1479207c7f077cb64692d2f31fadf413a2adb8ffadd965 WHIRLPOOL 8eac41095756858749667a7f04cbb07a7737918fb9fac8dc9ce3099aa3d0d602a678c39f18e4de02136233a34ba02bae40d00eba70e1782fed238f6aedaa4d60
|
||||
DIST libpipeline-1.3.1.tar.gz 787711 SHA256 5cad1b446f135ec3800d32c8c951a1114f4c438609a4c52b262c30301bc8e692 SHA512 0f903f9a268eea7c6d1ddef1210a729d32b423abdbf1e150aaf6705a272dfbcde482302cb06366ce317674bc681c7e3305cd35a83eb3f0451d1c5595f5c6ac5a WHIRLPOOL eb3fc4a337e09552f3e58a06bcbd9ed30d6b95a60b6cadc293e7aceb77a99e488c8c77a757dd93968a48b4fc72d024227fbe176d8ac7a386172bc50b51e54ef2
|
||||
DIST libpipeline-1.4.0.tar.gz 805155 SHA256 79c759e7fbf17b560a72edce3ff9bb308d7720306c2650e4fae541daabb89bb6 SHA512 0dce585f9d7aea91889804fd7a65a549b41730add0f6156bf8d0409762fed9c29e8843426e8136c9e0a0348734acaabb48ceede1e3e4d9071d4d787d0b8d46f3 WHIRLPOOL 2ba46823c6eacbe7b4a15d135448b2c59c65c431f438d22f1709bea85d819f4358fd685fab00d0e24cf281e92476b8c48aee61e7b406dcd8e142b2e4fa50bf86
|
||||
EBUILD libpipeline-1.2.4.ebuild 627 SHA256 c0f3cbae4f6e6bd38247999d07048064e7fa5d7c5d2cebd5a7221b26331826d0 SHA512 44fb3c5141ab548eedc413edb02f2d6e992f1e8f1edc522b5e1a36930f3f169b5866ff08525062497debc024bdbadf66c3c89064afc81b7875518d690e6f4131 WHIRLPOOL bee003a4d7bcf8d85bef0a7f5c2333eeda226db01d64b77b8e53c2bd413e6a6278a4ef39c5fb9cca8bf1f7b66ddbb5a7e23d2bea84d40832324503aa5af4df17
|
||||
EBUILD libpipeline-1.2.5.ebuild 627 SHA256 4534cf908274ee7d6634e0cc7ee66879e46c2a6529643338da2fb23e7c4dc21b SHA512 bc4f38f2cc18b25fc46baf86745c9d0691a1e376e0e85490236c6a827e6d097c8d2536ef5acb98b00d90cd3c45acb86204380c3bd108689f357a0f4949e9aa42 WHIRLPOOL ae354452d4d0c800c6b54ac33a8de90bed5061241d8202982e64e958483162534ef608271689a754c2be6c8de39abe9a20645c4db52713ece8e89b6f835eabd3
|
||||
EBUILD libpipeline-1.3.0.ebuild 642 SHA256 bca6ab99730920caab484fdf2e3ae7be520b997f1d4f6f0f94fa4bd34499cea0 SHA512 5e1efcb114235afa8d98339ecda242c9dee485f4408fc4cc35f9fa633e050bce14e135576377e9619574e09931fda760554a83decaa42c17ac931663875433bc WHIRLPOOL 35f35b3207ba754fc41f676efda53c8c5bac5e9dd20ddcd154c2f18bb0b162d0724b11d27f4bff066862049c9f29e2d4bdb037c0daa96ee529c3f9a3cd2cece2
|
||||
EBUILD libpipeline-1.3.1.ebuild 642 SHA256 332cc65a2b748a2f39967e13e8c52d5aad88b4618a7329634bfe83f3d10da808 SHA512 404e5a25490c22367e8a315131b617fa213a69d709be75799b59dc825ed4daabdaf6da8d50607616197b45e079ce664152080332ff46c3d2f40be84e4712e1d6 WHIRLPOOL b05ff80528a4f27be9fdef866c33cac4082a5a2db85bd5179bddefa78cad56984dce23b16e55483547369ddfae3bb566d831ea75ca7482dfd751b1968154c866
|
||||
EBUILD libpipeline-1.4.0.ebuild 628 SHA256 bded3520dd0391ca54e0cab07e9eae113516f1dd0b1bc49bb39e20e6b424b009 SHA512 30519a4dfafef14fb7a873e4937a1cbd9eb953b126866c53e6b7e4da5ae314db4a1352b87bdea4a25bc6783b438dc954a02926b1e75c8d4c80456e69cdcd6ada WHIRLPOOL 18fbceb02490cab1cd64991e2b27ad4e2824d37fe35b3c43e75649cfd25432e619f9edf205232a0b11dc0f685f2ed8bb18cead29cab8022f7783a422d990af95
|
||||
MISC ChangeLog 8708 SHA256 75350c89d81c9f391c877bcccd317a7f7823fc2b838c3e966f0ffa8b1e4abcb1 SHA512 64ffa5162c6818f069207d3a85d1ff6ab27aa3289704226d821a5639f8ef5b7108a661fee75392c055160cf840e3c7796f11bd05fe807632af504979e80516ae WHIRLPOOL e5f07a1f1be5a3216caaeab99041466e2bbda8629817a393bcf9a20137cc90fb902ec9bd1d1f21b47e767ae19320c66b497198fa0a0fb973303042d2eae9a48d
|
||||
MISC metadata.xml 164 SHA256 f5f2891f2a4791cd31350bb2bb572131ad7235cd0eeb124c9912c187ac10ce92 SHA512 8eb0d5153d388f6ea069c64b93882244816a0a09aecc0d73cb872121ce0eb24c5ccafa96aad0b620b2300f319e1af101fa7fa6c5d0d561719d49bb07da0a2eca WHIRLPOOL 11a1441bddb7a6c69653c663902b7da5767ae6ad515ac2aabfc42fe37927a1ccc21472deeee454009ff720201a41c3e4a912df42661a0a87150fb46126da2d52
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
Version: GnuPG v2
|
||||
|
||||
iQIcBAEBCAAGBQJU8cq4AAoJELp701BxlEWfBoIQAMfUR0MzvB9odDAMvxLl5TEX
|
||||
oWmaZ2F/8vo3MZ+qnFkJnUx0gS6aOb0Tv8DXl+Bh0Qu3zStjqviP6xMNsxshjVAq
|
||||
wcsJezkbGKUp4gk8FokPE0bE6jS7czIUnYaTRTv+fpxk5Q7HPyvtjU0BHL9G2x+c
|
||||
YVnCNL4YVIm7ZHCnXkf68VZlKsO7BTUcero8lcwI5QrzAA+HXpM8/M5bBKfXk296
|
||||
0l1vYBmM/koKzyzIEvDSI0/8KZGqwig+RG8maiJDx2qt79N+mH/2k3lKPNc2c3/s
|
||||
O5ijWcL2/+nsznZecMq4W6g0beBA1ia6xgg2m8RYishy8Cl3QJrdM7jl7FVLXjAd
|
||||
fSkVeL400tgZmn6Mk2NUJhiF0BuiRSu6lIpIQL++hOBhBtQ3BGvAyAMwXvkYM93V
|
||||
uJou1OrQYqWtJMRu5W5wNa9mu+nxcJte6HKS2cE6DMY2/f5rzM8hncY/MnBM7JpP
|
||||
Hbm1RgNT4eejOXpVlUAqzjACWgf+67frQdtI4/xmEhXIUpeX/Nr4DdbiuMZsyDU0
|
||||
tMR+wOwQokVoKP3ftXB98wBGaXvSgvHVRYi3cmiAY//wOMAQfEM3YfgGN+5eJunI
|
||||
2hidssJ8tnWVY2YoK9xz8j01V/toLwrGchX6Ma1ugj/UJkw9lwEf6mNyiCmAGmk9
|
||||
VUBjphKKjiy3+CW5bveZ
|
||||
=USme
|
||||
-----END PGP SIGNATURE-----
|
||||
DIST libpipeline-1.4.1.tar.gz 805172 SHA256 da46d7b20163aadb9db2faae483f734e9096a7550c84b94029abeab62dd1b9ee SHA512 835d65aa3f9436398b5421544ca7857fe9caed52cd2e70320ea04d6315825e648df930e1c225d4aaf0f2edda2a438f6c00f15c556fb9fd30311560fb8d966797 WHIRLPOOL 1b6688f0388489f015a95397ec6ad34338654bd40c05bc15f30cdbf2e4ad5b1fd53d20f56a6763d398562f39986abf6675236395215bc5819573162eedf17de0
|
||||
EBUILD libpipeline-1.2.5.ebuild 506 SHA256 da18cc4b0cc3d8a8e808c22ee4c951e516222c878ee73d1fe5ef96fe33b2e60a SHA512 8ea347a009b2cb2cb8dfb8b680f267cdf028377cd5dac15460da865c8610820dcab3a665df38b592ddc6697f35183e9fefb9de72183e86b79d89fd2aa4670373 WHIRLPOOL 22a553312c59608dd7f6db2d1b194e3699aa0fb735c75eed8ac93fc2b0f2c248212c78a318b8545a66d895426606efbeb1a0a7dd9fd0e4996566a64cf6872dac
|
||||
EBUILD libpipeline-1.3.1.ebuild 519 SHA256 e5123b196b6547340a3d95e2bce0142bcef2efc18eb88c2bc72ffe0b072b1432 SHA512 10e8bc4953caaf1fdb0995dc3a339288b9a91dcf180b8a33db79a7a923a13923c071679116f85223a3ee7a1c0d877ab574e2c055dba86d4a4e8e75da26b212f5 WHIRLPOOL 48e099651025c0607f5a234f0a49e1e1226abf0c196c0ce0dc36410e3a2d3289e2624869fe0f58f8dfa32973df751a3fe2f9f8992af7400e9c7a19843bd1d7bd
|
||||
EBUILD libpipeline-1.4.0.ebuild 506 SHA256 235bd9255cecabe6f67cc108ae5b6a2916f6d132fdea2cc1ca5c503105e2ad44 SHA512 9215eda7625f54b82d9efc9c4aeb1246f333d4bc9297939fc6d325c933d919c8c0bc5b570669e0c3b16e74f20883dcb37c96925f4350fe5a49fb435c8e500107 WHIRLPOOL 983c8c8d9065bef771169a3b0671fafc5a821ff53d91bdb6ebc83fa072ec9431f1e1150397c1a4dcbe2c6bc41f31dd80708e78cf427404c6c4447d6de1417826
|
||||
EBUILD libpipeline-1.4.1.ebuild 669 SHA256 e9c4168ec8a80efe78be07d7db6d8b1f503964376a21b30fea828473815c6731 SHA512 ac7f8dc76a8ce2e3dee906022ba3cf57d9a22357b769ebce11d8ca2cfdbc98c665b16722866e6284636f5cb1b7ed4e8bf9e16d8a0d1ca39b8a44083b3444f909 WHIRLPOOL 89f08c30cb17e858f2be1d05df58586bd37533b3c0e35106c386b47792fc694111d589ec8baf74145ed1fc1da44a809b80fa1e6f4ac7815eea5f40ec72fd3029
|
||||
MISC ChangeLog 3739 SHA256 d0d8f953943ede61da2d781cce85f252dc469e003556bd0a6a11ad9df84740b2 SHA512 9ce074852a2a8962d830ac82f726dc127b460bd19295ba4a1d614c1b1532aed6128a9d6d44e2ab435ec5968a51239f47a358307abd21ec3cd2735bbb41ba433c WHIRLPOOL e973678d829fe13040f3eb3473380ed72af1c240fbf062e5a900375f51bc59392035ed2c4f6458651eb1f5cdac0451cd8ead47151549439201cbfb609f73998c
|
||||
MISC ChangeLog-2015 8708 SHA256 75350c89d81c9f391c877bcccd317a7f7823fc2b838c3e966f0ffa8b1e4abcb1 SHA512 64ffa5162c6818f069207d3a85d1ff6ab27aa3289704226d821a5639f8ef5b7108a661fee75392c055160cf840e3c7796f11bd05fe807632af504979e80516ae WHIRLPOOL e5f07a1f1be5a3216caaeab99041466e2bbda8629817a393bcf9a20137cc90fb902ec9bd1d1f21b47e767ae19320c66b497198fa0a0fb973303042d2eae9a48d
|
||||
MISC metadata.xml 253 SHA256 d82c33ef453113a5c1ebe250dcba373c22934a69b0a86c6ab15a5ca589c25b91 SHA512 54a9069aeb4165d2dff3d473c8001bc51613aac9dff3f7f5e9971a9891a737a31511ffa11cbd523febe581ac1d9de2bdf2f40410f0c4239138f2ccca3ef15555 WHIRLPOOL e5aee23acff864609953a1e4de768f0e4aef704b44c53c021f28573e1ca5c99f1a46d92935ecec2449f7b4419a36d8373127d0ecfa8d7bae72d835e1839eb3f8
|
||||
|
||||
@ -1,24 +0,0 @@
|
||||
https://bugs.gentoo.org/427254
|
||||
|
||||
hack until libpipeline pulls a newer gnulib version
|
||||
|
||||
From 66712c23388e93e5c518ebc8515140fa0c807348 Mon Sep 17 00:00:00 2001
|
||||
From: Eric Blake <eblake@redhat.com>
|
||||
Date: Thu, 29 Mar 2012 13:30:41 -0600
|
||||
Subject: [PATCH] stdio: don't assume gets any more
|
||||
|
||||
Gnulib intentionally does not have a gets module, and now that C11
|
||||
and glibc have dropped it, we should be more proactive about warning
|
||||
any user on a platform that still has a declaration of this dangerous
|
||||
interface.
|
||||
|
||||
--- a/gnulib/lib/stdio.in.h
|
||||
+++ b/gnulib/lib/stdio.in.h
|
||||
@@ -125,7 +125,6 @@
|
||||
/* It is very rare that the developer ever has full control of stdin,
|
||||
so any use of gets warrants an unconditional warning. Assume it is
|
||||
always declared, since it is required by C89. */
|
||||
-_GL_WARN_ON_USE (gets, "gets is a security hole - use fgets instead");
|
||||
#endif
|
||||
|
||||
|
||||
@ -0,0 +1,22 @@
|
||||
https://lists.gnu.org/archive/html/bug-gnulib/2016-03/msg00065.html
|
||||
|
||||
--- gnulib/lib/sys_select.in.h.orig 2014-08-03 15:31:22.000000000 +0200
|
||||
+++ gnulib/lib/sys_select.in.h 2016-05-19 12:57:51.243064700 +0200
|
||||
@@ -81,7 +81,7 @@
|
||||
Also, Mac OS X, AIX, HP-UX, IRIX, Solaris, Interix declare select()
|
||||
in <sys/time.h>.
|
||||
But avoid namespace pollution on glibc systems. */
|
||||
-# ifndef __GLIBC__
|
||||
+# if !(defined __GLIBC__ || defined __NEWLIB__)
|
||||
# include <sys/time.h>
|
||||
# endif
|
||||
|
||||
@@ -102,7 +102,7 @@
|
||||
But avoid namespace pollution on glibc systems.
|
||||
Do this after the include_next (for the sake of OpenBSD 5.0) but before
|
||||
the split double-inclusion guard (for the sake of Solaris). */
|
||||
-#if !(defined __GLIBC__ && !defined __UCLIBC__)
|
||||
+#if !((defined __GLIBC__ || defined __NEWLIB__) && !defined __UCLIBC__)
|
||||
# include <signal.h>
|
||||
#endif
|
||||
|
||||
@ -0,0 +1,28 @@
|
||||
https://lists.gnu.org/archive/html/bug-gnulib/2015-02/msg00079.html
|
||||
|
||||
From: Margaret Lewicka <address@hidden>
|
||||
|
||||
---
|
||||
lib/error.c | 4 ++++
|
||||
1 file changed, 4 insertions(+)
|
||||
|
||||
diff --git a/lib/error.c b/lib/error.c
|
||||
index 6683197..36a3db7 100644
|
||||
--- gnulib/lib/error.c
|
||||
+++ gnulib/lib/error.c
|
||||
@@ -113,9 +113,13 @@ int strerror_r ();
|
||||
# endif
|
||||
# endif
|
||||
|
||||
+#if defined __APPLE__ && defined __MACH__
|
||||
+#define program_name (((char **)*_NSGetArgv())[0])
|
||||
+#else
|
||||
/* The calling program should define program_name and set it to the
|
||||
name of the executing program. */
|
||||
extern char *program_name;
|
||||
+#endif
|
||||
|
||||
# if HAVE_STRERROR_R || defined strerror_r
|
||||
# define __strerror_r strerror_r
|
||||
--
|
||||
2.1.0
|
||||
@ -1,19 +0,0 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/dev-libs/libpipeline/libpipeline-1.2.4.ebuild,v 1.12 2014/01/18 02:32:16 vapier Exp $
|
||||
|
||||
EAPI="5"
|
||||
|
||||
inherit autotools-utils
|
||||
|
||||
DESCRIPTION="a pipeline manipulation library"
|
||||
HOMEPAGE="http://libpipeline.nongnu.org/"
|
||||
SRC_URI="mirror://nongnu/${PN}/${P}.tar.gz"
|
||||
|
||||
LICENSE="GPL-3"
|
||||
SLOT="0"
|
||||
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux"
|
||||
IUSE="static-libs test"
|
||||
|
||||
DEPEND="virtual/pkgconfig
|
||||
test? ( dev-libs/check )"
|
||||
@ -1,6 +1,5 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/dev-libs/libpipeline/libpipeline-1.2.5.ebuild,v 1.12 2014/10/27 01:43:03 vapier Exp $
|
||||
|
||||
EAPI="5"
|
||||
|
||||
|
||||
@ -1,6 +1,5 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/dev-libs/libpipeline/libpipeline-1.3.1.ebuild,v 1.1 2014/09/23 21:52:34 radhermit Exp $
|
||||
|
||||
EAPI="5"
|
||||
|
||||
|
||||
@ -1,6 +1,5 @@
|
||||
# Copyright 1999-2015 Gentoo Foundation
|
||||
# Copyright 1999-2016 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/dev-libs/libpipeline/libpipeline-1.4.0.ebuild,v 1.10 2015/02/28 14:03:35 ago Exp $
|
||||
|
||||
EAPI="5"
|
||||
|
||||
@ -12,7 +11,7 @@ SRC_URI="mirror://nongnu/${PN}/${P}.tar.gz"
|
||||
|
||||
LICENSE="GPL-3"
|
||||
SLOT="0"
|
||||
KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux"
|
||||
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux"
|
||||
IUSE="static-libs test"
|
||||
|
||||
DEPEND="virtual/pkgconfig
|
||||
|
||||
@ -1,6 +1,5 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Copyright 1999-2017 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/dev-libs/libpipeline/libpipeline-1.3.0.ebuild,v 1.1 2014/03/28 23:48:41 radhermit Exp $
|
||||
|
||||
EAPI="5"
|
||||
|
||||
@ -12,8 +11,13 @@ SRC_URI="mirror://nongnu/${PN}/${P}.tar.gz"
|
||||
|
||||
LICENSE="GPL-3"
|
||||
SLOT="0"
|
||||
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux"
|
||||
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos"
|
||||
IUSE="static-libs test"
|
||||
|
||||
DEPEND="virtual/pkgconfig
|
||||
test? ( dev-libs/check )"
|
||||
|
||||
PATCHES=(
|
||||
"${FILESDIR}"/${P}-gnulib-cygwin-sys_select.patch
|
||||
"${FILESDIR}"/${P}-gnulib-darwin-program_name.patch
|
||||
)
|
||||
@ -1,5 +1,8 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
|
||||
<pkgmetadata>
|
||||
<herd>base-system</herd>
|
||||
<maintainer type="project">
|
||||
<email>base-system@gentoo.org</email>
|
||||
<name>Gentoo Base System</name>
|
||||
</maintainer>
|
||||
</pkgmetadata>
|
||||
|
||||
55
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-27.xml
vendored
Normal file
55
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-27.xml
vendored
Normal file
@ -0,0 +1,55 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-27">
|
||||
<title>FreeRADIUS: Security bypass</title>
|
||||
<synopsis>A vulnerability in FreeRADIUS might allow remote attackers to
|
||||
bypass authentication.
|
||||
</synopsis>
|
||||
<product type="ebuild">freeradius</product>
|
||||
<announced>2017-06-27</announced>
|
||||
<revised>2017-06-27: 1</revised>
|
||||
<bug>620186</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="net-dialup/freeradius" auto="yes" arch="*">
|
||||
<unaffected range="ge">3.0.14</unaffected>
|
||||
<vulnerable range="lt">3.0.14</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>FreeRADIUS is an open source RADIUS authentication server.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>It was discovered that the implementation of TTLS and PEAP in FreeRADIUS
|
||||
skips inner authentication when it handles a resumed TLS connection. The
|
||||
affected versions of FreeRADIUS fails to reliably prevent the resumption
|
||||
of unauthenticated sessions unless the TLS session cache is disabled
|
||||
completely.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>An unauthenticated remote user can bypass authentication by starting a
|
||||
session, and then resuming an unauthenticated TLS session before inner
|
||||
authentication has been completed successfully.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>Set “enabled = no” in the cache subsection of eap module settings to
|
||||
disable TLS session caching.
|
||||
</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All FreeRADIUS users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=net-dialup/freeradius-3.0.14"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9148">CVE-2017-9148</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-06-09T12:42:38Z">whissi</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-27T09:57:00Z">whissi</metadata>
|
||||
</glsa>
|
||||
67
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-28.xml
vendored
Normal file
67
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-28.xml
vendored
Normal file
@ -0,0 +1,67 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-28">
|
||||
<title>LibreOffice: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in LibreOffice, the worst
|
||||
of which allows for the remote execution of arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">libreoffice</product>
|
||||
<announced>2017-06-27</announced>
|
||||
<revised>2017-06-27: 1</revised>
|
||||
<bug>616472</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="app-office/libreoffice" auto="yes" arch="*">
|
||||
<unaffected range="ge">5.2.7.2</unaffected>
|
||||
<vulnerable range="lt">5.2.7.2</vulnerable>
|
||||
</package>
|
||||
<package name="app-office/libreoffice-bin" auto="yes" arch="*">
|
||||
<unaffected range="ge">5.2.7.2</unaffected>
|
||||
<vulnerable range="lt">5.2.7.2</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>LibreOffice is a powerful office suite; its clean interface and powerful
|
||||
tools let you unleash your creativity and grow your productivity.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in LibreOffice. Please
|
||||
review the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could entice a user to open a specially crafted file
|
||||
using LibreOffice, possibly resulting in execution of arbitrary code with
|
||||
the privileges of the process or a Denial of Service condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All LibreOffice users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=app-office/libreoffice-5.2.7.2"
|
||||
</code>
|
||||
|
||||
<p>All LibreOffice binary users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose
|
||||
">=app-office/libreoffice-bin-5.2.7.2"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10327">
|
||||
CVE-2016-10327
|
||||
</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7870">CVE-2017-7870</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-06-08T18:53:54Z">whissi</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-27T09:57:51Z">whissi</metadata>
|
||||
</glsa>
|
||||
67
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-29.xml
vendored
Normal file
67
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-29.xml
vendored
Normal file
@ -0,0 +1,67 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201706-29">
|
||||
<title>KAuth and KDELibs: Privilege escalation</title>
|
||||
<synopsis>A vulnerability in KAuth and KDELibs allows local users to gain
|
||||
root privileges.
|
||||
</synopsis>
|
||||
<product type="ebuild">kauth,kdelibs</product>
|
||||
<announced>2017-06-27</announced>
|
||||
<revised>2017-06-27: 1</revised>
|
||||
<bug>618108</bug>
|
||||
<access>local</access>
|
||||
<affected>
|
||||
<package name="kde-frameworks/kauth" auto="yes" arch="*">
|
||||
<unaffected range="ge">5.29.0-r1</unaffected>
|
||||
<vulnerable range="lt">5.29.0-r1</vulnerable>
|
||||
</package>
|
||||
<package name="kde-frameworks/kdelibs" auto="yes" arch="*">
|
||||
<unaffected range="ge">4.14.32</unaffected>
|
||||
<vulnerable range="lt">4.14.32</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>KAuth provides a convenient, system-integrated way to offload actions
|
||||
that need to be performed as a privileged user (root, for example) to
|
||||
small (hopefully secure) helper utilities.
|
||||
</p>
|
||||
|
||||
<p>The KDE libraries, basis of KDE and used by many open source projects.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>KAuth and KDELibs contains a logic flaw in which the service invoking
|
||||
D-Bus is not properly checked. This allows spoofing the identity of the
|
||||
caller and with some carefully crafted calls can lead to gaining root
|
||||
from an unprivileged account.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="high">
|
||||
<p>A local attacker could spoof the identity of the caller invoking D-Bus,
|
||||
possibly resulting in gaining privileges.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All KAuth users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=kde-frameworks/kauth-5.29.0-r1"
|
||||
</code>
|
||||
|
||||
<p>All KDELibs users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=kde-frameworks/kdelibs-4.14.32"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8422">CVE-2017-8422</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-06-06T14:01:55Z">whissi</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-06-27T09:58:27Z">whissi</metadata>
|
||||
</glsa>
|
||||
91
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-01.xml
vendored
Normal file
91
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-01.xml
vendored
Normal file
@ -0,0 +1,91 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201707-01">
|
||||
<title>IcedTea: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in IcedTea, the worst of
|
||||
which may allow execution of arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">icedtea</product>
|
||||
<announced>2017-07-05</announced>
|
||||
<revised>2017-07-05: 1</revised>
|
||||
<bug>607676</bug>
|
||||
<bug>609562</bug>
|
||||
<bug>618874</bug>
|
||||
<bug>619458</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="dev-java/icedtea-bin" auto="yes" arch="*">
|
||||
<unaffected range="ge" slot="7">7.2.6.10</unaffected>
|
||||
<unaffected range="ge" slot="8">3.4.0</unaffected>
|
||||
<vulnerable range="lt">7.2.6.10</vulnerable>
|
||||
<vulnerable range="lt">3.4.0</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>IcedTea’s aim is to provide OpenJDK in a form suitable for easy
|
||||
configuration, compilation and distribution with the primary goal of
|
||||
allowing inclusion in GNU/Linux distributions.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in IcedTea. Please review
|
||||
the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
|
||||
<p>Note: If the web browser plug-in provided by the dev-java/icedtea-web
|
||||
package was installed, the issues exposed via Java applets could have
|
||||
been exploited without user interaction if a user visited a malicious
|
||||
website.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could possibly execute arbitrary code with the
|
||||
privileges of the process, gain access to information, or cause a Denial
|
||||
of Service condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All IcedTea binary 7.x users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-7.2.6.10:7"
|
||||
</code>
|
||||
|
||||
<p>All IcedTea binary 3.x users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-3.4.0:8"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5546">CVE-2016-5546</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5547">CVE-2016-5547</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5548">CVE-2016-5548</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5549">CVE-2016-5549</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5552">CVE-2016-5552</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3231">CVE-2017-3231</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3241">CVE-2017-3241</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3252">CVE-2017-3252</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3253">CVE-2017-3253</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3260">CVE-2017-3260</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3261">CVE-2017-3261</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3272">CVE-2017-3272</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3289">CVE-2017-3289</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3509">CVE-2017-3509</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3511">CVE-2017-3511</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3512">CVE-2017-3512</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3514">CVE-2017-3514</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3526">CVE-2017-3526</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3533">CVE-2017-3533</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3539">CVE-2017-3539</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3544">CVE-2017-3544</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-01-31T16:38:05Z">whissi</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-07-05T09:02:19Z">whissi</metadata>
|
||||
</glsa>
|
||||
56
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-02.xml
vendored
Normal file
56
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-02.xml
vendored
Normal file
@ -0,0 +1,56 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201707-02">
|
||||
<title>Game Music Emu: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in Game Music Emu, the
|
||||
worst of which could lead to the execution of arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">game-music-emu</product>
|
||||
<announced>2017-07-08</announced>
|
||||
<revised>2017-07-08: 1</revised>
|
||||
<bug>603092</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="media-libs/game-music-emu" auto="yes" arch="*">
|
||||
<unaffected range="ge" slot="">0.6.1</unaffected>
|
||||
<vulnerable range="lt" slot="">0.6.1</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Game Music Emu is a multi-purpose console music emulator and player
|
||||
library.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in Game Music Emu. Please
|
||||
review the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could entice a user to open a specially crafted SPC
|
||||
music file, using Game Music Emu or an application linked against the
|
||||
Game Music Emu library, possibly resulting in execution of arbitrary code
|
||||
with the privileges of the process or a Denial of Service condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All Game Music Emu users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=media-libs/game-music-emu-0.6.1"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9957">CVE-2016-9957</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9958">CVE-2016-9958</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9959">CVE-2016-9959</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9960">CVE-2016-9960</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9961">CVE-2016-9961</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-03-24T05:27:52Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-07-08T12:04:39Z">whissi</metadata>
|
||||
</glsa>
|
||||
66
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-03.xml
vendored
Normal file
66
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-03.xml
vendored
Normal file
@ -0,0 +1,66 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201707-03">
|
||||
<title>phpMyAdmin: Security bypass</title>
|
||||
<synopsis>A vulnerability in phpMyAdmin might allow remote attackers to
|
||||
bypass authentication.
|
||||
</synopsis>
|
||||
<product type="ebuild">phpmyadmin</product>
|
||||
<announced>2017-07-08</announced>
|
||||
<revised>2017-07-08: 1</revised>
|
||||
<bug>614522</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="dev-db/phpmyadmin" auto="yes" arch="*">
|
||||
<unaffected range="ge" slot="">4.0.10.20</unaffected>
|
||||
<unaffected range="ge" slot="">4.7.0</unaffected>
|
||||
<vulnerable range="lt" slot="">4.0.10.20</vulnerable>
|
||||
<vulnerable range="lt" slot="">4.7.0</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>phpMyAdmin is a web-based management tool for MySQL databases.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>A vulnerability was discovered where the restrictions caused by
|
||||
“$cfg[‘Servers’][$i][‘AllowNoPassword’] = false” are bypassed
|
||||
under certain PHP versions. This can lead compromised user accounts, who
|
||||
have no passwords set, even if the administrator has set
|
||||
“$cfg[‘Servers’][$i][‘AllowNoPassword’]” to false (which is
|
||||
the default).
|
||||
</p>
|
||||
|
||||
<p>This behavior depends on the PHP version used (it seems PHP 5 is
|
||||
affected, while PHP 7.0 is not).
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker, who only needs to know the username, could bypass
|
||||
security restrictions and access phpMyAdmin.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>Set a password for all users.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All phpMyAdmin 4.0.x users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose
|
||||
">=dev-db/phpmyadmin-4.0.10.20:4.0.10.20"
|
||||
</code>
|
||||
|
||||
<p>All other phpMyAdmin users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-4.7.0:4.7.0"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://www.phpmyadmin.net/security/PMASA-2017-8/">PMASA-2017-8</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-04-28T01:10:27Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-07-08T12:04:56Z">whissi</metadata>
|
||||
</glsa>
|
||||
55
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-04.xml
vendored
Normal file
55
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-04.xml
vendored
Normal file
@ -0,0 +1,55 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201707-04">
|
||||
<title>libsndfile: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in libsndfile, the worst
|
||||
of which might allow remote attackers to execute arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">libsndfile</product>
|
||||
<announced>2017-07-08</announced>
|
||||
<revised>2017-07-08: 1</revised>
|
||||
<bug>618010</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="media-libs/libsndfile" auto="yes" arch="*">
|
||||
<unaffected range="ge" slot="">1.0.28</unaffected>
|
||||
<vulnerable range="lt" slot="">1.0.28</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>libsndfile is a C library for reading and writing files containing
|
||||
sampled sound.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in libsndfile. Please
|
||||
review the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could entice a user to open a specially crafted file,
|
||||
possibly resulting in the execution of arbitrary code with the privileges
|
||||
of the process, or cause a Denial of Service condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All libsndfile users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.28"
|
||||
</code>
|
||||
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7585">CVE-2017-7585</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7586">CVE-2017-7586</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7741">CVE-2017-7741</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7742">CVE-2017-7742</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-05-21T07:41:05Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-07-08T12:05:10Z">whissi</metadata>
|
||||
</glsa>
|
||||
57
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-05.xml
vendored
Normal file
57
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-05.xml
vendored
Normal file
@ -0,0 +1,57 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201707-05">
|
||||
<title>OpenSLP: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in OpenSLP, the worst of
|
||||
which allows remote attackers to cause a Denial of Service condition or
|
||||
other unspecified impacts.
|
||||
</synopsis>
|
||||
<product type="ebuild">OpenSLP</product>
|
||||
<announced>2017-07-08</announced>
|
||||
<revised>2017-07-08: 1</revised>
|
||||
<bug>360061</bug>
|
||||
<bug>434918</bug>
|
||||
<bug>583396</bug>
|
||||
<bug>595542</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="net-libs/openslp" auto="yes" arch="*">
|
||||
<unaffected range="ge" slot="">2.0.0-r4</unaffected>
|
||||
<vulnerable range="lt" slot="">2.0.0-r4</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>OpenSLP is an open-source implementation of Service Location Protocol
|
||||
(SLP).
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in OpenSLP. Please review
|
||||
the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could possibly cause a Denial of Service condition or
|
||||
have other unspecified impacts.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All OpenSLP users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=net-libs/openslp-2.0.0-r4"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3609">CVE-2010-3609</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4428">CVE-2012-4428</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4912">CVE-2016-4912</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7567">CVE-2016-7567</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-05-21T02:50:48Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-07-08T12:05:22Z">whissi</metadata>
|
||||
</glsa>
|
||||
75
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-06.xml
vendored
Normal file
75
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-06.xml
vendored
Normal file
@ -0,0 +1,75 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201707-06">
|
||||
<title>virglrenderer: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in virglrenderer, the
|
||||
worst of which could allow local guest OS users to cause a Denial of
|
||||
Service condition.
|
||||
</synopsis>
|
||||
<product type="ebuild">virglrenderer</product>
|
||||
<announced>2017-07-08</announced>
|
||||
<revised>2017-07-08: 1</revised>
|
||||
<bug>606996</bug>
|
||||
<bug>607022</bug>
|
||||
<bug>608734</bug>
|
||||
<bug>609400</bug>
|
||||
<bug>609402</bug>
|
||||
<bug>609492</bug>
|
||||
<bug>609494</bug>
|
||||
<bug>610678</bug>
|
||||
<bug>610680</bug>
|
||||
<bug>611378</bug>
|
||||
<bug>611380</bug>
|
||||
<bug>611382</bug>
|
||||
<access>local</access>
|
||||
<affected>
|
||||
<package name="media-libs/virglrenderer" auto="yes" arch="*">
|
||||
<unaffected range="ge" slot="">0.6.0</unaffected>
|
||||
<vulnerable range="lt" slot="">0.6.0</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>A virtual 3D GPU library, that allows the guest operating system to use
|
||||
the host GPU to accelerate 3D rendering.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in virglrenderer. Please
|
||||
review the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A local attacker could cause a Denial of Service condition.</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All virglrenderer users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=media-libs/virglrenderer-0.6.0"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10163">
|
||||
CVE-2016-10163
|
||||
</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10214">
|
||||
CVE-2016-10214
|
||||
</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5580">CVE-2017-5580</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5956">CVE-2017-5956</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5957">CVE-2017-5957</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5993">CVE-2017-5993</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5994">CVE-2017-5994</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6209">CVE-2017-6209</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6210">CVE-2017-6210</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6317">CVE-2017-6317</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6355">CVE-2017-6355</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6386">CVE-2017-6386</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-05-05T00:14:09Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-07-08T12:06:05Z">whissi</metadata>
|
||||
</glsa>
|
||||
58
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-07.xml
vendored
Normal file
58
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-07.xml
vendored
Normal file
@ -0,0 +1,58 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201707-07">
|
||||
<title>JasPer: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in JasPer, the worst of
|
||||
which could could allow an attacker to execute arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">JasPer</product>
|
||||
<announced>2017-07-08</announced>
|
||||
<revised>2017-07-08: 1</revised>
|
||||
<bug>559164</bug>
|
||||
<bug>559168</bug>
|
||||
<bug>571256</bug>
|
||||
<bug>599430</bug>
|
||||
<bug>602848</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="media-libs/jasper" auto="yes" arch="*">
|
||||
<unaffected range="ge" slot="">2.0.12</unaffected>
|
||||
<vulnerable range="lt" slot="">2.0.12</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>JasPer is a software-based implementation of the codec specified in the
|
||||
JPEG-2000 Part-1 standard.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in JasPer. Please review
|
||||
the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could entice a user to open a specially crafted image
|
||||
file using JasPer possibly resulting in execution of arbitrary code with
|
||||
the privileges of the process or a Denial of Service condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All JasPer users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=media-libs/jasper-2.0.12"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5203">CVE-2015-5203</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8751">CVE-2015-8751</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9262">CVE-2016-9262</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9591">CVE-2016-9591</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-04-30T19:55:35Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-07-08T12:06:24Z">whissi</metadata>
|
||||
</glsa>
|
||||
51
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-08.xml
vendored
Normal file
51
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-08.xml
vendored
Normal file
@ -0,0 +1,51 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201707-08">
|
||||
<title>feh: Arbitrary remote code execution</title>
|
||||
<synopsis>A vulnerability in feh might allow remote attackers to execute
|
||||
arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">feh</product>
|
||||
<announced>2017-07-08</announced>
|
||||
<revised>2017-07-08: 1</revised>
|
||||
<bug>616470</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="media-gfx/feh" auto="yes" arch="*">
|
||||
<unaffected range="ge" slot="">2.18.3</unaffected>
|
||||
<vulnerable range="lt" slot="">2.18.3</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>feh is an X11 image viewer aimed mostly at console users.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Tobias Stoeckmann discovered it was possible to trigger an
|
||||
out-of-boundary heap write with the image viewer feh while receiving an
|
||||
IPC message.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker, pretending to be the E17 window manager, could
|
||||
possibly trigger an out-of-boundary heap write in feh while receiving an
|
||||
IPC message. This could result in execution of arbitrary code with the
|
||||
privileges of the process or a Denial of Service condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All feh users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=media-gfx/feh-2.18.3"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7875">CVE-2017-7875</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-05-05T00:04:28Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-07-08T12:06:41Z">whissi</metadata>
|
||||
</glsa>
|
||||
53
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-09.xml
vendored
Normal file
53
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-09.xml
vendored
Normal file
@ -0,0 +1,53 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201707-09">
|
||||
<title>GNOME applet for NetworkManager: Arbitrary file read/write</title>
|
||||
<synopsis>A vulnerability has been found in GNOME applet for NetworkManager
|
||||
allowing local attackers to access the local filesystem.
|
||||
</synopsis>
|
||||
<product type="ebuild">nm-applet</product>
|
||||
<announced>2017-07-08</announced>
|
||||
<revised>2017-07-08: 1</revised>
|
||||
<bug>613768</bug>
|
||||
<access>local</access>
|
||||
<affected>
|
||||
<package name="gnome-extra/nm-applet" auto="yes" arch="*">
|
||||
<unaffected range="ge" slot="">1.4.6-r1</unaffected>
|
||||
<vulnerable range="lt" slot="">1.4.6-r1</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>GNOME applet for NetworkManager is a GTK+ 3 front-end which works under
|
||||
Xorg environments with a systray.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Frederic Bardy and Quentin Biguenet discovered that GNOME applet for
|
||||
NetworkManager incorrectly checked permissions when connecting to certain
|
||||
wireless networks.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A local attacker could bypass security restrictions at the login screen
|
||||
to access local files.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All GNOME applet for NetworkManager users should upgrade to the latest
|
||||
version:
|
||||
</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=gnome-extra/nm-applet-1.4.6-r1"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6590">CVE-2017-6590</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-04-02T12:44:50Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-07-08T12:07:02Z">whissi</metadata>
|
||||
</glsa>
|
||||
52
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-10.xml
vendored
Normal file
52
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-10.xml
vendored
Normal file
@ -0,0 +1,52 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201707-10">
|
||||
<title>VLC: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in VLC, the worst of which
|
||||
may allow remote attackers to execute arbitrary code.
|
||||
</synopsis>
|
||||
<product type="ebuild">vlc</product>
|
||||
<announced>2017-07-08</announced>
|
||||
<revised>2017-07-08: 1</revised>
|
||||
<bug>619494</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="media-video/vlc" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.2.6</unaffected>
|
||||
<vulnerable range="lt">2.2.6</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>VLC is a cross-platform media player and streaming server.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in VLC. Please review the
|
||||
CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker, by enticing a user to open a specially crafted
|
||||
subtitles file, could possibly execute arbitrary code with the privileges
|
||||
of the process or cause a Denial of Service condition.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All VLC users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=media-video/vlc-2.2.6"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8310">CVE-2017-8310</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8311">CVE-2017-8311</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8312">CVE-2017-8312</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8313">CVE-2017-8313</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-06-28T11:50:57Z">whissi</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-07-08T20:11:58Z">b-man</metadata>
|
||||
</glsa>
|
||||
49
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-11.xml
vendored
Normal file
49
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-11.xml
vendored
Normal file
@ -0,0 +1,49 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201707-11">
|
||||
<title>RoundCube: Security bypass</title>
|
||||
<synopsis>A vulnerability in RoundCube may allow authenticated users to
|
||||
bypass security restrictions.
|
||||
</synopsis>
|
||||
<product type="ebuild">roundcube</product>
|
||||
<announced>2017-07-08</announced>
|
||||
<revised>2017-07-08: 1</revised>
|
||||
<bug>618322</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="mail-client/roundcube" auto="yes" arch="*">
|
||||
<unaffected range="ge">1.2.5</unaffected>
|
||||
<vulnerable range="lt">1.2.5</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Free and open source webmail software for the masses, written in PHP.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Authenticated users can arbitrarily reset passwords due to a problem
|
||||
caused by an improperly restricted exec call in the virtualmin and sasl
|
||||
drivers of the password plugin.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>Authenticated users can bypass security restrictions and elevate
|
||||
privileges.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All RoundCube users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=mail-client/roundcube-1.2.5"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8114">CVE-2017-8114</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-06-19T11:26:16Z">whissi</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-07-08T20:12:11Z">b-man</metadata>
|
||||
</glsa>
|
||||
51
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-12.xml
vendored
Normal file
51
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-12.xml
vendored
Normal file
@ -0,0 +1,51 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201707-12">
|
||||
<title>MAN DB: Privilege escalation</title>
|
||||
<synopsis>A vulnerability in MAN DB allows local users to gain root
|
||||
privileges.
|
||||
</synopsis>
|
||||
<product type="ebuild">man-db</product>
|
||||
<announced>2017-07-09</announced>
|
||||
<revised>2017-07-09: 1</revised>
|
||||
<bug>602588</bug>
|
||||
<access>local</access>
|
||||
<affected>
|
||||
<package name="sys-apps/man-db" auto="yes" arch="*">
|
||||
<unaffected range="ge" slot="">2.7.6.1-r2</unaffected>
|
||||
<vulnerable range="lt" slot="">2.7.6.1-r2</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>MAN DB is a man replacement that utilizes BerkelyDB instead of flat
|
||||
files.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>The /var/cache/man directory as part of the MAN DB package has group
|
||||
permissions set to root.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="high">
|
||||
<p>A local user who does not belong to the root group, but has the ability
|
||||
to modify the /var/cache/man directory can escalate privileges to the
|
||||
group root.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All MAN DB users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=sys-apps/man-db-2.7.6.1-r2"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1336">CVE-2015-1336</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-01-18T16:57:30Z">whissi</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-07-09T20:19:23Z">whissi</metadata>
|
||||
</glsa>
|
||||
50
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-13.xml
vendored
Normal file
50
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-13.xml
vendored
Normal file
@ -0,0 +1,50 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201707-13">
|
||||
<title>libcroco: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in libcroco, the worst of
|
||||
which may have unspecified impacts.
|
||||
</synopsis>
|
||||
<product type="ebuild">libcroco</product>
|
||||
<announced>2017-07-09</announced>
|
||||
<revised>2017-07-09: 1</revised>
|
||||
<bug>618012</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="dev-libs/libcroco" auto="yes" arch="*">
|
||||
<unaffected range="ge" slot="">0.6.12-r1</unaffected>
|
||||
<vulnerable range="lt" slot="">0.6.12-r1</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>libcroco is a standalone CSS2 parsing and manipulation library.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in libcroco. Please review
|
||||
the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>A remote attacker could entice a user to open a specially crafted CSS
|
||||
file possibly resulting in a Denial of Service condition or other
|
||||
unspecified impacts.
|
||||
</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All libcroco users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=dev-libs/libcroco-0.6.12-r1"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7960">CVE-2017-7960</uri>
|
||||
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7961">CVE-2017-7961</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2017-05-21T07:37:50Z">BlueKnight</metadata>
|
||||
<metadata tag="submitter" timestamp="2017-07-09T20:40:19Z">whissi</metadata>
|
||||
</glsa>
|
||||
@ -1 +1 @@
|
||||
Fri, 23 Jun 2017 17:39:03 +0000
|
||||
Sun, 09 Jul 2017 23:40:01 +0000
|
||||
|
||||
@ -1 +1 @@
|
||||
3bbc3731a50a93315f90eba3a430b6d900cf3f5d 1498159143 2017-06-22T19:19:03+00:00
|
||||
0d1886fce079a5b039baee6ef4287f5a55945dea 1499633121 2017-07-09T20:45:21+00:00
|
||||
|
||||
9
sdk_container/src/third_party/portage-stable/metadata/md5-cache/app-text/manpager-1
vendored
Normal file
9
sdk_container/src/third_party/portage-stable/metadata/md5-cache/app-text/manpager-1
vendored
Normal file
@ -0,0 +1,9 @@
|
||||
DEFINED_PHASES=compile install
|
||||
DESCRIPTION=Enable colorization of man pages
|
||||
EAPI=5
|
||||
HOMEPAGE=http://www.gentoo.org/
|
||||
KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-linux ~arm-linux ~x86-linux
|
||||
LICENSE=GPL-2
|
||||
SLOT=0
|
||||
_eclasses_=multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
|
||||
_md5_=67c0394e3a090afc09d90852c34c8807
|
||||
@ -1,12 +0,0 @@
|
||||
DEFINED_PHASES=compile configure install prepare test
|
||||
DEPEND=virtual/pkgconfig test? ( dev-libs/check ) >=app-portage/elt-patches-20170317
|
||||
DESCRIPTION=a pipeline manipulation library
|
||||
EAPI=5
|
||||
HOMEPAGE=http://libpipeline.nongnu.org/
|
||||
IUSE=static-libs test
|
||||
KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux
|
||||
LICENSE=GPL-3
|
||||
SLOT=0
|
||||
SRC_URI=mirror://nongnu/libpipeline/libpipeline-1.2.4.tar.gz
|
||||
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 autotools-utils 5a4611dfba155b1659528663fad4cd5e epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
|
||||
_md5_=f2fc935ab6a494f715508b85ed36496b
|
||||
@ -9,4 +9,4 @@ LICENSE=GPL-3
|
||||
SLOT=0
|
||||
SRC_URI=mirror://nongnu/libpipeline/libpipeline-1.2.5.tar.gz
|
||||
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 autotools-utils 5a4611dfba155b1659528663fad4cd5e epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
|
||||
_md5_=3bc04428fdcee1bc8584b69821d96a15
|
||||
_md5_=e3241ff7c5cb19f4177e6017ae404e2a
|
||||
|
||||
@ -9,4 +9,4 @@ LICENSE=GPL-3
|
||||
SLOT=0
|
||||
SRC_URI=mirror://nongnu/libpipeline/libpipeline-1.3.1.tar.gz
|
||||
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 autotools-utils 5a4611dfba155b1659528663fad4cd5e epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
|
||||
_md5_=a0b47c1e0fd4981c5807c904537db5e2
|
||||
_md5_=e9ed84e1198173feb8fb6789594fb988
|
||||
|
||||
@ -4,9 +4,9 @@ DESCRIPTION=a pipeline manipulation library
|
||||
EAPI=5
|
||||
HOMEPAGE=http://libpipeline.nongnu.org/
|
||||
IUSE=static-libs test
|
||||
KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux
|
||||
KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux
|
||||
LICENSE=GPL-3
|
||||
SLOT=0
|
||||
SRC_URI=mirror://nongnu/libpipeline/libpipeline-1.4.0.tar.gz
|
||||
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 autotools-utils 5a4611dfba155b1659528663fad4cd5e epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
|
||||
_md5_=94e5ee74119ed4b219b6d54078b531ac
|
||||
_md5_=c1d367d4d264dd0af368b27a9593d01a
|
||||
|
||||
@ -4,9 +4,9 @@ DESCRIPTION=a pipeline manipulation library
|
||||
EAPI=5
|
||||
HOMEPAGE=http://libpipeline.nongnu.org/
|
||||
IUSE=static-libs test
|
||||
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux
|
||||
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos
|
||||
LICENSE=GPL-3
|
||||
SLOT=0
|
||||
SRC_URI=mirror://nongnu/libpipeline/libpipeline-1.3.0.tar.gz
|
||||
SRC_URI=mirror://nongnu/libpipeline/libpipeline-1.4.1.tar.gz
|
||||
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 autotools-utils 5a4611dfba155b1659528663fad4cd5e epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
|
||||
_md5_=36aef5041cfbc74badda519408ac6b24
|
||||
_md5_=e413b67ea73872537f728e7f0c3be69e
|
||||
@ -1,13 +0,0 @@
|
||||
DEFINED_PHASES=configure install preinst setup
|
||||
DEPEND=dev-libs/libpipeline berkdb? ( sys-libs/db ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man app-arch/xz-utils virtual/pkgconfig nls? ( >=app-text/po4a-0.45 sys-devel/gettext )
|
||||
DESCRIPTION=a man replacement that utilizes berkdb instead of flat files
|
||||
EAPI=4
|
||||
HOMEPAGE=http://www.nongnu.org/man-db/
|
||||
IUSE=berkdb +gdbm nls selinux static-libs zlib
|
||||
KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~arm-linux ~x86-linux
|
||||
LICENSE=GPL-3
|
||||
RDEPEND=dev-libs/libpipeline berkdb? ( sys-libs/db ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man selinux? ( sec-policy/selinux-mandb )
|
||||
SLOT=0
|
||||
SRC_URI=mirror://nongnu/man-db/man-db-2.6.6.tar.xz
|
||||
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee user e4b567c44272a719fabf53f0f885d3f7
|
||||
_md5_=ed5f7d839cffc2460ab391f29c40a230
|
||||
@ -1,13 +0,0 @@
|
||||
DEFINED_PHASES=configure install preinst setup
|
||||
DEPEND=>=dev-libs/libpipeline-1.3.0 berkdb? ( sys-libs/db ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man app-arch/xz-utils virtual/pkgconfig nls? ( >=app-text/po4a-0.45 sys-devel/gettext )
|
||||
DESCRIPTION=a man replacement that utilizes berkdb instead of flat files
|
||||
EAPI=4
|
||||
HOMEPAGE=http://www.nongnu.org/man-db/
|
||||
IUSE=berkdb +gdbm nls selinux static-libs zlib
|
||||
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~arm-linux ~x86-linux
|
||||
LICENSE=GPL-3
|
||||
RDEPEND=>=dev-libs/libpipeline-1.3.0 berkdb? ( sys-libs/db ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man selinux? ( sec-policy/selinux-mandb )
|
||||
SLOT=0
|
||||
SRC_URI=mirror://nongnu/man-db/man-db-2.6.7.1.tar.xz
|
||||
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee user e4b567c44272a719fabf53f0f885d3f7
|
||||
_md5_=96f9493a46abeaa239bcceecf1488f63
|
||||
@ -1,13 +0,0 @@
|
||||
DEFINED_PHASES=configure install postinst preinst setup
|
||||
DEPEND=>=dev-libs/libpipeline-1.4.0 berkdb? ( sys-libs/db ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man app-arch/xz-utils virtual/pkgconfig nls? ( >=app-text/po4a-0.45 sys-devel/gettext )
|
||||
DESCRIPTION=a man replacement that utilizes berkdb instead of flat files
|
||||
EAPI=4
|
||||
HOMEPAGE=http://www.nongnu.org/man-db/
|
||||
IUSE=berkdb +gdbm nls selinux static-libs zlib
|
||||
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~arm-linux ~x86-linux
|
||||
LICENSE=GPL-3
|
||||
RDEPEND=>=dev-libs/libpipeline-1.4.0 berkdb? ( sys-libs/db ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man selinux? ( sec-policy/selinux-mandb )
|
||||
SLOT=0
|
||||
SRC_URI=mirror://nongnu/man-db/man-db-2.7.1.tar.xz
|
||||
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee user e4b567c44272a719fabf53f0f885d3f7 versionator c80ccf29e90adea7c5cae94b42eb76d0
|
||||
_md5_=5bea9696ad2a30b23898935e8c71cd86
|
||||
14
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/man-db-2.7.6.1-r2
vendored
Normal file
14
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/man-db-2.7.6.1-r2
vendored
Normal file
@ -0,0 +1,14 @@
|
||||
DEFINED_PHASES=configure install postinst preinst setup
|
||||
DEPEND=>=dev-libs/libpipeline-1.4.0 berkdb? ( sys-libs/db:= ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man app-arch/xz-utils virtual/pkgconfig nls? ( >=app-text/po4a-0.45 sys-devel/gettext )
|
||||
DESCRIPTION=a man replacement that utilizes berkdb instead of flat files
|
||||
EAPI=5
|
||||
HOMEPAGE=http://www.nongnu.org/man-db/
|
||||
IUSE=berkdb +gdbm +manpager nls selinux static-libs zlib
|
||||
KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-linux ~arm-linux ~x86-linux
|
||||
LICENSE=GPL-3
|
||||
PDEPEND=manpager? ( app-text/manpager )
|
||||
RDEPEND=>=dev-libs/libpipeline-1.4.0 berkdb? ( sys-libs/db:= ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man selinux? ( sec-policy/selinux-mandb )
|
||||
SLOT=0
|
||||
SRC_URI=mirror://nongnu/man-db/man-db-2.7.6.1.tar.xz
|
||||
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee user e4b567c44272a719fabf53f0f885d3f7 versionator c80ccf29e90adea7c5cae94b42eb76d0
|
||||
_md5_=421df678a673d349151db60ab9533e22
|
||||
@ -1,310 +0,0 @@
|
||||
# ChangeLog for sys-apps/man-db
|
||||
# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-apps/man-db/ChangeLog,v 1.79 2015/02/16 09:34:44 haubi Exp $
|
||||
|
||||
16 Feb 2015; Michael Haubenwallner <haubi@gentoo.org> man-db-2.7.1.ebuild:
|
||||
Put systemdtmpfilesdir inside EPREFIX, bug#538634.
|
||||
|
||||
13 Jan 2015; Lars Wendler <polynomial-c@gentoo.org> man-db-2.6.6.ebuild,
|
||||
man-db-2.6.7.1.ebuild, man-db-2.7.1.ebuild:
|
||||
Fixed dependency on app-text/po4a as per bug #534224.
|
||||
|
||||
*man-db-2.7.1 (22 Dec 2014)
|
||||
|
||||
22 Dec 2014; Lars Wendler <polynomial-c@gentoo.org> -man-db-2.6.0.2.ebuild,
|
||||
-man-db-2.6.1.ebuild, -man-db-2.6.2.ebuild, -man-db-2.6.3.ebuild,
|
||||
-man-db-2.6.3-r1.ebuild, -man-db-2.6.4.ebuild, -man-db-2.6.5.ebuild,
|
||||
+man-db-2.7.1.ebuild, -files/man-db-2.6.0.2-flock.h.patch,
|
||||
-files/man-db-2.6.1-no-gets.patch:
|
||||
Version bump. Removed old.
|
||||
|
||||
02 Nov 2014; Sven Vermeulen <swift@gentoo.org> man-db-2.6.6.ebuild,
|
||||
man-db-2.6.7.1.ebuild:
|
||||
Remove sec-policy/selinux-* dependency from DEPEND but keep in RDEPEND (bug
|
||||
#527698)
|
||||
|
||||
27 Oct 2014; Mike Frysinger <vapier@gentoo.org> man-db-2.6.6.ebuild:
|
||||
Mark arm64/m68k/s390/sh stable.
|
||||
|
||||
11 Jul 2014; Mikle Kolyada <zlogene@gentoo.org> man-db-2.6.6.ebuild:
|
||||
sparc stable wrt bug #502916
|
||||
|
||||
11 Jul 2014; Mikle Kolyada <zlogene@gentoo.org> man-db-2.6.6.ebuild:
|
||||
ppc64 stable wrt bug #502916
|
||||
|
||||
11 Jul 2014; Mikle Kolyada <zlogene@gentoo.org> man-db-2.6.6.ebuild:
|
||||
ppc stable wrt bug #502916
|
||||
|
||||
11 Jul 2014; Mikle Kolyada <zlogene@gentoo.org> man-db-2.6.6.ebuild:
|
||||
alpha stable wrt bug #502916
|
||||
|
||||
11 Jul 2014; Mikle Kolyada <zlogene@gentoo.org> man-db-2.6.6.ebuild:
|
||||
x86 stable wrt bug #502916
|
||||
|
||||
13 May 2014; Akinori Hattori <hattya@gentoo.org> man-db-2.6.6.ebuild:
|
||||
ia64 stable wrt bug #502916
|
||||
|
||||
*man-db-2.6.7.1 (15 Apr 2014)
|
||||
|
||||
15 Apr 2014; Tim Harder <radhermit@gentoo.org> +man-db-2.6.7.1.ebuild:
|
||||
Version bump.
|
||||
|
||||
26 Mar 2014; Chema Alonso <nimiux@gentoo.org> man-db-2.6.6.ebuild:
|
||||
Stable for amd64 wrt bug #502916
|
||||
|
||||
16 Mar 2014; Markus Meier <maekke@gentoo.org> man-db-2.6.6.ebuild:
|
||||
arm stable, bug #502916
|
||||
|
||||
13 Mar 2014; Jeroen Roovers <jer@gentoo.org> man-db-2.6.6.ebuild:
|
||||
Stable for HPPA (bug #502916).
|
||||
|
||||
26 Jan 2014; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.5.ebuild:
|
||||
Stable for sparc, wrt bug #495924
|
||||
|
||||
*man-db-2.6.6 (24 Jan 2014)
|
||||
|
||||
24 Jan 2014; Tim Harder <radhermit@gentoo.org> +man-db-2.6.6.ebuild:
|
||||
Version bump.
|
||||
|
||||
20 Jan 2014; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.5.ebuild:
|
||||
Stable for ppc, wrt bug #495924
|
||||
|
||||
19 Jan 2014; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.5.ebuild:
|
||||
Stable for ppc64, wrt bug #495924
|
||||
|
||||
18 Jan 2014; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.5.ebuild:
|
||||
Stable for alpha, wrt bug #495924
|
||||
|
||||
18 Jan 2014; Mike Frysinger <vapier@gentoo.org> man-db-2.6.5.ebuild:
|
||||
Add arm64 love.
|
||||
|
||||
18 Jan 2014; Mike Frysinger <vapier@gentoo.org> man-db-2.6.5.ebuild:
|
||||
Add warning when USE flags are ambiguous #496150 by Sergey Popov.
|
||||
|
||||
16 Jan 2014; Mike Frysinger <vapier@gentoo.org> man-db-2.6.5.ebuild:
|
||||
Mark m68k/s390/sh stable.
|
||||
|
||||
15 Jan 2014; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.5.ebuild:
|
||||
Stable for ia64, wrt bug #495924
|
||||
|
||||
31 Dec 2013; Markus Meier <maekke@gentoo.org> man-db-2.6.5.ebuild:
|
||||
arm stable, bug #495924
|
||||
|
||||
29 Dec 2013; Sven Vermeulen <swift@gentoo.org> man-db-2.6.0.2.ebuild,
|
||||
man-db-2.6.1.ebuild, man-db-2.6.2.ebuild, man-db-2.6.3.ebuild,
|
||||
man-db-2.6.3-r1.ebuild, man-db-2.6.4.ebuild, man-db-2.6.5.ebuild:
|
||||
Adding dependency on selinux-mandb if USE=selinux is set (bug #496158)
|
||||
|
||||
27 Dec 2013; Sergey Popov <pinkbyte@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Drop s390/sh/m68k to unstable
|
||||
|
||||
27 Dec 2013; Sergey Popov <pinkbyte@gentoo.org> man-db-2.6.5.ebuild:
|
||||
Stable on amd64 and x86, wrt bug #495924
|
||||
|
||||
26 Dec 2013; Jeroen Roovers <jer@gentoo.org> man-db-2.6.5.ebuild:
|
||||
Stable for HPPA (bug #495924).
|
||||
|
||||
31 Aug 2013; Naohiro Aota <naota@gentoo.org> man-db-2.6.5.ebuild:
|
||||
Use 0 instead of root group.
|
||||
|
||||
*man-db-2.6.5 (09 Jul 2013)
|
||||
|
||||
09 Jul 2013; Tim Harder <radhermit@gentoo.org> +man-db-2.6.5.ebuild:
|
||||
Version bump.
|
||||
|
||||
*man-db-2.6.4 (24 Jun 2013)
|
||||
|
||||
24 Jun 2013; Tim Harder <radhermit@gentoo.org> +man-db-2.6.4.ebuild:
|
||||
Version bump, add dep on app-text/po4a if nls is enabled (bug #451622).
|
||||
|
||||
27 Apr 2013; Mike Frysinger <vapier@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Mark m68k stable #455026.
|
||||
|
||||
24 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Stable for sh, wrt bug #455026
|
||||
|
||||
21 Feb 2013; Zac Medico <zmedico@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Add ~arm-linux and ~x86-linux keywords.
|
||||
|
||||
20 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Stable for s390, wrt bug #455026
|
||||
|
||||
10 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Stable for ppc64, wrt bug #455026
|
||||
|
||||
08 Feb 2013; Jeroen Roovers <jer@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Stable for HPPA (bug #455026).
|
||||
|
||||
06 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Stable for sparc, wrt bug #455026
|
||||
|
||||
04 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Stable for alpha, wrt bug #455026
|
||||
|
||||
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Stable for ia64, wrt bug #455026
|
||||
|
||||
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Stable for arm, wrt bug #455026
|
||||
|
||||
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Stable for ppc, wrt bug #455026
|
||||
|
||||
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Stable for x86, wrt bug #455026
|
||||
|
||||
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Stable for amd64, wrt bug #455026
|
||||
|
||||
13 Jan 2013; Mike Frysinger <vapier@gentoo.org> man-db-2.6.3-r1.ebuild:
|
||||
Reset permissions/owners on /var/cache/man if they are broken (like when
|
||||
migrating from sys-apps/man) #447944 by Viacheslav Prisivko.
|
||||
|
||||
*man-db-2.6.3-r1 (28 Oct 2012)
|
||||
|
||||
28 Oct 2012; Mike Frysinger <vapier@gentoo.org> +files/man-db.cron,
|
||||
+man-db-2.6.3-r1.ebuild:
|
||||
Install daily cronjob for building caches #289884 by C W Rose.
|
||||
|
||||
*man-db-2.6.3 (19 Sep 2012)
|
||||
|
||||
19 Sep 2012; Tim Harder <radhermit@gentoo.org> +man-db-2.6.3.ebuild:
|
||||
Version bump.
|
||||
|
||||
*man-db-2.6.2 (24 Jul 2012)
|
||||
|
||||
24 Jul 2012; Mike Frysinger <vapier@gentoo.org> +man-db-2.6.2.ebuild:
|
||||
Version bump.
|
||||
|
||||
24 Jul 2012; Mike Frysinger <vapier@gentoo.org> man-db-2.6.1.ebuild,
|
||||
+files/man-db-2.6.1-no-gets.patch:
|
||||
Fix building with glibc-2.16+ #427252 by Oschtan.
|
||||
|
||||
24 May 2012; Mike Frysinger <vapier@gentoo.org> man-db-2.6.0.2.ebuild,
|
||||
man-db-2.6.1.ebuild:
|
||||
Inherit user for enewuser/etc...
|
||||
|
||||
04 May 2012; Jeff Horelick <jdhore@gentoo.org> man-db-2.6.0.2.ebuild,
|
||||
man-db-2.6.1.ebuild:
|
||||
dev-util/pkgconfig -> virtual/pkgconfig
|
||||
|
||||
23 Mar 2012; Tim Harder <radhermit@gentoo.org> -man-db-2.5.9.ebuild:
|
||||
Remove old.
|
||||
|
||||
*man-db-2.6.1 (23 Mar 2012)
|
||||
|
||||
23 Mar 2012; Tim Harder <radhermit@gentoo.org> +man-db-2.6.1.ebuild:
|
||||
Version bump (bug #404241).
|
||||
|
||||
01 Dec 2011; Mike Frysinger <vapier@gentoo.org> man-db-2.6.0.2.ebuild:
|
||||
Pull in pkg-config for building #392733 by Nikoli.
|
||||
|
||||
27 Nov 2011; Mike Frysinger <vapier@gentoo.org> man-db-2.6.0.2.ebuild:
|
||||
Drop autotools-utils, fix up SRC_URI mirror, add USE=zlib, and touch up
|
||||
style.
|
||||
|
||||
09 Jul 2011; Kacper Kowalik <xarthisius@gentoo.org> man-db-2.6.0.2.ebuild:
|
||||
Marked ~ppc64 wrt #371687
|
||||
|
||||
09 Jul 2011; Raúl Porcel <armin76@gentoo.org> man-db-2.6.0.2.ebuild:
|
||||
Add ~alpha/~ia64/~m68k/~s390/~sh/~sparc wrt #372785
|
||||
|
||||
23 Jun 2011; Brent Baude <ranger@gentoo.org> man-db-2.6.0.2.ebuild:
|
||||
Marking man-db-2.6.0.2 ~ppc for bug 371687
|
||||
|
||||
19 Jun 2011; Markus Meier <maekke@gentoo.org> man-db-2.6.0.2.ebuild:
|
||||
add ~arm, bug #371687
|
||||
|
||||
16 Jun 2011; Jeroen Roovers <jer@gentoo.org> man-db-2.6.0.2.ebuild,
|
||||
+files/man-db-2.6.0.2-flock.h.patch:
|
||||
Fix building with USE=-gdbm by Maciej Mrozowski.
|
||||
|
||||
15 Jun 2011; Matt Turner <mattst88@gentoo.org> man-db-2.6.0.2.ebuild:
|
||||
Added ~mips, bug 371687
|
||||
|
||||
15 Jun 2011; Jeroen Roovers <jer@gentoo.org> man-db-2.6.0.2.ebuild:
|
||||
Marked ~hppa (bug #371687).
|
||||
|
||||
*man-db-2.6.0.2 (15 Jun 2011)
|
||||
|
||||
15 Jun 2011; Jeroen Roovers <jer@gentoo.org> -man-db-2.5.7-r1.ebuild,
|
||||
-files/man-db-2.5.7-non-gnu-nroff.patch,
|
||||
-files/man-db-2.5.7-uncompressed-non-en.patch, +man-db-2.6.0.2.ebuild:
|
||||
Version bump. Introduce USE=static-libs.
|
||||
|
||||
13 Apr 2011; Ulrich Mueller <ulm@gentoo.org> man-db-2.5.7-r1.ebuild,
|
||||
man-db-2.5.9.ebuild:
|
||||
Don't PROVIDE virtual/man, it is a new-style virtual now. Bug 358839.
|
||||
|
||||
*man-db-2.5.9 (22 Dec 2010)
|
||||
|
||||
22 Dec 2010; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.9.ebuild:
|
||||
Version bump #349399 by Rafał Mużyło.
|
||||
|
||||
*man-db-2.5.7-r1 (23 Aug 2010)
|
||||
|
||||
23 Aug 2010; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.7-r1.ebuild,
|
||||
+files/man-db-2.5.7-uncompressed-non-en.patch:
|
||||
Add fix from upstream for issues with non-english uncompressed man pages
|
||||
#327347 by Florian.
|
||||
|
||||
29 Mar 2010; Mike Frysinger <vapier@gentoo.org> man-db-2.5.7.ebuild,
|
||||
+files/man-db-2.5.7-non-gnu-nroff.patch:
|
||||
Add fix from upstream for building with non-GNU nroff #309635 by Pun.
|
||||
|
||||
*man-db-2.5.7 (07 Mar 2010)
|
||||
|
||||
07 Mar 2010; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.7.ebuild:
|
||||
Version bump #307991 by C W Rose.
|
||||
|
||||
02 Oct 2009; Diego E. Pettenò <flameeyes@gentoo.org> man-db-2.5.6.ebuild:
|
||||
Fix doc installation.
|
||||
|
||||
*man-db-2.5.6 (02 Oct 2009)
|
||||
|
||||
02 Oct 2009; Diego E. Pettenò <flameeyes@gentoo.org>
|
||||
+man-db-2.5.6.ebuild, +files/man-db-2.5.6-fix-no-groff.patch:
|
||||
Version bump, with a patch to work with heirloom-doctools… for the most
|
||||
part. Note that man pages will not look as good as with sys-apps/man at
|
||||
least.
|
||||
|
||||
29 Sep 2009; Diego E. Pettenò <flameeyes@gentoo.org> man-db-2.5.3.ebuild,
|
||||
man-db-2.5.5.ebuild:
|
||||
Add groff dependency.
|
||||
|
||||
*man-db-2.5.5 (05 Apr 2009)
|
||||
|
||||
05 Apr 2009; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.5.ebuild:
|
||||
Version bump #264993 by Arfrever Frehtes Taifersar Arahesis.
|
||||
|
||||
*man-db-2.5.3 (17 Nov 2008)
|
||||
|
||||
17 Nov 2008; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.3.ebuild:
|
||||
Version bump.
|
||||
|
||||
*man-db-2.5.2 (25 Oct 2008)
|
||||
|
||||
25 Oct 2008; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.2.ebuild:
|
||||
Version bump.
|
||||
|
||||
*man-db-2.5.1 (24 Feb 2008)
|
||||
|
||||
24 Feb 2008; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.1.ebuild:
|
||||
Version bump.
|
||||
|
||||
*man-db-2.4.4 (13 Apr 2007)
|
||||
|
||||
13 Apr 2007; Mike Frysinger <vapier@gentoo.org>
|
||||
+files/man-db-2.4.4-sections.patch, +man-db-2.4.4.ebuild:
|
||||
Version bump #173919 by Pierre-Yves Rofes.
|
||||
|
||||
*man-db-2.4.3-r1 (06 Oct 2006)
|
||||
|
||||
06 Oct 2006; Mike Frysinger <vapier@gentoo.org>
|
||||
+files/man-db-2.4.3-sections.patch, +man-db-2.4.3-r1.ebuild:
|
||||
Respect more man sections #149857.
|
||||
|
||||
*man-db-2.4.3 (21 Feb 2006)
|
||||
|
||||
21 Feb 2006; Mike Frysinger <vapier@gentoo.org> :
|
||||
Initial import. Ebuild submitted by me.
|
||||
@ -1,29 +1,6 @@
|
||||
-----BEGIN PGP SIGNED MESSAGE-----
|
||||
Hash: SHA256
|
||||
|
||||
AUX man-db.cron 196 SHA256 8aa4346f537c846b458705eaa4021504f7f8ea40488485263b5e9abac3966ff8 SHA512 0d57adab78ea2ba4023c7e46ae892e4eaef64c49be12696f5f5d61b11d66247ca3eef50f545364539bbf5ef7a3119623a9f46a76ed9069455815d239ee61f061 WHIRLPOOL 4451db102b25c63ad84215ed163a8f05c5a60235528bd8096634342aeeaa41e85065b01b55da2c1a2a40f0b1d8f827f462a3288f9caa877430064e0fb3047596
|
||||
DIST man-db-2.6.6.tar.xz 1448576 SHA256 7da90f8d8df91e0e682769d50f4bdb905f525b5d0f01e7e5b8cc3c6da45f66c3 SHA512 7abb8609e1113dd1852076c4c71557c3b376fefa7e42fa39198f7b882f4b3fe733983045742c4b3903be2c953c09c724f735619b4396283a4ed2ad7816aaf4ec WHIRLPOOL e5c7b41afd7374bb1df3024134f9bd8a1af42b5ad63d4e516e946b0e8ccc88bafc055fdba707b0c764030e92748b225a72672bfe07e2bc3e8d78526d17f5ff72
|
||||
DIST man-db-2.6.7.1.tar.xz 1452280 SHA256 8d65559838fccca774e3ef7c15c073180c786e728785c735e136297facca41fc SHA512 91e1036701174c5623a4cf4208a93130822dc9c61ffd9c6bf0dddaf7c4c5b2401e6238f60578dfa81a11d67d360cbc4d45af920542fb4a0624c7169b17a618f8 WHIRLPOOL 30c510289d1444b3231704c22ddf2c17b58d4aa8b9e8a94552537fbc971b23f16b2c43a32fa9f85fb7b8eca2fd71a73d52955fcd0ab24ef49d3903832eafecf7
|
||||
DIST man-db-2.7.1.tar.xz 1498272 SHA256 c4876204a3fafb4d8ccc1d172c0431ee581d95558cbd6c4e79caca7717049e0e SHA512 246d833bd456a6dd178035b4be37dc810872b6480145d6c2c605deeb664d105b285f61827b739717d6936de28c4275a99ed8fae2d173b16c1c0673b1171a65ce WHIRLPOOL 10c56b861411674f4ca92bafe7c0faf4f6c2cbcc6b2db8f87f2e2ee59152797667619e60ae50cae33ee21ff3e58cb7b10627ce2f16adf65fd8794b0fabb71290
|
||||
EBUILD man-db-2.6.6.ebuild 2291 SHA256 598de59d854a7014e0d96f2f5f9c8b1ce60bf5865edf75fc5724445925032621 SHA512 6d0cd5572589e8c036601b0f438d89c7ea997c7781d2ee36a443ef556c614c06be2fbc8d6630676b60113cdf35f8a2ec869ce7c295dfd6b5013277b19bf2418f WHIRLPOOL ce3a83cbe1dd9acbf0bb5e02780477bd1d0ea844d8f1e9e06627bdbf70dd6d545f6357c602b9ddadd332d1c0f40d7a734b92230699b295856c15d4bab560886a
|
||||
EBUILD man-db-2.6.7.1.ebuild 2313 SHA256 743dd2a0d889186b7425298e171151b9e15bf54a4a9a3e4c882c7bbb42932a5b SHA512 b0435998dc634ba3e84b7c897d138b97e5afe950f8df0e548cb5d4d84b1976dcae2792e8a05bd105a75249c6c355c91011c865afed9b16655ae93a05876c5d0e WHIRLPOOL 67aca8ec0179da849e66398c63c7881ac3c39d86a682d4c361bea93ec8a505d023cc3c86f891c693db2530cea2bc9aad665b9013cea0a79f10b73b0640ff99c9
|
||||
EBUILD man-db-2.7.1.ebuild 2572 SHA256 d715e3d93934d6b8feb18dc20f36302da9f8154392951fcf9b2e355277c00800 SHA512 8392198c7c99232bc1ac8773210e4810ce8b8ee3f1dbc41831afea2ffda187d056b20ff31668f4b6cf7a49d867ff0c71337923da0b8ccff04f3ed14add4cff1d WHIRLPOOL 0abfe09c21aad68aa1e7d3d75a094919fc5826a341136125de60c719f47b90b6a83ae9860619221aab3fe1e2571ccffa61751c2100cbecd0ccdd785b1147942b
|
||||
MISC ChangeLog 10778 SHA256 61a539cf1188343ade360c912c661e1519caecb69a988ca71a72851112a5522a SHA512 81a3235e84a62bc6f8d14c753676d1263f93d76707ab0ea4d02f0c445c34c45b0f4ae3a6e81152186abd81a99ca3d414874214cdcd7cfc7261d84d2f664e2e76 WHIRLPOOL 0fa35ef0a80cf94f055c16cb547be92ecbbeaa1bff2d03b48b74e14817fb118a5859d75a02e1c32fce7ed7396b3a062172e88a207a87d7fd3431b62122acf961
|
||||
MISC metadata.xml 164 SHA256 f5f2891f2a4791cd31350bb2bb572131ad7235cd0eeb124c9912c187ac10ce92 SHA512 8eb0d5153d388f6ea069c64b93882244816a0a09aecc0d73cb872121ce0eb24c5ccafa96aad0b620b2300f319e1af101fa7fa6c5d0d561719d49bb07da0a2eca WHIRLPOOL 11a1441bddb7a6c69653c663902b7da5767ae6ad515ac2aabfc42fe37927a1ccc21472deeee454009ff720201a41c3e4a912df42661a0a87150fb46126da2d52
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
Version: GnuPG v2
|
||||
|
||||
iQIcBAEBCAAGBQJU4bm3AAoJECn7Dp7HGe4gntUP/26mGFX+x/yRlRQ1fbCJHY+e
|
||||
gswdSnpcNLlp+LHKvRtA4vPkCZgMhWqaq7W+DtqGip7HjyoPYMNcl6JVds3BKLO8
|
||||
sv6uizaXBvH7mUuf8Ugvm+8LMb4+wdwo4nwcgwjlLgeOogb9pIj+EmYVqDvXCAOq
|
||||
K7ZD9Ncg4eiJzMV7I1XFLaFKPkSM45Ji3CeX09opCI9OVHOOxFvpixyrWvba2bFb
|
||||
c12Eegrzj4rH2rU7QXv7Js7v2Q1UWLjh8H96AR0ZxvlMQ7a4lEVALJ/5eOGVGDkP
|
||||
hB0uW8BCHHbckWPbA/SEhMFEQwGXM9ddencVAlLxXlvMmof7zwoDdgejSx7E+9WF
|
||||
CBmAwUATlwib9tjTBV5pogglrDRyfEyoZqOTvxxVwd3oyWX/aZKh1he9wLu4baYF
|
||||
AzG7g8h6WcLEViPYReTguFhBMg0OdbN255ASD+Flu8QdeZA6nVOWviGMUefmpHEw
|
||||
GKmt4raxzmKnStNCg00Vd0/WSOWtg//xh+OjiBo4ezNaclf2eRysDYBuWM5UNGV0
|
||||
b5VEZC4lQYcARKPRWdRoe19s8yKGWTxnm6Td+uiwFru4YL6OxhzjrIkj89pFAsyz
|
||||
Quqm+gDh08ghhzOA9uWmEsv2dPdjF++1Boygdp1nBwUYv6yDEoQQICVdFy4EkRyI
|
||||
iOEXJFcho1E0RvkTEi/O
|
||||
=rgMw
|
||||
-----END PGP SIGNATURE-----
|
||||
AUX man-db.cron 217 SHA256 5b2e690a12e6c5335ca3e7d180baa367d54adf18647f0e4a821f14b0ae45ade0 SHA512 81a7082d7f0cdf17d8277af7142aaa98feb8c12cf41bb96c12af53fdd3e436a4d15a57ef76fb90390133cfdb25e1bb1b16e17a39b39b6517afc529b871426331 WHIRLPOOL bda82f5a771cbe68077430798fdb9cacf9d2011f2ae598cba164bf0a2fb95c30348bba94208f78112cfd8bf19741c13699b940650b5c29755a2c13d39e56abe6
|
||||
DIST man-db-2.7.6.1.tar.xz 1541316 SHA256 08edbc52f24aca3eebac429b5444efd48b9b90b9b84ca0ed5507e5c13ed10f3f SHA512 623c5e7f8b7c289908b2c926f8777293b8d39aeceef0d2509d701a8b0bfa81408650f655c8608318221786c751a79ee91124b07993de5298cd7fa6d8bb737301 WHIRLPOOL 10ca0e397a53354ba6687c4057c8d8b7f57c0a97b806727ee05285a5aa1d8f2d17eae9f532b0edb364edde149108c765f812e4ecd6a28932cdceef56e0b5dbee
|
||||
EBUILD man-db-2.7.6.1-r2.ebuild 3145 SHA256 d69d4a0bd97c49bdbc87543269e4111394a7ef6f49020a4001a771649a0951a2 SHA512 323d3f53ce81d65d6012b310db9b31acb732bb457b0cd1a5e36d5d741668006711e3ed6ca4155c189c0ae59dd747ee36c67c63563ff08a3df0fb06100eac8651 WHIRLPOOL 64b1cff7a4286fd2a09b620be4519a0753cbef2aff3a6f4f9cda5dbba0fb3a3d025a5f5685a4228d23bb3aaefae96d7a13d9d8f99c25600256488ee58687aad0
|
||||
MISC ChangeLog 9327 SHA256 cb45d2db7d1cbf34fdbf354f7a6673b5556dbbe81ac6082ef1ee1994fec4ae8f SHA512 aa4100bd98703ab350cea86f9b73c6d8088e6a3f91eaa073db809d079d964387e53038a4438081bf939d06f1addf4d40332847556c0ff8c699b2ad8d2719c2e8 WHIRLPOOL 6fccb055c9e7e41e0c8078940353033c7f1154fc7f7c5c0b9671e0ecc2991c35195aa0e1ff53a52e157b8dd16a7909b76d932ccc210239c9231e24190d51eaa1
|
||||
MISC ChangeLog-2015 10778 SHA256 61a539cf1188343ade360c912c661e1519caecb69a988ca71a72851112a5522a SHA512 81a3235e84a62bc6f8d14c753676d1263f93d76707ab0ea4d02f0c445c34c45b0f4ae3a6e81152186abd81a99ca3d414874214cdcd7cfc7261d84d2f664e2e76 WHIRLPOOL 0fa35ef0a80cf94f055c16cb547be92ecbbeaa1bff2d03b48b74e14817fb118a5859d75a02e1c32fce7ed7396b3a062172e88a207a87d7fd3431b62122acf961
|
||||
MISC metadata.xml 342 SHA256 c81419f3ac855515743a636bfbd46d0534455d7d2d20f46e907f95dcd04af484 SHA512 553cf56ab0b3b6c9403612a7ccd1db073f557b432c68d60adb4716169250a9986b4c112023f6ae200a6fbc2df31cdafd9ab08e04d92ca35cffb81f690bd43d79 WHIRLPOOL 155a9ad5b173dd5ac75e4c93315b0ddd9ba5ec6299a778c63e2281f7aed499cae99e573585270fdd5d7e29b93160ac967785eeeaa78f9a933147764d56107fff
|
||||
|
||||
@ -1,10 +1,11 @@
|
||||
#!/bin/sh
|
||||
|
||||
# Use same perms/settings as the ebuild.
|
||||
if [ ! -d /var/cache/man ]; then
|
||||
mkdir -p /var/cache/man
|
||||
chown man:root /var/cache/man
|
||||
chmod 2755 /var/cache/man
|
||||
cachedir="/var/cache/man"
|
||||
if [ ! -d "${cachedir}" ]; then
|
||||
mkdir -p "${cachedir}"
|
||||
chown man:man "${cachedir}"
|
||||
chmod 0755 "${cachedir}"
|
||||
fi
|
||||
|
||||
exec nice mandb --quiet
|
||||
|
||||
@ -1,81 +0,0 @@
|
||||
# Copyright 1999-2015 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-apps/man-db/man-db-2.6.6.ebuild,v 1.13 2015/01/13 14:31:25 polynomial-c Exp $
|
||||
|
||||
EAPI="4"
|
||||
|
||||
inherit eutils user
|
||||
|
||||
DESCRIPTION="a man replacement that utilizes berkdb instead of flat files"
|
||||
HOMEPAGE="http://www.nongnu.org/man-db/"
|
||||
SRC_URI="mirror://nongnu/${PN}/${P}.tar.xz"
|
||||
|
||||
LICENSE="GPL-3"
|
||||
SLOT="0"
|
||||
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~arm-linux ~x86-linux"
|
||||
IUSE="berkdb +gdbm nls selinux static-libs zlib"
|
||||
|
||||
CDEPEND="dev-libs/libpipeline
|
||||
berkdb? ( sys-libs/db )
|
||||
gdbm? ( sys-libs/gdbm )
|
||||
!berkdb? ( !gdbm? ( sys-libs/gdbm ) )
|
||||
sys-apps/groff
|
||||
zlib? ( sys-libs/zlib )
|
||||
!sys-apps/man"
|
||||
DEPEND="${CDEPEND}
|
||||
app-arch/xz-utils
|
||||
virtual/pkgconfig
|
||||
nls? (
|
||||
>=app-text/po4a-0.45
|
||||
sys-devel/gettext
|
||||
)"
|
||||
RDEPEND="${CDEPEND}
|
||||
selinux? ( sec-policy/selinux-mandb )
|
||||
"
|
||||
|
||||
pkg_setup() {
|
||||
# Create user now as Makefile in src_install does setuid/chown
|
||||
enewgroup man 15
|
||||
enewuser man 13 -1 /usr/share/man man
|
||||
|
||||
if (use gdbm && use berkdb) || (use !gdbm && use !berkdb) ; then #496150
|
||||
ewarn "Defaulting to USE=gdbm due to ambiguous berkdb/gdbm USE flag settings"
|
||||
fi
|
||||
}
|
||||
|
||||
src_configure() {
|
||||
export ac_cv_lib_z_gzopen=$(usex zlib)
|
||||
econf \
|
||||
--docdir='$(datarootdir)'/doc/${PF} \
|
||||
--enable-setuid \
|
||||
--with-sections="1 1p 8 2 3 3p 4 5 6 7 9 0p tcl n l p o 1x 2x 3x 4x 5x 6x 7x 8x" \
|
||||
$(use_enable nls) \
|
||||
$(use_enable static-libs static) \
|
||||
--with-db=$(usex gdbm gdbm $(usex berkdb db gdbm))
|
||||
}
|
||||
|
||||
src_install() {
|
||||
default
|
||||
dodoc docs/{HACKING,TODO}
|
||||
prune_libtool_files
|
||||
|
||||
exeinto /etc/cron.daily
|
||||
newexe "${FILESDIR}"/man-db.cron man-db #289884
|
||||
|
||||
keepdir /var/cache/man
|
||||
fowners man:0 /var/cache/man
|
||||
fperms 2755 /var/cache/man
|
||||
}
|
||||
|
||||
pkg_preinst() {
|
||||
if [[ -f ${EROOT}var/cache/man/whatis ]] ; then
|
||||
einfo "Cleaning ${EROOT}var/cache/man from sys-apps/man"
|
||||
find "${EROOT}"var/cache/man -type f '!' '(' -name index.bt -o -name index.db ')' -delete
|
||||
fi
|
||||
if [[ ! -g ${EROOT}var/cache/man ]] ; then
|
||||
einfo "Resetting permissions on ${EROOT}var/cache/man" #447944
|
||||
mkdir -p "${EROOT}var/cache/man"
|
||||
chown -R man:0 "${EROOT}"var/cache/man
|
||||
find "${EROOT}"var/cache/man -type d '!' -perm /g=s -exec chmod 2755 {} +
|
||||
fi
|
||||
}
|
||||
@ -1,81 +0,0 @@
|
||||
# Copyright 1999-2015 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-apps/man-db/man-db-2.6.7.1.ebuild,v 1.3 2015/01/13 14:31:25 polynomial-c Exp $
|
||||
|
||||
EAPI="4"
|
||||
|
||||
inherit eutils user
|
||||
|
||||
DESCRIPTION="a man replacement that utilizes berkdb instead of flat files"
|
||||
HOMEPAGE="http://www.nongnu.org/man-db/"
|
||||
SRC_URI="mirror://nongnu/${PN}/${P}.tar.xz"
|
||||
|
||||
LICENSE="GPL-3"
|
||||
SLOT="0"
|
||||
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~arm-linux ~x86-linux"
|
||||
IUSE="berkdb +gdbm nls selinux static-libs zlib"
|
||||
|
||||
CDEPEND=">=dev-libs/libpipeline-1.3.0
|
||||
berkdb? ( sys-libs/db )
|
||||
gdbm? ( sys-libs/gdbm )
|
||||
!berkdb? ( !gdbm? ( sys-libs/gdbm ) )
|
||||
sys-apps/groff
|
||||
zlib? ( sys-libs/zlib )
|
||||
!sys-apps/man"
|
||||
DEPEND="${CDEPEND}
|
||||
app-arch/xz-utils
|
||||
virtual/pkgconfig
|
||||
nls? (
|
||||
>=app-text/po4a-0.45
|
||||
sys-devel/gettext
|
||||
)"
|
||||
RDEPEND="${CDEPEND}
|
||||
selinux? ( sec-policy/selinux-mandb )
|
||||
"
|
||||
|
||||
pkg_setup() {
|
||||
# Create user now as Makefile in src_install does setuid/chown
|
||||
enewgroup man 15
|
||||
enewuser man 13 -1 /usr/share/man man
|
||||
|
||||
if (use gdbm && use berkdb) || (use !gdbm && use !berkdb) ; then #496150
|
||||
ewarn "Defaulting to USE=gdbm due to ambiguous berkdb/gdbm USE flag settings"
|
||||
fi
|
||||
}
|
||||
|
||||
src_configure() {
|
||||
export ac_cv_lib_z_gzopen=$(usex zlib)
|
||||
econf \
|
||||
--docdir='$(datarootdir)'/doc/${PF} \
|
||||
--enable-setuid \
|
||||
--with-sections="1 1p 8 2 3 3p 4 5 6 7 9 0p tcl n l p o 1x 2x 3x 4x 5x 6x 7x 8x" \
|
||||
$(use_enable nls) \
|
||||
$(use_enable static-libs static) \
|
||||
--with-db=$(usex gdbm gdbm $(usex berkdb db gdbm))
|
||||
}
|
||||
|
||||
src_install() {
|
||||
default
|
||||
dodoc docs/{HACKING,TODO}
|
||||
prune_libtool_files
|
||||
|
||||
exeinto /etc/cron.daily
|
||||
newexe "${FILESDIR}"/man-db.cron man-db #289884
|
||||
|
||||
keepdir /var/cache/man
|
||||
fowners man:0 /var/cache/man
|
||||
fperms 2755 /var/cache/man
|
||||
}
|
||||
|
||||
pkg_preinst() {
|
||||
if [[ -f ${EROOT}var/cache/man/whatis ]] ; then
|
||||
einfo "Cleaning ${EROOT}var/cache/man from sys-apps/man"
|
||||
find "${EROOT}"var/cache/man -type f '!' '(' -name index.bt -o -name index.db ')' -delete
|
||||
fi
|
||||
if [[ ! -g ${EROOT}var/cache/man ]] ; then
|
||||
einfo "Resetting permissions on ${EROOT}var/cache/man" #447944
|
||||
mkdir -p "${EROOT}var/cache/man"
|
||||
chown -R man:0 "${EROOT}"var/cache/man
|
||||
find "${EROOT}"var/cache/man -type d '!' -perm /g=s -exec chmod 2755 {} +
|
||||
fi
|
||||
}
|
||||
@ -1,8 +1,7 @@
|
||||
# Copyright 1999-2015 Gentoo Foundation
|
||||
# Copyright 1999-2017 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-apps/man-db/man-db-2.7.1.ebuild,v 1.3 2015/02/16 09:34:44 haubi Exp $
|
||||
|
||||
EAPI="4"
|
||||
EAPI=5
|
||||
|
||||
inherit eutils user versionator
|
||||
|
||||
@ -12,11 +11,11 @@ SRC_URI="mirror://nongnu/${PN}/${P}.tar.xz"
|
||||
|
||||
LICENSE="GPL-3"
|
||||
SLOT="0"
|
||||
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~arm-linux ~x86-linux"
|
||||
IUSE="berkdb +gdbm nls selinux static-libs zlib"
|
||||
KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-linux ~arm-linux ~x86-linux"
|
||||
IUSE="berkdb +gdbm +manpager nls selinux static-libs zlib"
|
||||
|
||||
CDEPEND=">=dev-libs/libpipeline-1.4.0
|
||||
berkdb? ( sys-libs/db )
|
||||
berkdb? ( sys-libs/db:= )
|
||||
gdbm? ( sys-libs/gdbm )
|
||||
!berkdb? ( !gdbm? ( sys-libs/gdbm ) )
|
||||
sys-apps/groff
|
||||
@ -32,6 +31,7 @@ DEPEND="${CDEPEND}
|
||||
RDEPEND="${CDEPEND}
|
||||
selinux? ( sec-policy/selinux-mandb )
|
||||
"
|
||||
PDEPEND="manpager? ( app-text/manpager )"
|
||||
|
||||
pkg_setup() {
|
||||
# Create user now as Makefile in src_install does setuid/chown
|
||||
@ -49,10 +49,16 @@ src_configure() {
|
||||
--docdir='$(datarootdir)'/doc/${PF} \
|
||||
--with-systemdtmpfilesdir="${EPREFIX}"/usr/lib/tmpfiles.d \
|
||||
--enable-setuid \
|
||||
--enable-cache-owner=man \
|
||||
--with-sections="1 1p 8 2 3 3p 4 5 6 7 9 0p tcl n l p o 1x 2x 3x 4x 5x 6x 7x 8x" \
|
||||
$(use_enable nls) \
|
||||
$(use_enable static-libs static) \
|
||||
--with-db=$(usex gdbm gdbm $(usex berkdb db gdbm))
|
||||
|
||||
# Disable color output from groff so that the manpager can add it. #184604
|
||||
sed -i \
|
||||
-e '/^#DEFINE.*\<[nt]roff\>/{s:^#::;s:$: -c:}' \
|
||||
src/man_db.conf || die
|
||||
}
|
||||
|
||||
src_install() {
|
||||
@ -62,22 +68,35 @@ src_install() {
|
||||
|
||||
exeinto /etc/cron.daily
|
||||
newexe "${FILESDIR}"/man-db.cron man-db #289884
|
||||
|
||||
keepdir /var/cache/man
|
||||
fowners man:0 /var/cache/man
|
||||
fperms 2755 /var/cache/man
|
||||
}
|
||||
|
||||
pkg_preinst() {
|
||||
if [[ -f ${EROOT}var/cache/man/whatis ]] ; then
|
||||
einfo "Cleaning ${EROOT}var/cache/man from sys-apps/man"
|
||||
find "${EROOT}"var/cache/man -type f '!' '(' -name index.bt -o -name index.db ')' -delete
|
||||
local cachedir="${EROOT}var/cache/man"
|
||||
# If the system was already exploited, and the attacker is hiding in the
|
||||
# cachedir of the old man-db, let's wipe them out.
|
||||
# see bug #602588 comment 18
|
||||
local _replacing_version=
|
||||
local _setgid_vuln=0
|
||||
for _replacing_version in ${REPLACING_VERSIONS}; do
|
||||
if version_is_at_least '2.7.6.1-r2' "${_replacing_version}"; then
|
||||
debug-print "Skipping security bug #602588 ... existing installation (${_replacing_version}) should not be affected!"
|
||||
else
|
||||
_setgid_vuln=1
|
||||
debug-print "Applying cleanup for security bug #602588"
|
||||
fi
|
||||
if [[ ! -g ${EROOT}var/cache/man ]] ; then
|
||||
einfo "Resetting permissions on ${EROOT}var/cache/man" #447944
|
||||
mkdir -p "${EROOT}var/cache/man"
|
||||
chown -R man:0 "${EROOT}"var/cache/man
|
||||
find "${EROOT}"var/cache/man -type d '!' -perm /g=s -exec chmod 2755 {} +
|
||||
done
|
||||
[[ ${_setgid_vuln} -eq 1 ]] && rm -rf "${cachedir}"
|
||||
|
||||
# Fall back to recreating the cachedir
|
||||
if [[ ! -d ${cachedir} ]] ; then
|
||||
mkdir -p "${cachedir}" || die
|
||||
chown man:man "${cachedir}" || die
|
||||
fi
|
||||
|
||||
# Update the whatis cache
|
||||
if [[ -f ${cachedir}/whatis ]] ; then
|
||||
einfo "Cleaning ${cachedir} from sys-apps/man"
|
||||
find "${cachedir}" -type f '!' '(' -name index.bt -o -name index.db ')' -delete
|
||||
fi
|
||||
}
|
||||
|
||||
@ -1,5 +1,11 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
|
||||
<pkgmetadata>
|
||||
<herd>base-system</herd>
|
||||
<maintainer type="project">
|
||||
<email>base-system@gentoo.org</email>
|
||||
<name>Gentoo Base System</name>
|
||||
</maintainer>
|
||||
<use>
|
||||
<flag name="manpager">Enable manpager wrapper for colorizing output</flag>
|
||||
</use>
|
||||
</pkgmetadata>
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user