Merge pull request #562 from dm0-/glsa

Sync GLSAs
This commit is contained in:
David Michael 2017-07-10 12:36:42 -07:00 committed by GitHub
commit ee7a21794d
50 changed files with 1230 additions and 914 deletions

View File

@ -0,0 +1,4 @@
AUX manpager.c 1809 SHA256 bb90bcb9d2efff5db0957b56fdb20bf97ac1aacfe4f71989833dcfa34704c620 SHA512 4f827429dc46993010d0096cb352920dfdcaf2cc97bf10e2155dfea3fda601c011467be65ca3f2e3f5c44cb26de0fd9eb58f7d875f75fd5f1db4b2c6cdabdca2 WHIRLPOOL bb26d082896f41de845fcbe9b5d660b28a14f8afad4f9c266d5fbc04c967858ab72d3b95569cac29e4cd12278ddb6e9589b5fb8d18d157632d6d5adb17e874a8
EBUILD manpager-1.ebuild 645 SHA256 ffb747a26a5068eaff117254b1e74a1bac4829f65aab71d73460fa3aca32655b SHA512 67d6377beeb04b161406042b0088a46355014daee05cfce125da2ca00deb1ae70b4d6c1714f26014a25215cdca61810e79bd0dad162b08618330604d8b563d7e WHIRLPOOL 49884adade6e5061dba8c9ec5b4ab31bea30ca9ef38005f2a9964a4929b8051f1116b4d2a0aa1e82fb65ce40a997232b9195933db9e5af8e960c3f1a8c98955d
MISC ChangeLog 970 SHA256 476449bcf02927a7044880a4a6760b066e42e9e43d85aa0b7818f4678cac352d SHA512 bda470cedb820caa752f5e40b3ea12ee4dff162591cd443799fdc0df24153c1ead03f5dfefda32a8d22f0b4ac55cb0a8c9d2ebb0c682a500f872956582ee6eee WHIRLPOOL 8db067486f23494239da80bff8a3435caae3eb803f2ebc666103da3e065decd961aebaa2d81384f5bab234d8cfd9a4030e6cd60e222f2a69cf0900c81986e7e1
MISC metadata.xml 253 SHA256 d82c33ef453113a5c1ebe250dcba373c22934a69b0a86c6ab15a5ca589c25b91 SHA512 54a9069aeb4165d2dff3d473c8001bc51613aac9dff3f7f5e9971a9891a737a31511ffa11cbd523febe581ac1d9de2bdf2f40410f0c4239138f2ccca3ef15555 WHIRLPOOL e5aee23acff864609953a1e4de768f0e4aef704b44c53c021f28573e1ca5c99f1a46d92935ecec2449f7b4419a36d8373127d0ecfa8d7bae72d835e1839eb3f8

View File

@ -0,0 +1,74 @@
/*
* Wrapper to help enable colorized man page output.
* Only works with PAGER=less
*
* https://bugs.gentoo.org/184604
* https://unix.stackexchange.com/questions/108699/documentation-on-less-termcap-variables
*
* Copyright 2003-2015 Gentoo Foundation
* Distributed under the terms of the GNU General Public License v2
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#define COLOR(c, b) "\e[" #c ";" #b "m"
#define _SE(termcap, col) setenv("LESS_TERMCAP_" #termcap, col, 0)
#define SE(termcap, c, b) _SE(termcap, COLOR(c, b))
static int usage(void)
{
puts(
"manpager: display man pages with color!\n"
"\n"
"Usage:\n"
"\texport MANPAGER=manpager\n"
"\tman man\n"
"\n"
"To control the colorization, set these env vars:\n"
"\tLESS_TERMCAP_mb - start blinking\n"
"\tLESS_TERMCAP_md - start bolding\n"
"\tLESS_TERMCAP_me - stop bolding\n"
"\tLESS_TERMCAP_us - start underlining\n"
"\tLESS_TERMCAP_ue - stop underlining\n"
"\tLESS_TERMCAP_so - start standout (reverse video)\n"
"\tLESS_TERMCAP_se - stop standout (reverse video)\n"
"\n"
"You can do so by doing:\n"
"\texport LESS_TERMCAP_md=\"$(printf '\\e[1;36m')\"\n"
"\n"
"Run 'less --help' or 'man less' for more info"
);
return 0;
}
int main(int argc, char *argv[])
{
if (argc == 2 && (!strcmp(argv[1], "-h") || !strcmp(argv[1], "--help")))
return usage();
/* Blinking. */
SE(mb, 5, 31); /* Start. */
/* Bolding. */
SE(md, 1, 34); /* Start. */
SE(me, 0, 0); /* Stop. */
/* Underlining. */
SE(us, 4, 36); /* Start. */
SE(ue, 0, 0); /* Stop. */
#if 0
/* Standout (reverse video). */
SE(so, 1, 32); /* Start. */
SE(se, 0, 0); /* Stop. */
#endif
argv[0] = getenv("PAGER") ? : "less";
execvp(argv[0], argv);
perror("could not launch PAGER");
return 1;
}

View File

@ -0,0 +1,31 @@
# Copyright 1999-2016 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
EAPI="5"
inherit toolchain-funcs
DESCRIPTION="Enable colorization of man pages"
HOMEPAGE="http://www.gentoo.org/"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-linux ~arm-linux ~x86-linux"
IUSE=""
S=${WORKDIR}
src_compile() {
local cmd=(
$(tc-getCC) ${CFLAGS} ${CPPFLAGS} ${LDFLAGS}
"${FILESDIR}"/manpager.c -o ${PN}
)
echo "${cmd[@]}"
"${cmd[@]}" || die
}
src_install() {
dobin ${PN}
insinto /etc/env.d
echo "MANPAGER=manpager" | newins - 00manpager
}

View File

@ -0,0 +1,8 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<maintainer type="project">
<email>base-system@gentoo.org</email>
<name>Gentoo Base System</name>
</maintainer>
</pkgmetadata>

View File

@ -1,248 +0,0 @@
# ChangeLog for dev-libs/libpipeline
# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2
# $Header: /var/cvsroot/gentoo-x86/dev-libs/libpipeline/ChangeLog,v 1.73 2015/02/28 14:03:35 ago Exp $
28 Feb 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
Stable for ia64, wrt bug #535118
27 Feb 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
Stable for sparc, wrt bug #535118
24 Feb 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
Stable for alpha, wrt bug #535118
26 Jan 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
Stable for x86, wrt bug #535118
18 Jan 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
Stable for ppc64, wrt bug #535118
17 Jan 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
Stable for ppc, wrt bug #535118
09 Jan 2015; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.4.0.ebuild:
Stable for amd64, wrt bug #535118
08 Jan 2015; Jeroen Roovers <jer@gentoo.org> libpipeline-1.4.0.ebuild:
Stable for HPPA (bug #535118).
08 Jan 2015; Markus Meier <maekke@gentoo.org> libpipeline-1.4.0.ebuild:
arm stable, bug #535118
27 Oct 2014; Mike Frysinger <vapier@gentoo.org> libpipeline-1.2.5.ebuild:
Mark arm64/m68k/s390/sh stable.
*libpipeline-1.4.0 (26 Oct 2014)
26 Oct 2014; Tim Harder <radhermit@gentoo.org> +libpipeline-1.4.0.ebuild:
Version bump.
*libpipeline-1.3.1 (23 Sep 2014)
23 Sep 2014; Tim Harder <radhermit@gentoo.org> +libpipeline-1.3.1.ebuild:
Version bump.
17 May 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.5.ebuild:
Stable for alpha, wrt bug #502722
14 May 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.5.ebuild:
Stable for sparc, wrt bug #502722
13 May 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.5.ebuild:
Stable for ia64, wrt bug #502722
20 Apr 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.5.ebuild:
Stable for ppc64, wrt bug #502722
13 Apr 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.5.ebuild:
Stable for ppc, wrt bug #502722
05 Apr 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.5.ebuild:
Stable for x86, wrt bug #502722
28 Mar 2014; Tim Harder <radhermit@gentoo.org> -libpipeline-1.1.0.ebuild,
-libpipeline-1.2.0.ebuild, -libpipeline-1.2.1.ebuild,
-libpipeline-1.2.2.ebuild, -libpipeline-1.2.3.ebuild:
Remove old.
*libpipeline-1.3.0 (28 Mar 2014)
28 Mar 2014; Tim Harder <radhermit@gentoo.org> +libpipeline-1.3.0.ebuild:
Version bump.
26 Mar 2014; Chema Alonso <nimiux@gentoo.org> libpipeline-1.2.5.ebuild:
Stable for amd64 wrt bug #502722
16 Mar 2014; Markus Meier <maekke@gentoo.org> libpipeline-1.2.5.ebuild:
arm stable, bug #502722
16 Mar 2014; Jeroen Roovers <jer@gentoo.org> libpipeline-1.2.5.ebuild:
Stable for HPPA (bug #502722).
18 Jan 2014; Mike Frysinger <vapier@gentoo.org> libpipeline-1.2.4.ebuild,
libpipeline-1.2.5.ebuild:
Add arm64 love.
16 Jan 2014; Mike Frysinger <vapier@gentoo.org> libpipeline-1.2.4.ebuild:
Mark m68k/s390/sh stable.
15 Jan 2014; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.4.ebuild:
Stable for ia64, wrt bug #492044
03 Jan 2014; Matt Turner <mattst88@gentoo.org> libpipeline-1.2.4.ebuild:
alpha stable, bug 492044.
24 Dec 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.4.ebuild:
Stable for x86, wrt bug #492044
23 Dec 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.4.ebuild:
Stable for sparc, wrt bug #492044
22 Dec 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.4.ebuild:
Stable for ppc64, wrt bug #492044
21 Dec 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.4.ebuild:
Stable for ppc, wrt bug #492044
*libpipeline-1.2.5 (21 Dec 2013)
21 Dec 2013; Tim Harder <radhermit@gentoo.org> +libpipeline-1.2.5.ebuild:
Version bump.
20 Dec 2013; Chema Alonso <nimiux@gentoo.org> libpipeline-1.2.4.ebuild:
Stable for amd64 wrt bug #492044
01 Dec 2013; Markus Meier <maekke@gentoo.org> libpipeline-1.2.4.ebuild:
arm stable, bug #492044
26 Nov 2013; Jeroen Roovers <jer@gentoo.org> libpipeline-1.2.4.ebuild:
Stable for HPPA (bug #492044).
02 Jul 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
Stable for sh, wrt bug #473242
30 Jun 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
Stable for s390, wrt bug #473242
29 Jun 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
Stable for sparc, wrt bug #473242
26 Jun 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
Stable for ia64, wrt bug #473242
26 Jun 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
Stable for alpha, wrt bug #473242
25 Jun 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
Stable for ppc64, wrt bug #473242
24 Jun 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.3.ebuild:
Stable for ppc, wrt bug #473242
14 Jun 2013; Jeroen Roovers <jer@gentoo.org> libpipeline-1.2.3.ebuild:
Stable for HPPA (bug #473242).
14 Jun 2013; Sergey Popov <pinkbyte@gentoo.org> libpipeline-1.2.3.ebuild:
Stable on arm, wrt bug #473242
14 Jun 2013; Sergey Popov <pinkbyte@gentoo.org> libpipeline-1.2.3.ebuild:
Stable on amd64 and x86, wrt bug #473242
*libpipeline-1.2.4 (14 Jun 2013)
14 Jun 2013; Tim Harder <radhermit@gentoo.org> +libpipeline-1.2.4.ebuild:
Version bump.
*libpipeline-1.2.3 (10 May 2013)
10 May 2013; Tim Harder <radhermit@gentoo.org> +libpipeline-1.2.3.ebuild:
Version bump.
09 Apr 2013; Sergey Popov <pinkbyte@gentoo.org> libpipeline-1.2.2.ebuild:
Add ~amd64-linux keyword
24 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
Stable for sh, wrt bug #455026
21 Feb 2013; Zac Medico <zmedico@gentoo.org> libpipeline-1.2.2.ebuild:
Add ~arm-linux and ~x86-linux keywords.
20 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
Stable for s390, wrt bug #455026
10 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
Stable for ppc64, wrt bug #455026
08 Feb 2013; Jeroen Roovers <jer@gentoo.org> libpipeline-1.2.2.ebuild:
Stable for HPPA (bug #455026).
06 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
Stable for sparc, wrt bug #455026
04 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
Stable for alpha, wrt bug #455026
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
Stable for ia64, wrt bug #455026
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
Stable for arm, wrt bug #455026
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
Stable for ppc, wrt bug #455026
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
Stable for x86, wrt bug #455026
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> libpipeline-1.2.2.ebuild:
Stable for amd64, wrt bug #455026
*libpipeline-1.2.2 (23 Oct 2012)
23 Oct 2012; Tim Harder <radhermit@gentoo.org> +libpipeline-1.2.2.ebuild:
Version bump.
19 Jul 2012; Mike Frysinger <vapier@gentoo.org>
+files/libpipeline-1.2.1-no-gets.patch, libpipeline-1.2.1.ebuild:
Fix building with glibc-2.16 #427254 by Oschtan.
14 Jul 2012; Naohiro Aota <naota@gentoo.org> libpipeline-1.2.1.ebuild:
Add ~x86-fbsd. #244517
04 May 2012; Jeff Horelick <jdhore@gentoo.org> libpipeline-1.1.0.ebuild,
libpipeline-1.2.0.ebuild, libpipeline-1.2.1.ebuild:
dev-util/pkgconfig -> virtual/pkgconfig
*libpipeline-1.2.1 (23 Mar 2012)
23 Mar 2012; Tim Harder <radhermit@gentoo.org> +libpipeline-1.2.1.ebuild:
Version bump. Update to EAPI 4.
09 Jul 2011; Kacper Kowalik <xarthisius@gentoo.org> libpipeline-1.2.0.ebuild:
Marked ~ppc64 wrt #371687
09 Jul 2011; Raúl Porcel <armin76@gentoo.org> libpipeline-1.2.0.ebuild:
Add ~alpha/~ia64/~m68k/~s390/~sh/~sparc wrt #372785
23 Jun 2011; Brent Baude <ranger@gentoo.org> libpipeline-1.2.0.ebuild:
Marking libpipeline-1.2.0 ~ppc for bug 371687
19 Jun 2011; Markus Meier <maekke@gentoo.org> libpipeline-1.2.0.ebuild:
add ~arm, bug #371687
15 Jun 2011; Matt Turner <mattst88@gentoo.org> libpipeline-1.2.0.ebuild:
Added ~mips, bug 371687
15 Jun 2011; Jeroen Roovers <jer@gentoo.org> libpipeline-1.2.0.ebuild:
Marked ~hppa (bug #371687).
*libpipeline-1.2.0 (20 Mar 2011)
20 Mar 2011; Mike Frysinger <vapier@gentoo.org> +libpipeline-1.2.0.ebuild:
Version bump #359577 by Colin Watson.
*libpipeline-1.1.0 (26 Dec 2010)
26 Dec 2010; Samuli Suominen <ssuominen@gentoo.org>
+libpipeline-1.1.0.ebuild:
Initial commit wrt #349603 by Colin Watson.

View File

@ -1,33 +1,13 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
AUX libpipeline-1.2.1-no-gets.patch 858 SHA256 cb126a74ba7d4b48d7317e8464bdf82aaa64a49ed46f37242f9500ce1449ae9b SHA512 2fc14833a9d31bd551c7df3b469a5317f2c11be2b8a01e75499593a585d6461d41ebd4cb0751e84c9c43def9878c2a01d9c97f650270a844a87be019adc48fb0 WHIRLPOOL f00d0e365f16d6322b3035c05616d6e27fb0c5a678aa937fb306fdd992efbbff397461156d4e853007a0d60ef3fa83a0f9f9f7fbbe2cf2e0fbb8405685051b64
DIST libpipeline-1.2.4.tar.gz 764100 SHA256 091ad4ea5c66e91d78e436e0e7673b46b3c5c5f333a14a1298db4bc7bab87b35 SHA512 56d8331f7a7db47fc87f6958a701256b10cdf2444fe1f001945b6ad6b74ffd6e6884db50e3d64d43b7bd8019288393238b03f13cb44aaee8b070d0bf7d874a6b WHIRLPOOL eeda2521059f7e79625eadf17598c4a418da5f8ebcc1b757616cb11724cf2b77ee8ff6a8dbd87fb646d237272bd5edaf7cdc77c72e97741852323b37920818e2
AUX libpipeline-1.4.1-gnulib-cygwin-sys_select.patch 850 SHA256 122a069e24ed07bab7a65ea31f10e14f755a1a464acb9568dc610f171b94b0a8 SHA512 1aaac731af050193a67a45aae7c100e8a6c4e5328b60b2e6f89ef774f66b6d997a1558b104157f65183191c9940c9d4a904f8b32666021ae20dff6b3e5726990 WHIRLPOOL befcfb16d080bcce5247705a32b82cca6af4ad5b1a6bd7e143b1eb6d901e4b3c625088f9b741abf2bd4785f37eb1a710f4897ce8f12053abdb84939d84c1658a
AUX libpipeline-1.4.1-gnulib-darwin-program_name.patch 683 SHA256 05d93f6ef8e1a94de0739292b9c8d36e14bd29fde83106fbf683fbd7154ac715 SHA512 630d39e2c820935374807f6524ff4ffb0c4b46e7df3b765ca4c794d9fb3cab5882d904bd438ea9351e46e1d66f66c8d3bfb0e376fe24a3b20c8f18f36c47efb8 WHIRLPOOL f67270f796074d8af1b0dd1ce3b1918c7df532c8b72a4ea87986c34d776978f3b53501e874a5e27dc5ebc18ae0c260fe2075a4aec3c6cd74c76ee6d2c6b319e2
DIST libpipeline-1.2.5.tar.gz 779072 SHA256 2de10806d9b7dda54f4098d2c12e36e960b954d1325c0885ac01c3c7ee908d5b SHA512 fd6ec96bd78f921a43e6b8fbb0e8ffd4a2bba35fe87a95dbd98e8b83d04fe2fbe34c4b4a008ca027b683d071f0730f8057d3b9aa2d946f2f7808486f16d97b01 WHIRLPOOL 4a600569d651d41abc4c15984edd11198d85bc67d61431aa87dd1d0e9311de2b4f86cc2f1186b359ed2f34b2e7e95261ed2033f24100697c088ead9508d4120a
DIST libpipeline-1.3.0.tar.gz 786909 SHA256 f1fcd13e4bb39fec013c2f02bc3c686580f34eda432c31d0b662cf2359a3a689 SHA512 32bfc4a6ee62edc4fe75f5a31e4c295ede39f8840b0de9954d9213d8c0d39b701cd8af76a36c2d3fcd1479207c7f077cb64692d2f31fadf413a2adb8ffadd965 WHIRLPOOL 8eac41095756858749667a7f04cbb07a7737918fb9fac8dc9ce3099aa3d0d602a678c39f18e4de02136233a34ba02bae40d00eba70e1782fed238f6aedaa4d60
DIST libpipeline-1.3.1.tar.gz 787711 SHA256 5cad1b446f135ec3800d32c8c951a1114f4c438609a4c52b262c30301bc8e692 SHA512 0f903f9a268eea7c6d1ddef1210a729d32b423abdbf1e150aaf6705a272dfbcde482302cb06366ce317674bc681c7e3305cd35a83eb3f0451d1c5595f5c6ac5a WHIRLPOOL eb3fc4a337e09552f3e58a06bcbd9ed30d6b95a60b6cadc293e7aceb77a99e488c8c77a757dd93968a48b4fc72d024227fbe176d8ac7a386172bc50b51e54ef2
DIST libpipeline-1.4.0.tar.gz 805155 SHA256 79c759e7fbf17b560a72edce3ff9bb308d7720306c2650e4fae541daabb89bb6 SHA512 0dce585f9d7aea91889804fd7a65a549b41730add0f6156bf8d0409762fed9c29e8843426e8136c9e0a0348734acaabb48ceede1e3e4d9071d4d787d0b8d46f3 WHIRLPOOL 2ba46823c6eacbe7b4a15d135448b2c59c65c431f438d22f1709bea85d819f4358fd685fab00d0e24cf281e92476b8c48aee61e7b406dcd8e142b2e4fa50bf86
EBUILD libpipeline-1.2.4.ebuild 627 SHA256 c0f3cbae4f6e6bd38247999d07048064e7fa5d7c5d2cebd5a7221b26331826d0 SHA512 44fb3c5141ab548eedc413edb02f2d6e992f1e8f1edc522b5e1a36930f3f169b5866ff08525062497debc024bdbadf66c3c89064afc81b7875518d690e6f4131 WHIRLPOOL bee003a4d7bcf8d85bef0a7f5c2333eeda226db01d64b77b8e53c2bd413e6a6278a4ef39c5fb9cca8bf1f7b66ddbb5a7e23d2bea84d40832324503aa5af4df17
EBUILD libpipeline-1.2.5.ebuild 627 SHA256 4534cf908274ee7d6634e0cc7ee66879e46c2a6529643338da2fb23e7c4dc21b SHA512 bc4f38f2cc18b25fc46baf86745c9d0691a1e376e0e85490236c6a827e6d097c8d2536ef5acb98b00d90cd3c45acb86204380c3bd108689f357a0f4949e9aa42 WHIRLPOOL ae354452d4d0c800c6b54ac33a8de90bed5061241d8202982e64e958483162534ef608271689a754c2be6c8de39abe9a20645c4db52713ece8e89b6f835eabd3
EBUILD libpipeline-1.3.0.ebuild 642 SHA256 bca6ab99730920caab484fdf2e3ae7be520b997f1d4f6f0f94fa4bd34499cea0 SHA512 5e1efcb114235afa8d98339ecda242c9dee485f4408fc4cc35f9fa633e050bce14e135576377e9619574e09931fda760554a83decaa42c17ac931663875433bc WHIRLPOOL 35f35b3207ba754fc41f676efda53c8c5bac5e9dd20ddcd154c2f18bb0b162d0724b11d27f4bff066862049c9f29e2d4bdb037c0daa96ee529c3f9a3cd2cece2
EBUILD libpipeline-1.3.1.ebuild 642 SHA256 332cc65a2b748a2f39967e13e8c52d5aad88b4618a7329634bfe83f3d10da808 SHA512 404e5a25490c22367e8a315131b617fa213a69d709be75799b59dc825ed4daabdaf6da8d50607616197b45e079ce664152080332ff46c3d2f40be84e4712e1d6 WHIRLPOOL b05ff80528a4f27be9fdef866c33cac4082a5a2db85bd5179bddefa78cad56984dce23b16e55483547369ddfae3bb566d831ea75ca7482dfd751b1968154c866
EBUILD libpipeline-1.4.0.ebuild 628 SHA256 bded3520dd0391ca54e0cab07e9eae113516f1dd0b1bc49bb39e20e6b424b009 SHA512 30519a4dfafef14fb7a873e4937a1cbd9eb953b126866c53e6b7e4da5ae314db4a1352b87bdea4a25bc6783b438dc954a02926b1e75c8d4c80456e69cdcd6ada WHIRLPOOL 18fbceb02490cab1cd64991e2b27ad4e2824d37fe35b3c43e75649cfd25432e619f9edf205232a0b11dc0f685f2ed8bb18cead29cab8022f7783a422d990af95
MISC ChangeLog 8708 SHA256 75350c89d81c9f391c877bcccd317a7f7823fc2b838c3e966f0ffa8b1e4abcb1 SHA512 64ffa5162c6818f069207d3a85d1ff6ab27aa3289704226d821a5639f8ef5b7108a661fee75392c055160cf840e3c7796f11bd05fe807632af504979e80516ae WHIRLPOOL e5f07a1f1be5a3216caaeab99041466e2bbda8629817a393bcf9a20137cc90fb902ec9bd1d1f21b47e767ae19320c66b497198fa0a0fb973303042d2eae9a48d
MISC metadata.xml 164 SHA256 f5f2891f2a4791cd31350bb2bb572131ad7235cd0eeb124c9912c187ac10ce92 SHA512 8eb0d5153d388f6ea069c64b93882244816a0a09aecc0d73cb872121ce0eb24c5ccafa96aad0b620b2300f319e1af101fa7fa6c5d0d561719d49bb07da0a2eca WHIRLPOOL 11a1441bddb7a6c69653c663902b7da5767ae6ad515ac2aabfc42fe37927a1ccc21472deeee454009ff720201a41c3e4a912df42661a0a87150fb46126da2d52
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=USme
-----END PGP SIGNATURE-----
DIST libpipeline-1.4.1.tar.gz 805172 SHA256 da46d7b20163aadb9db2faae483f734e9096a7550c84b94029abeab62dd1b9ee SHA512 835d65aa3f9436398b5421544ca7857fe9caed52cd2e70320ea04d6315825e648df930e1c225d4aaf0f2edda2a438f6c00f15c556fb9fd30311560fb8d966797 WHIRLPOOL 1b6688f0388489f015a95397ec6ad34338654bd40c05bc15f30cdbf2e4ad5b1fd53d20f56a6763d398562f39986abf6675236395215bc5819573162eedf17de0
EBUILD libpipeline-1.2.5.ebuild 506 SHA256 da18cc4b0cc3d8a8e808c22ee4c951e516222c878ee73d1fe5ef96fe33b2e60a SHA512 8ea347a009b2cb2cb8dfb8b680f267cdf028377cd5dac15460da865c8610820dcab3a665df38b592ddc6697f35183e9fefb9de72183e86b79d89fd2aa4670373 WHIRLPOOL 22a553312c59608dd7f6db2d1b194e3699aa0fb735c75eed8ac93fc2b0f2c248212c78a318b8545a66d895426606efbeb1a0a7dd9fd0e4996566a64cf6872dac
EBUILD libpipeline-1.3.1.ebuild 519 SHA256 e5123b196b6547340a3d95e2bce0142bcef2efc18eb88c2bc72ffe0b072b1432 SHA512 10e8bc4953caaf1fdb0995dc3a339288b9a91dcf180b8a33db79a7a923a13923c071679116f85223a3ee7a1c0d877ab574e2c055dba86d4a4e8e75da26b212f5 WHIRLPOOL 48e099651025c0607f5a234f0a49e1e1226abf0c196c0ce0dc36410e3a2d3289e2624869fe0f58f8dfa32973df751a3fe2f9f8992af7400e9c7a19843bd1d7bd
EBUILD libpipeline-1.4.0.ebuild 506 SHA256 235bd9255cecabe6f67cc108ae5b6a2916f6d132fdea2cc1ca5c503105e2ad44 SHA512 9215eda7625f54b82d9efc9c4aeb1246f333d4bc9297939fc6d325c933d919c8c0bc5b570669e0c3b16e74f20883dcb37c96925f4350fe5a49fb435c8e500107 WHIRLPOOL 983c8c8d9065bef771169a3b0671fafc5a821ff53d91bdb6ebc83fa072ec9431f1e1150397c1a4dcbe2c6bc41f31dd80708e78cf427404c6c4447d6de1417826
EBUILD libpipeline-1.4.1.ebuild 669 SHA256 e9c4168ec8a80efe78be07d7db6d8b1f503964376a21b30fea828473815c6731 SHA512 ac7f8dc76a8ce2e3dee906022ba3cf57d9a22357b769ebce11d8ca2cfdbc98c665b16722866e6284636f5cb1b7ed4e8bf9e16d8a0d1ca39b8a44083b3444f909 WHIRLPOOL 89f08c30cb17e858f2be1d05df58586bd37533b3c0e35106c386b47792fc694111d589ec8baf74145ed1fc1da44a809b80fa1e6f4ac7815eea5f40ec72fd3029
MISC ChangeLog 3739 SHA256 d0d8f953943ede61da2d781cce85f252dc469e003556bd0a6a11ad9df84740b2 SHA512 9ce074852a2a8962d830ac82f726dc127b460bd19295ba4a1d614c1b1532aed6128a9d6d44e2ab435ec5968a51239f47a358307abd21ec3cd2735bbb41ba433c WHIRLPOOL e973678d829fe13040f3eb3473380ed72af1c240fbf062e5a900375f51bc59392035ed2c4f6458651eb1f5cdac0451cd8ead47151549439201cbfb609f73998c
MISC ChangeLog-2015 8708 SHA256 75350c89d81c9f391c877bcccd317a7f7823fc2b838c3e966f0ffa8b1e4abcb1 SHA512 64ffa5162c6818f069207d3a85d1ff6ab27aa3289704226d821a5639f8ef5b7108a661fee75392c055160cf840e3c7796f11bd05fe807632af504979e80516ae WHIRLPOOL e5f07a1f1be5a3216caaeab99041466e2bbda8629817a393bcf9a20137cc90fb902ec9bd1d1f21b47e767ae19320c66b497198fa0a0fb973303042d2eae9a48d
MISC metadata.xml 253 SHA256 d82c33ef453113a5c1ebe250dcba373c22934a69b0a86c6ab15a5ca589c25b91 SHA512 54a9069aeb4165d2dff3d473c8001bc51613aac9dff3f7f5e9971a9891a737a31511ffa11cbd523febe581ac1d9de2bdf2f40410f0c4239138f2ccca3ef15555 WHIRLPOOL e5aee23acff864609953a1e4de768f0e4aef704b44c53c021f28573e1ca5c99f1a46d92935ecec2449f7b4419a36d8373127d0ecfa8d7bae72d835e1839eb3f8

View File

@ -1,24 +0,0 @@
https://bugs.gentoo.org/427254
hack until libpipeline pulls a newer gnulib version
From 66712c23388e93e5c518ebc8515140fa0c807348 Mon Sep 17 00:00:00 2001
From: Eric Blake <eblake@redhat.com>
Date: Thu, 29 Mar 2012 13:30:41 -0600
Subject: [PATCH] stdio: don't assume gets any more
Gnulib intentionally does not have a gets module, and now that C11
and glibc have dropped it, we should be more proactive about warning
any user on a platform that still has a declaration of this dangerous
interface.
--- a/gnulib/lib/stdio.in.h
+++ b/gnulib/lib/stdio.in.h
@@ -125,7 +125,6 @@
/* It is very rare that the developer ever has full control of stdin,
so any use of gets warrants an unconditional warning. Assume it is
always declared, since it is required by C89. */
-_GL_WARN_ON_USE (gets, "gets is a security hole - use fgets instead");
#endif

View File

@ -0,0 +1,22 @@
https://lists.gnu.org/archive/html/bug-gnulib/2016-03/msg00065.html
--- gnulib/lib/sys_select.in.h.orig 2014-08-03 15:31:22.000000000 +0200
+++ gnulib/lib/sys_select.in.h 2016-05-19 12:57:51.243064700 +0200
@@ -81,7 +81,7 @@
Also, Mac OS X, AIX, HP-UX, IRIX, Solaris, Interix declare select()
in <sys/time.h>.
But avoid namespace pollution on glibc systems. */
-# ifndef __GLIBC__
+# if !(defined __GLIBC__ || defined __NEWLIB__)
# include <sys/time.h>
# endif
@@ -102,7 +102,7 @@
But avoid namespace pollution on glibc systems.
Do this after the include_next (for the sake of OpenBSD 5.0) but before
the split double-inclusion guard (for the sake of Solaris). */
-#if !(defined __GLIBC__ && !defined __UCLIBC__)
+#if !((defined __GLIBC__ || defined __NEWLIB__) && !defined __UCLIBC__)
# include <signal.h>
#endif

View File

@ -0,0 +1,28 @@
https://lists.gnu.org/archive/html/bug-gnulib/2015-02/msg00079.html
From: Margaret Lewicka <address@hidden>
---
lib/error.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/lib/error.c b/lib/error.c
index 6683197..36a3db7 100644
--- gnulib/lib/error.c
+++ gnulib/lib/error.c
@@ -113,9 +113,13 @@ int strerror_r ();
# endif
# endif
+#if defined __APPLE__ && defined __MACH__
+#define program_name (((char **)*_NSGetArgv())[0])
+#else
/* The calling program should define program_name and set it to the
name of the executing program. */
extern char *program_name;
+#endif
# if HAVE_STRERROR_R || defined strerror_r
# define __strerror_r strerror_r
--
2.1.0

View File

@ -1,19 +0,0 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/dev-libs/libpipeline/libpipeline-1.2.4.ebuild,v 1.12 2014/01/18 02:32:16 vapier Exp $
EAPI="5"
inherit autotools-utils
DESCRIPTION="a pipeline manipulation library"
HOMEPAGE="http://libpipeline.nongnu.org/"
SRC_URI="mirror://nongnu/${PN}/${P}.tar.gz"
LICENSE="GPL-3"
SLOT="0"
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux"
IUSE="static-libs test"
DEPEND="virtual/pkgconfig
test? ( dev-libs/check )"

View File

@ -1,6 +1,5 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/dev-libs/libpipeline/libpipeline-1.2.5.ebuild,v 1.12 2014/10/27 01:43:03 vapier Exp $
EAPI="5"

View File

@ -1,6 +1,5 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/dev-libs/libpipeline/libpipeline-1.3.1.ebuild,v 1.1 2014/09/23 21:52:34 radhermit Exp $
EAPI="5"

View File

@ -1,6 +1,5 @@
# Copyright 1999-2015 Gentoo Foundation
# Copyright 1999-2016 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/dev-libs/libpipeline/libpipeline-1.4.0.ebuild,v 1.10 2015/02/28 14:03:35 ago Exp $
EAPI="5"
@ -12,7 +11,7 @@ SRC_URI="mirror://nongnu/${PN}/${P}.tar.gz"
LICENSE="GPL-3"
SLOT="0"
KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux"
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux"
IUSE="static-libs test"
DEPEND="virtual/pkgconfig

View File

@ -1,6 +1,5 @@
# Copyright 1999-2014 Gentoo Foundation
# Copyright 1999-2017 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/dev-libs/libpipeline/libpipeline-1.3.0.ebuild,v 1.1 2014/03/28 23:48:41 radhermit Exp $
EAPI="5"
@ -12,8 +11,13 @@ SRC_URI="mirror://nongnu/${PN}/${P}.tar.gz"
LICENSE="GPL-3"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux"
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos"
IUSE="static-libs test"
DEPEND="virtual/pkgconfig
test? ( dev-libs/check )"
PATCHES=(
"${FILESDIR}"/${P}-gnulib-cygwin-sys_select.patch
"${FILESDIR}"/${P}-gnulib-darwin-program_name.patch
)

View File

@ -1,5 +1,8 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<herd>base-system</herd>
<maintainer type="project">
<email>base-system@gentoo.org</email>
<name>Gentoo Base System</name>
</maintainer>
</pkgmetadata>

View File

@ -0,0 +1,55 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-27">
<title>FreeRADIUS: Security bypass</title>
<synopsis>A vulnerability in FreeRADIUS might allow remote attackers to
bypass authentication.
</synopsis>
<product type="ebuild">freeradius</product>
<announced>2017-06-27</announced>
<revised>2017-06-27: 1</revised>
<bug>620186</bug>
<access>remote</access>
<affected>
<package name="net-dialup/freeradius" auto="yes" arch="*">
<unaffected range="ge">3.0.14</unaffected>
<vulnerable range="lt">3.0.14</vulnerable>
</package>
</affected>
<background>
<p>FreeRADIUS is an open source RADIUS authentication server.</p>
</background>
<description>
<p>It was discovered that the implementation of TTLS and PEAP in FreeRADIUS
skips inner authentication when it handles a resumed TLS connection. The
affected versions of FreeRADIUS fails to reliably prevent the resumption
of unauthenticated sessions unless the TLS session cache is disabled
completely.
</p>
</description>
<impact type="normal">
<p>An unauthenticated remote user can bypass authentication by starting a
session, and then resuming an unauthenticated TLS session before inner
authentication has been completed successfully.
</p>
</impact>
<workaround>
<p>Set “enabled = no” in the cache subsection of eap module settings to
disable TLS session caching.
</p>
</workaround>
<resolution>
<p>All FreeRADIUS users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-dialup/freeradius-3.0.14"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9148">CVE-2017-9148</uri>
</references>
<metadata tag="requester" timestamp="2017-06-09T12:42:38Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-27T09:57:00Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,67 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-28">
<title>LibreOffice: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in LibreOffice, the worst
of which allows for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">libreoffice</product>
<announced>2017-06-27</announced>
<revised>2017-06-27: 1</revised>
<bug>616472</bug>
<access>remote</access>
<affected>
<package name="app-office/libreoffice" auto="yes" arch="*">
<unaffected range="ge">5.2.7.2</unaffected>
<vulnerable range="lt">5.2.7.2</vulnerable>
</package>
<package name="app-office/libreoffice-bin" auto="yes" arch="*">
<unaffected range="ge">5.2.7.2</unaffected>
<vulnerable range="lt">5.2.7.2</vulnerable>
</package>
</affected>
<background>
<p>LibreOffice is a powerful office suite; its clean interface and powerful
tools let you unleash your creativity and grow your productivity.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in LibreOffice. Please
review the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could entice a user to open a specially crafted file
using LibreOffice, possibly resulting in execution of arbitrary code with
the privileges of the process or a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All LibreOffice users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=app-office/libreoffice-5.2.7.2"
</code>
<p>All LibreOffice binary users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose
"&gt;=app-office/libreoffice-bin-5.2.7.2"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10327">
CVE-2016-10327
</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7870">CVE-2017-7870</uri>
</references>
<metadata tag="requester" timestamp="2017-06-08T18:53:54Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-27T09:57:51Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,67 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201706-29">
<title>KAuth and KDELibs: Privilege escalation</title>
<synopsis>A vulnerability in KAuth and KDELibs allows local users to gain
root privileges.
</synopsis>
<product type="ebuild">kauth,kdelibs</product>
<announced>2017-06-27</announced>
<revised>2017-06-27: 1</revised>
<bug>618108</bug>
<access>local</access>
<affected>
<package name="kde-frameworks/kauth" auto="yes" arch="*">
<unaffected range="ge">5.29.0-r1</unaffected>
<vulnerable range="lt">5.29.0-r1</vulnerable>
</package>
<package name="kde-frameworks/kdelibs" auto="yes" arch="*">
<unaffected range="ge">4.14.32</unaffected>
<vulnerable range="lt">4.14.32</vulnerable>
</package>
</affected>
<background>
<p>KAuth provides a convenient, system-integrated way to offload actions
that need to be performed as a privileged user (root, for example) to
small (hopefully secure) helper utilities.
</p>
<p>The KDE libraries, basis of KDE and used by many open source projects.</p>
</background>
<description>
<p>KAuth and KDELibs contains a logic flaw in which the service invoking
D-Bus is not properly checked. This allows spoofing the identity of the
caller and with some carefully crafted calls can lead to gaining root
from an unprivileged account.
</p>
</description>
<impact type="high">
<p>A local attacker could spoof the identity of the caller invoking D-Bus,
possibly resulting in gaining privileges.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All KAuth users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=kde-frameworks/kauth-5.29.0-r1"
</code>
<p>All KDELibs users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=kde-frameworks/kdelibs-4.14.32"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8422">CVE-2017-8422</uri>
</references>
<metadata tag="requester" timestamp="2017-06-06T14:01:55Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-27T09:58:27Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,91 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201707-01">
<title>IcedTea: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in IcedTea, the worst of
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">icedtea</product>
<announced>2017-07-05</announced>
<revised>2017-07-05: 1</revised>
<bug>607676</bug>
<bug>609562</bug>
<bug>618874</bug>
<bug>619458</bug>
<access>remote</access>
<affected>
<package name="dev-java/icedtea-bin" auto="yes" arch="*">
<unaffected range="ge" slot="7">7.2.6.10</unaffected>
<unaffected range="ge" slot="8">3.4.0</unaffected>
<vulnerable range="lt">7.2.6.10</vulnerable>
<vulnerable range="lt">3.4.0</vulnerable>
</package>
</affected>
<background>
<p>IcedTeas aim is to provide OpenJDK in a form suitable for easy
configuration, compilation and distribution with the primary goal of
allowing inclusion in GNU/Linux distributions.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in IcedTea. Please review
the CVE identifiers referenced below for details.
</p>
<p>Note: If the web browser plug-in provided by the dev-java/icedtea-web
package was installed, the issues exposed via Java applets could have
been exploited without user interaction if a user visited a malicious
website.
</p>
</description>
<impact type="normal">
<p>A remote attacker could possibly execute arbitrary code with the
privileges of the process, gain access to information, or cause a Denial
of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All IcedTea binary 7.x users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-java/icedtea-bin-7.2.6.10:7"
</code>
<p>All IcedTea binary 3.x users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-java/icedtea-bin-3.4.0:8"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5546">CVE-2016-5546</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5547">CVE-2016-5547</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5548">CVE-2016-5548</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5549">CVE-2016-5549</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5552">CVE-2016-5552</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3231">CVE-2017-3231</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3241">CVE-2017-3241</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3252">CVE-2017-3252</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3253">CVE-2017-3253</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3260">CVE-2017-3260</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3261">CVE-2017-3261</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3272">CVE-2017-3272</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3289">CVE-2017-3289</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3509">CVE-2017-3509</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3511">CVE-2017-3511</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3512">CVE-2017-3512</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3514">CVE-2017-3514</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3526">CVE-2017-3526</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3533">CVE-2017-3533</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3539">CVE-2017-3539</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3544">CVE-2017-3544</uri>
</references>
<metadata tag="requester" timestamp="2017-01-31T16:38:05Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-07-05T09:02:19Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,56 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201707-02">
<title>Game Music Emu: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in Game Music Emu, the
worst of which could lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">game-music-emu</product>
<announced>2017-07-08</announced>
<revised>2017-07-08: 1</revised>
<bug>603092</bug>
<access>remote</access>
<affected>
<package name="media-libs/game-music-emu" auto="yes" arch="*">
<unaffected range="ge" slot="">0.6.1</unaffected>
<vulnerable range="lt" slot="">0.6.1</vulnerable>
</package>
</affected>
<background>
<p>Game Music Emu is a multi-purpose console music emulator and player
library.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in Game Music Emu. Please
review the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could entice a user to open a specially crafted SPC
music file, using Game Music Emu or an application linked against the
Game Music Emu library, possibly resulting in execution of arbitrary code
with the privileges of the process or a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Game Music Emu users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=media-libs/game-music-emu-0.6.1"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9957">CVE-2016-9957</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9958">CVE-2016-9958</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9959">CVE-2016-9959</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9960">CVE-2016-9960</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9961">CVE-2016-9961</uri>
</references>
<metadata tag="requester" timestamp="2017-03-24T05:27:52Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-07-08T12:04:39Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,66 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201707-03">
<title>phpMyAdmin: Security bypass</title>
<synopsis>A vulnerability in phpMyAdmin might allow remote attackers to
bypass authentication.
</synopsis>
<product type="ebuild">phpmyadmin</product>
<announced>2017-07-08</announced>
<revised>2017-07-08: 1</revised>
<bug>614522</bug>
<access>remote</access>
<affected>
<package name="dev-db/phpmyadmin" auto="yes" arch="*">
<unaffected range="ge" slot="">4.0.10.20</unaffected>
<unaffected range="ge" slot="">4.7.0</unaffected>
<vulnerable range="lt" slot="">4.0.10.20</vulnerable>
<vulnerable range="lt" slot="">4.7.0</vulnerable>
</package>
</affected>
<background>
<p>phpMyAdmin is a web-based management tool for MySQL databases.</p>
</background>
<description>
<p>A vulnerability was discovered where the restrictions caused by
“$cfg[Servers][$i][AllowNoPassword] = false” are bypassed
under certain PHP versions. This can lead compromised user accounts, who
have no passwords set, even if the administrator has set
“$cfg[Servers][$i][AllowNoPassword]” to false (which is
the default).
</p>
<p>This behavior depends on the PHP version used (it seems PHP 5 is
affected, while PHP 7.0 is not).
</p>
</description>
<impact type="normal">
<p>A remote attacker, who only needs to know the username, could bypass
security restrictions and access phpMyAdmin.
</p>
</impact>
<workaround>
<p>Set a password for all users.</p>
</workaround>
<resolution>
<p>All phpMyAdmin 4.0.x users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose
"&gt;=dev-db/phpmyadmin-4.0.10.20:4.0.10.20"
</code>
<p>All other phpMyAdmin users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-4.7.0:4.7.0"
</code>
</resolution>
<references>
<uri link="https://www.phpmyadmin.net/security/PMASA-2017-8/">PMASA-2017-8</uri>
</references>
<metadata tag="requester" timestamp="2017-04-28T01:10:27Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-07-08T12:04:56Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,55 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201707-04">
<title>libsndfile: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in libsndfile, the worst
of which might allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libsndfile</product>
<announced>2017-07-08</announced>
<revised>2017-07-08: 1</revised>
<bug>618010</bug>
<access>remote</access>
<affected>
<package name="media-libs/libsndfile" auto="yes" arch="*">
<unaffected range="ge" slot="">1.0.28</unaffected>
<vulnerable range="lt" slot="">1.0.28</vulnerable>
</package>
</affected>
<background>
<p>libsndfile is a C library for reading and writing files containing
sampled sound.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in libsndfile. Please
review the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could entice a user to open a specially crafted file,
possibly resulting in the execution of arbitrary code with the privileges
of the process, or cause a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All libsndfile users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=media-libs/libsndfile-1.0.28"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7585">CVE-2017-7585</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7586">CVE-2017-7586</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7741">CVE-2017-7741</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7742">CVE-2017-7742</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:41:05Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-07-08T12:05:10Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,57 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201707-05">
<title>OpenSLP: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in OpenSLP, the worst of
which allows remote attackers to cause a Denial of Service condition or
other unspecified impacts.
</synopsis>
<product type="ebuild">OpenSLP</product>
<announced>2017-07-08</announced>
<revised>2017-07-08: 1</revised>
<bug>360061</bug>
<bug>434918</bug>
<bug>583396</bug>
<bug>595542</bug>
<access>remote</access>
<affected>
<package name="net-libs/openslp" auto="yes" arch="*">
<unaffected range="ge" slot="">2.0.0-r4</unaffected>
<vulnerable range="lt" slot="">2.0.0-r4</vulnerable>
</package>
</affected>
<background>
<p>OpenSLP is an open-source implementation of Service Location Protocol
(SLP).
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in OpenSLP. Please review
the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could possibly cause a Denial of Service condition or
have other unspecified impacts.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All OpenSLP users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-libs/openslp-2.0.0-r4"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3609">CVE-2010-3609</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4428">CVE-2012-4428</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4912">CVE-2016-4912</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7567">CVE-2016-7567</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T02:50:48Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-07-08T12:05:22Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,75 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201707-06">
<title>virglrenderer: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in virglrenderer, the
worst of which could allow local guest OS users to cause a Denial of
Service condition.
</synopsis>
<product type="ebuild">virglrenderer</product>
<announced>2017-07-08</announced>
<revised>2017-07-08: 1</revised>
<bug>606996</bug>
<bug>607022</bug>
<bug>608734</bug>
<bug>609400</bug>
<bug>609402</bug>
<bug>609492</bug>
<bug>609494</bug>
<bug>610678</bug>
<bug>610680</bug>
<bug>611378</bug>
<bug>611380</bug>
<bug>611382</bug>
<access>local</access>
<affected>
<package name="media-libs/virglrenderer" auto="yes" arch="*">
<unaffected range="ge" slot="">0.6.0</unaffected>
<vulnerable range="lt" slot="">0.6.0</vulnerable>
</package>
</affected>
<background>
<p>A virtual 3D GPU library, that allows the guest operating system to use
the host GPU to accelerate 3D rendering.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in virglrenderer. Please
review the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A local attacker could cause a Denial of Service condition.</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All virglrenderer users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=media-libs/virglrenderer-0.6.0"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10163">
CVE-2016-10163
</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10214">
CVE-2016-10214
</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5580">CVE-2017-5580</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5956">CVE-2017-5956</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5957">CVE-2017-5957</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5993">CVE-2017-5993</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5994">CVE-2017-5994</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6209">CVE-2017-6209</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6210">CVE-2017-6210</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6317">CVE-2017-6317</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6355">CVE-2017-6355</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6386">CVE-2017-6386</uri>
</references>
<metadata tag="requester" timestamp="2017-05-05T00:14:09Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-07-08T12:06:05Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,58 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201707-07">
<title>JasPer: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in JasPer, the worst of
which could could allow an attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">JasPer</product>
<announced>2017-07-08</announced>
<revised>2017-07-08: 1</revised>
<bug>559164</bug>
<bug>559168</bug>
<bug>571256</bug>
<bug>599430</bug>
<bug>602848</bug>
<access>remote</access>
<affected>
<package name="media-libs/jasper" auto="yes" arch="*">
<unaffected range="ge" slot="">2.0.12</unaffected>
<vulnerable range="lt" slot="">2.0.12</vulnerable>
</package>
</affected>
<background>
<p>JasPer is a software-based implementation of the codec specified in the
JPEG-2000 Part-1 standard.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in JasPer. Please review
the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could entice a user to open a specially crafted image
file using JasPer possibly resulting in execution of arbitrary code with
the privileges of the process or a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All JasPer users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=media-libs/jasper-2.0.12"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5203">CVE-2015-5203</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8751">CVE-2015-8751</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9262">CVE-2016-9262</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9591">CVE-2016-9591</uri>
</references>
<metadata tag="requester" timestamp="2017-04-30T19:55:35Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-07-08T12:06:24Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,51 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201707-08">
<title>feh: Arbitrary remote code execution</title>
<synopsis>A vulnerability in feh might allow remote attackers to execute
arbitrary code.
</synopsis>
<product type="ebuild">feh</product>
<announced>2017-07-08</announced>
<revised>2017-07-08: 1</revised>
<bug>616470</bug>
<access>remote</access>
<affected>
<package name="media-gfx/feh" auto="yes" arch="*">
<unaffected range="ge" slot="">2.18.3</unaffected>
<vulnerable range="lt" slot="">2.18.3</vulnerable>
</package>
</affected>
<background>
<p>feh is an X11 image viewer aimed mostly at console users.</p>
</background>
<description>
<p>Tobias Stoeckmann discovered it was possible to trigger an
out-of-boundary heap write with the image viewer feh while receiving an
IPC message.
</p>
</description>
<impact type="normal">
<p>A remote attacker, pretending to be the E17 window manager, could
possibly trigger an out-of-boundary heap write in feh while receiving an
IPC message. This could result in execution of arbitrary code with the
privileges of the process or a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All feh users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=media-gfx/feh-2.18.3"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7875">CVE-2017-7875</uri>
</references>
<metadata tag="requester" timestamp="2017-05-05T00:04:28Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-07-08T12:06:41Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,53 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201707-09">
<title>GNOME applet for NetworkManager: Arbitrary file read/write</title>
<synopsis>A vulnerability has been found in GNOME applet for NetworkManager
allowing local attackers to access the local filesystem.
</synopsis>
<product type="ebuild">nm-applet</product>
<announced>2017-07-08</announced>
<revised>2017-07-08: 1</revised>
<bug>613768</bug>
<access>local</access>
<affected>
<package name="gnome-extra/nm-applet" auto="yes" arch="*">
<unaffected range="ge" slot="">1.4.6-r1</unaffected>
<vulnerable range="lt" slot="">1.4.6-r1</vulnerable>
</package>
</affected>
<background>
<p>GNOME applet for NetworkManager is a GTK+ 3 front-end which works under
Xorg environments with a systray.
</p>
</background>
<description>
<p>Frederic Bardy and Quentin Biguenet discovered that GNOME applet for
NetworkManager incorrectly checked permissions when connecting to certain
wireless networks.
</p>
</description>
<impact type="normal">
<p>A local attacker could bypass security restrictions at the login screen
to access local files.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All GNOME applet for NetworkManager users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=gnome-extra/nm-applet-1.4.6-r1"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6590">CVE-2017-6590</uri>
</references>
<metadata tag="requester" timestamp="2017-04-02T12:44:50Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-07-08T12:07:02Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,52 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201707-10">
<title>VLC: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in VLC, the worst of which
may allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">vlc</product>
<announced>2017-07-08</announced>
<revised>2017-07-08: 1</revised>
<bug>619494</bug>
<access>remote</access>
<affected>
<package name="media-video/vlc" auto="yes" arch="*">
<unaffected range="ge">2.2.6</unaffected>
<vulnerable range="lt">2.2.6</vulnerable>
</package>
</affected>
<background>
<p>VLC is a cross-platform media player and streaming server.</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in VLC. Please review the
CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker, by enticing a user to open a specially crafted
subtitles file, could possibly execute arbitrary code with the privileges
of the process or cause a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All VLC users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=media-video/vlc-2.2.6"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8310">CVE-2017-8310</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8311">CVE-2017-8311</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8312">CVE-2017-8312</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8313">CVE-2017-8313</uri>
</references>
<metadata tag="requester" timestamp="2017-06-28T11:50:57Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-07-08T20:11:58Z">b-man</metadata>
</glsa>

View File

@ -0,0 +1,49 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201707-11">
<title>RoundCube: Security bypass</title>
<synopsis>A vulnerability in RoundCube may allow authenticated users to
bypass security restrictions.
</synopsis>
<product type="ebuild">roundcube</product>
<announced>2017-07-08</announced>
<revised>2017-07-08: 1</revised>
<bug>618322</bug>
<access>remote</access>
<affected>
<package name="mail-client/roundcube" auto="yes" arch="*">
<unaffected range="ge">1.2.5</unaffected>
<vulnerable range="lt">1.2.5</vulnerable>
</package>
</affected>
<background>
<p>Free and open source webmail software for the masses, written in PHP.</p>
</background>
<description>
<p>Authenticated users can arbitrarily reset passwords due to a problem
caused by an improperly restricted exec call in the virtualmin and sasl
drivers of the password plugin.
</p>
</description>
<impact type="normal">
<p>Authenticated users can bypass security restrictions and elevate
privileges.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All RoundCube users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=mail-client/roundcube-1.2.5"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8114">CVE-2017-8114</uri>
</references>
<metadata tag="requester" timestamp="2017-06-19T11:26:16Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-07-08T20:12:11Z">b-man</metadata>
</glsa>

View File

@ -0,0 +1,51 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201707-12">
<title>MAN DB: Privilege escalation</title>
<synopsis>A vulnerability in MAN DB allows local users to gain root
privileges.
</synopsis>
<product type="ebuild">man-db</product>
<announced>2017-07-09</announced>
<revised>2017-07-09: 1</revised>
<bug>602588</bug>
<access>local</access>
<affected>
<package name="sys-apps/man-db" auto="yes" arch="*">
<unaffected range="ge" slot="">2.7.6.1-r2</unaffected>
<vulnerable range="lt" slot="">2.7.6.1-r2</vulnerable>
</package>
</affected>
<background>
<p>MAN DB is a man replacement that utilizes BerkelyDB instead of flat
files.
</p>
</background>
<description>
<p>The /var/cache/man directory as part of the MAN DB package has group
permissions set to root.
</p>
</description>
<impact type="high">
<p>A local user who does not belong to the root group, but has the ability
to modify the /var/cache/man directory can escalate privileges to the
group root.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All MAN DB users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=sys-apps/man-db-2.7.6.1-r2"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1336">CVE-2015-1336</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T16:57:30Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-07-09T20:19:23Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,50 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201707-13">
<title>libcroco: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in libcroco, the worst of
which may have unspecified impacts.
</synopsis>
<product type="ebuild">libcroco</product>
<announced>2017-07-09</announced>
<revised>2017-07-09: 1</revised>
<bug>618012</bug>
<access>remote</access>
<affected>
<package name="dev-libs/libcroco" auto="yes" arch="*">
<unaffected range="ge" slot="">0.6.12-r1</unaffected>
<vulnerable range="lt" slot="">0.6.12-r1</vulnerable>
</package>
</affected>
<background>
<p>libcroco is a standalone CSS2 parsing and manipulation library.</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in libcroco. Please review
the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could entice a user to open a specially crafted CSS
file possibly resulting in a Denial of Service condition or other
unspecified impacts.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All libcroco users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-libs/libcroco-0.6.12-r1"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7960">CVE-2017-7960</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7961">CVE-2017-7961</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:37:50Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-07-09T20:40:19Z">whissi</metadata>
</glsa>

View File

@ -1 +1 @@
Fri, 23 Jun 2017 17:39:03 +0000
Sun, 09 Jul 2017 23:40:01 +0000

View File

@ -1 +1 @@
3bbc3731a50a93315f90eba3a430b6d900cf3f5d 1498159143 2017-06-22T19:19:03+00:00
0d1886fce079a5b039baee6ef4287f5a55945dea 1499633121 2017-07-09T20:45:21+00:00

View File

@ -0,0 +1,9 @@
DEFINED_PHASES=compile install
DESCRIPTION=Enable colorization of man pages
EAPI=5
HOMEPAGE=http://www.gentoo.org/
KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-linux ~arm-linux ~x86-linux
LICENSE=GPL-2
SLOT=0
_eclasses_=multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
_md5_=67c0394e3a090afc09d90852c34c8807

View File

@ -1,12 +0,0 @@
DEFINED_PHASES=compile configure install prepare test
DEPEND=virtual/pkgconfig test? ( dev-libs/check ) >=app-portage/elt-patches-20170317
DESCRIPTION=a pipeline manipulation library
EAPI=5
HOMEPAGE=http://libpipeline.nongnu.org/
IUSE=static-libs test
KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux
LICENSE=GPL-3
SLOT=0
SRC_URI=mirror://nongnu/libpipeline/libpipeline-1.2.4.tar.gz
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 autotools-utils 5a4611dfba155b1659528663fad4cd5e epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
_md5_=f2fc935ab6a494f715508b85ed36496b

View File

@ -9,4 +9,4 @@ LICENSE=GPL-3
SLOT=0
SRC_URI=mirror://nongnu/libpipeline/libpipeline-1.2.5.tar.gz
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 autotools-utils 5a4611dfba155b1659528663fad4cd5e epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
_md5_=3bc04428fdcee1bc8584b69821d96a15
_md5_=e3241ff7c5cb19f4177e6017ae404e2a

View File

@ -9,4 +9,4 @@ LICENSE=GPL-3
SLOT=0
SRC_URI=mirror://nongnu/libpipeline/libpipeline-1.3.1.tar.gz
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 autotools-utils 5a4611dfba155b1659528663fad4cd5e epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
_md5_=a0b47c1e0fd4981c5807c904537db5e2
_md5_=e9ed84e1198173feb8fb6789594fb988

View File

@ -4,9 +4,9 @@ DESCRIPTION=a pipeline manipulation library
EAPI=5
HOMEPAGE=http://libpipeline.nongnu.org/
IUSE=static-libs test
KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux
KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux
LICENSE=GPL-3
SLOT=0
SRC_URI=mirror://nongnu/libpipeline/libpipeline-1.4.0.tar.gz
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 autotools-utils 5a4611dfba155b1659528663fad4cd5e epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
_md5_=94e5ee74119ed4b219b6d54078b531ac
_md5_=c1d367d4d264dd0af368b27a9593d01a

View File

@ -4,9 +4,9 @@ DESCRIPTION=a pipeline manipulation library
EAPI=5
HOMEPAGE=http://libpipeline.nongnu.org/
IUSE=static-libs test
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos
LICENSE=GPL-3
SLOT=0
SRC_URI=mirror://nongnu/libpipeline/libpipeline-1.3.0.tar.gz
SRC_URI=mirror://nongnu/libpipeline/libpipeline-1.4.1.tar.gz
_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 autotools-utils 5a4611dfba155b1659528663fad4cd5e epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee
_md5_=36aef5041cfbc74badda519408ac6b24
_md5_=e413b67ea73872537f728e7f0c3be69e

View File

@ -1,13 +0,0 @@
DEFINED_PHASES=configure install preinst setup
DEPEND=dev-libs/libpipeline berkdb? ( sys-libs/db ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man app-arch/xz-utils virtual/pkgconfig nls? ( >=app-text/po4a-0.45 sys-devel/gettext )
DESCRIPTION=a man replacement that utilizes berkdb instead of flat files
EAPI=4
HOMEPAGE=http://www.nongnu.org/man-db/
IUSE=berkdb +gdbm nls selinux static-libs zlib
KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~arm-linux ~x86-linux
LICENSE=GPL-3
RDEPEND=dev-libs/libpipeline berkdb? ( sys-libs/db ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man selinux? ( sec-policy/selinux-mandb )
SLOT=0
SRC_URI=mirror://nongnu/man-db/man-db-2.6.6.tar.xz
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee user e4b567c44272a719fabf53f0f885d3f7
_md5_=ed5f7d839cffc2460ab391f29c40a230

View File

@ -1,13 +0,0 @@
DEFINED_PHASES=configure install preinst setup
DEPEND=>=dev-libs/libpipeline-1.3.0 berkdb? ( sys-libs/db ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man app-arch/xz-utils virtual/pkgconfig nls? ( >=app-text/po4a-0.45 sys-devel/gettext )
DESCRIPTION=a man replacement that utilizes berkdb instead of flat files
EAPI=4
HOMEPAGE=http://www.nongnu.org/man-db/
IUSE=berkdb +gdbm nls selinux static-libs zlib
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~arm-linux ~x86-linux
LICENSE=GPL-3
RDEPEND=>=dev-libs/libpipeline-1.3.0 berkdb? ( sys-libs/db ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man selinux? ( sec-policy/selinux-mandb )
SLOT=0
SRC_URI=mirror://nongnu/man-db/man-db-2.6.7.1.tar.xz
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee user e4b567c44272a719fabf53f0f885d3f7
_md5_=96f9493a46abeaa239bcceecf1488f63

View File

@ -1,13 +0,0 @@
DEFINED_PHASES=configure install postinst preinst setup
DEPEND=>=dev-libs/libpipeline-1.4.0 berkdb? ( sys-libs/db ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man app-arch/xz-utils virtual/pkgconfig nls? ( >=app-text/po4a-0.45 sys-devel/gettext )
DESCRIPTION=a man replacement that utilizes berkdb instead of flat files
EAPI=4
HOMEPAGE=http://www.nongnu.org/man-db/
IUSE=berkdb +gdbm nls selinux static-libs zlib
KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~arm-linux ~x86-linux
LICENSE=GPL-3
RDEPEND=>=dev-libs/libpipeline-1.4.0 berkdb? ( sys-libs/db ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man selinux? ( sec-policy/selinux-mandb )
SLOT=0
SRC_URI=mirror://nongnu/man-db/man-db-2.7.1.tar.xz
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee user e4b567c44272a719fabf53f0f885d3f7 versionator c80ccf29e90adea7c5cae94b42eb76d0
_md5_=5bea9696ad2a30b23898935e8c71cd86

View File

@ -0,0 +1,14 @@
DEFINED_PHASES=configure install postinst preinst setup
DEPEND=>=dev-libs/libpipeline-1.4.0 berkdb? ( sys-libs/db:= ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man app-arch/xz-utils virtual/pkgconfig nls? ( >=app-text/po4a-0.45 sys-devel/gettext )
DESCRIPTION=a man replacement that utilizes berkdb instead of flat files
EAPI=5
HOMEPAGE=http://www.nongnu.org/man-db/
IUSE=berkdb +gdbm +manpager nls selinux static-libs zlib
KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-linux ~arm-linux ~x86-linux
LICENSE=GPL-3
PDEPEND=manpager? ( app-text/manpager )
RDEPEND=>=dev-libs/libpipeline-1.4.0 berkdb? ( sys-libs/db:= ) gdbm? ( sys-libs/gdbm ) !berkdb? ( !gdbm? ( sys-libs/gdbm ) ) sys-apps/groff zlib? ( sys-libs/zlib ) !sys-apps/man selinux? ( sec-policy/selinux-mandb )
SLOT=0
SRC_URI=mirror://nongnu/man-db/man-db-2.7.6.1.tar.xz
_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea ltprune 2770eed66a9b8ef944714cd0e968182e multilib 0236be304ee52e7f179ed2f337075515 toolchain-funcs 6eb35f81556258a4bc9182ad3dfd58ee user e4b567c44272a719fabf53f0f885d3f7 versionator c80ccf29e90adea7c5cae94b42eb76d0
_md5_=421df678a673d349151db60ab9533e22

View File

@ -1,310 +0,0 @@
# ChangeLog for sys-apps/man-db
# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2
# $Header: /var/cvsroot/gentoo-x86/sys-apps/man-db/ChangeLog,v 1.79 2015/02/16 09:34:44 haubi Exp $
16 Feb 2015; Michael Haubenwallner <haubi@gentoo.org> man-db-2.7.1.ebuild:
Put systemdtmpfilesdir inside EPREFIX, bug#538634.
13 Jan 2015; Lars Wendler <polynomial-c@gentoo.org> man-db-2.6.6.ebuild,
man-db-2.6.7.1.ebuild, man-db-2.7.1.ebuild:
Fixed dependency on app-text/po4a as per bug #534224.
*man-db-2.7.1 (22 Dec 2014)
22 Dec 2014; Lars Wendler <polynomial-c@gentoo.org> -man-db-2.6.0.2.ebuild,
-man-db-2.6.1.ebuild, -man-db-2.6.2.ebuild, -man-db-2.6.3.ebuild,
-man-db-2.6.3-r1.ebuild, -man-db-2.6.4.ebuild, -man-db-2.6.5.ebuild,
+man-db-2.7.1.ebuild, -files/man-db-2.6.0.2-flock.h.patch,
-files/man-db-2.6.1-no-gets.patch:
Version bump. Removed old.
02 Nov 2014; Sven Vermeulen <swift@gentoo.org> man-db-2.6.6.ebuild,
man-db-2.6.7.1.ebuild:
Remove sec-policy/selinux-* dependency from DEPEND but keep in RDEPEND (bug
#527698)
27 Oct 2014; Mike Frysinger <vapier@gentoo.org> man-db-2.6.6.ebuild:
Mark arm64/m68k/s390/sh stable.
11 Jul 2014; Mikle Kolyada <zlogene@gentoo.org> man-db-2.6.6.ebuild:
sparc stable wrt bug #502916
11 Jul 2014; Mikle Kolyada <zlogene@gentoo.org> man-db-2.6.6.ebuild:
ppc64 stable wrt bug #502916
11 Jul 2014; Mikle Kolyada <zlogene@gentoo.org> man-db-2.6.6.ebuild:
ppc stable wrt bug #502916
11 Jul 2014; Mikle Kolyada <zlogene@gentoo.org> man-db-2.6.6.ebuild:
alpha stable wrt bug #502916
11 Jul 2014; Mikle Kolyada <zlogene@gentoo.org> man-db-2.6.6.ebuild:
x86 stable wrt bug #502916
13 May 2014; Akinori Hattori <hattya@gentoo.org> man-db-2.6.6.ebuild:
ia64 stable wrt bug #502916
*man-db-2.6.7.1 (15 Apr 2014)
15 Apr 2014; Tim Harder <radhermit@gentoo.org> +man-db-2.6.7.1.ebuild:
Version bump.
26 Mar 2014; Chema Alonso <nimiux@gentoo.org> man-db-2.6.6.ebuild:
Stable for amd64 wrt bug #502916
16 Mar 2014; Markus Meier <maekke@gentoo.org> man-db-2.6.6.ebuild:
arm stable, bug #502916
13 Mar 2014; Jeroen Roovers <jer@gentoo.org> man-db-2.6.6.ebuild:
Stable for HPPA (bug #502916).
26 Jan 2014; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.5.ebuild:
Stable for sparc, wrt bug #495924
*man-db-2.6.6 (24 Jan 2014)
24 Jan 2014; Tim Harder <radhermit@gentoo.org> +man-db-2.6.6.ebuild:
Version bump.
20 Jan 2014; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.5.ebuild:
Stable for ppc, wrt bug #495924
19 Jan 2014; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.5.ebuild:
Stable for ppc64, wrt bug #495924
18 Jan 2014; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.5.ebuild:
Stable for alpha, wrt bug #495924
18 Jan 2014; Mike Frysinger <vapier@gentoo.org> man-db-2.6.5.ebuild:
Add arm64 love.
18 Jan 2014; Mike Frysinger <vapier@gentoo.org> man-db-2.6.5.ebuild:
Add warning when USE flags are ambiguous #496150 by Sergey Popov.
16 Jan 2014; Mike Frysinger <vapier@gentoo.org> man-db-2.6.5.ebuild:
Mark m68k/s390/sh stable.
15 Jan 2014; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.5.ebuild:
Stable for ia64, wrt bug #495924
31 Dec 2013; Markus Meier <maekke@gentoo.org> man-db-2.6.5.ebuild:
arm stable, bug #495924
29 Dec 2013; Sven Vermeulen <swift@gentoo.org> man-db-2.6.0.2.ebuild,
man-db-2.6.1.ebuild, man-db-2.6.2.ebuild, man-db-2.6.3.ebuild,
man-db-2.6.3-r1.ebuild, man-db-2.6.4.ebuild, man-db-2.6.5.ebuild:
Adding dependency on selinux-mandb if USE=selinux is set (bug #496158)
27 Dec 2013; Sergey Popov <pinkbyte@gentoo.org> man-db-2.6.3-r1.ebuild:
Drop s390/sh/m68k to unstable
27 Dec 2013; Sergey Popov <pinkbyte@gentoo.org> man-db-2.6.5.ebuild:
Stable on amd64 and x86, wrt bug #495924
26 Dec 2013; Jeroen Roovers <jer@gentoo.org> man-db-2.6.5.ebuild:
Stable for HPPA (bug #495924).
31 Aug 2013; Naohiro Aota <naota@gentoo.org> man-db-2.6.5.ebuild:
Use 0 instead of root group.
*man-db-2.6.5 (09 Jul 2013)
09 Jul 2013; Tim Harder <radhermit@gentoo.org> +man-db-2.6.5.ebuild:
Version bump.
*man-db-2.6.4 (24 Jun 2013)
24 Jun 2013; Tim Harder <radhermit@gentoo.org> +man-db-2.6.4.ebuild:
Version bump, add dep on app-text/po4a if nls is enabled (bug #451622).
27 Apr 2013; Mike Frysinger <vapier@gentoo.org> man-db-2.6.3-r1.ebuild:
Mark m68k stable #455026.
24 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
Stable for sh, wrt bug #455026
21 Feb 2013; Zac Medico <zmedico@gentoo.org> man-db-2.6.3-r1.ebuild:
Add ~arm-linux and ~x86-linux keywords.
20 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
Stable for s390, wrt bug #455026
10 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
Stable for ppc64, wrt bug #455026
08 Feb 2013; Jeroen Roovers <jer@gentoo.org> man-db-2.6.3-r1.ebuild:
Stable for HPPA (bug #455026).
06 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
Stable for sparc, wrt bug #455026
04 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
Stable for alpha, wrt bug #455026
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
Stable for ia64, wrt bug #455026
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
Stable for arm, wrt bug #455026
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
Stable for ppc, wrt bug #455026
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
Stable for x86, wrt bug #455026
03 Feb 2013; Agostino Sarubbo <ago@gentoo.org> man-db-2.6.3-r1.ebuild:
Stable for amd64, wrt bug #455026
13 Jan 2013; Mike Frysinger <vapier@gentoo.org> man-db-2.6.3-r1.ebuild:
Reset permissions/owners on /var/cache/man if they are broken (like when
migrating from sys-apps/man) #447944 by Viacheslav Prisivko.
*man-db-2.6.3-r1 (28 Oct 2012)
28 Oct 2012; Mike Frysinger <vapier@gentoo.org> +files/man-db.cron,
+man-db-2.6.3-r1.ebuild:
Install daily cronjob for building caches #289884 by C W Rose.
*man-db-2.6.3 (19 Sep 2012)
19 Sep 2012; Tim Harder <radhermit@gentoo.org> +man-db-2.6.3.ebuild:
Version bump.
*man-db-2.6.2 (24 Jul 2012)
24 Jul 2012; Mike Frysinger <vapier@gentoo.org> +man-db-2.6.2.ebuild:
Version bump.
24 Jul 2012; Mike Frysinger <vapier@gentoo.org> man-db-2.6.1.ebuild,
+files/man-db-2.6.1-no-gets.patch:
Fix building with glibc-2.16+ #427252 by Oschtan.
24 May 2012; Mike Frysinger <vapier@gentoo.org> man-db-2.6.0.2.ebuild,
man-db-2.6.1.ebuild:
Inherit user for enewuser/etc...
04 May 2012; Jeff Horelick <jdhore@gentoo.org> man-db-2.6.0.2.ebuild,
man-db-2.6.1.ebuild:
dev-util/pkgconfig -> virtual/pkgconfig
23 Mar 2012; Tim Harder <radhermit@gentoo.org> -man-db-2.5.9.ebuild:
Remove old.
*man-db-2.6.1 (23 Mar 2012)
23 Mar 2012; Tim Harder <radhermit@gentoo.org> +man-db-2.6.1.ebuild:
Version bump (bug #404241).
01 Dec 2011; Mike Frysinger <vapier@gentoo.org> man-db-2.6.0.2.ebuild:
Pull in pkg-config for building #392733 by Nikoli.
27 Nov 2011; Mike Frysinger <vapier@gentoo.org> man-db-2.6.0.2.ebuild:
Drop autotools-utils, fix up SRC_URI mirror, add USE=zlib, and touch up
style.
09 Jul 2011; Kacper Kowalik <xarthisius@gentoo.org> man-db-2.6.0.2.ebuild:
Marked ~ppc64 wrt #371687
09 Jul 2011; Raúl Porcel <armin76@gentoo.org> man-db-2.6.0.2.ebuild:
Add ~alpha/~ia64/~m68k/~s390/~sh/~sparc wrt #372785
23 Jun 2011; Brent Baude <ranger@gentoo.org> man-db-2.6.0.2.ebuild:
Marking man-db-2.6.0.2 ~ppc for bug 371687
19 Jun 2011; Markus Meier <maekke@gentoo.org> man-db-2.6.0.2.ebuild:
add ~arm, bug #371687
16 Jun 2011; Jeroen Roovers <jer@gentoo.org> man-db-2.6.0.2.ebuild,
+files/man-db-2.6.0.2-flock.h.patch:
Fix building with USE=-gdbm by Maciej Mrozowski.
15 Jun 2011; Matt Turner <mattst88@gentoo.org> man-db-2.6.0.2.ebuild:
Added ~mips, bug 371687
15 Jun 2011; Jeroen Roovers <jer@gentoo.org> man-db-2.6.0.2.ebuild:
Marked ~hppa (bug #371687).
*man-db-2.6.0.2 (15 Jun 2011)
15 Jun 2011; Jeroen Roovers <jer@gentoo.org> -man-db-2.5.7-r1.ebuild,
-files/man-db-2.5.7-non-gnu-nroff.patch,
-files/man-db-2.5.7-uncompressed-non-en.patch, +man-db-2.6.0.2.ebuild:
Version bump. Introduce USE=static-libs.
13 Apr 2011; Ulrich Mueller <ulm@gentoo.org> man-db-2.5.7-r1.ebuild,
man-db-2.5.9.ebuild:
Don't PROVIDE virtual/man, it is a new-style virtual now. Bug 358839.
*man-db-2.5.9 (22 Dec 2010)
22 Dec 2010; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.9.ebuild:
Version bump #349399 by Rafał Mużyło.
*man-db-2.5.7-r1 (23 Aug 2010)
23 Aug 2010; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.7-r1.ebuild,
+files/man-db-2.5.7-uncompressed-non-en.patch:
Add fix from upstream for issues with non-english uncompressed man pages
#327347 by Florian.
29 Mar 2010; Mike Frysinger <vapier@gentoo.org> man-db-2.5.7.ebuild,
+files/man-db-2.5.7-non-gnu-nroff.patch:
Add fix from upstream for building with non-GNU nroff #309635 by Pun.
*man-db-2.5.7 (07 Mar 2010)
07 Mar 2010; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.7.ebuild:
Version bump #307991 by C W Rose.
02 Oct 2009; Diego E. Pettenò <flameeyes@gentoo.org> man-db-2.5.6.ebuild:
Fix doc installation.
*man-db-2.5.6 (02 Oct 2009)
02 Oct 2009; Diego E. Pettenò <flameeyes@gentoo.org>
+man-db-2.5.6.ebuild, +files/man-db-2.5.6-fix-no-groff.patch:
Version bump, with a patch to work with heirloom-doctools… for the most
part. Note that man pages will not look as good as with sys-apps/man at
least.
29 Sep 2009; Diego E. Pettenò <flameeyes@gentoo.org> man-db-2.5.3.ebuild,
man-db-2.5.5.ebuild:
Add groff dependency.
*man-db-2.5.5 (05 Apr 2009)
05 Apr 2009; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.5.ebuild:
Version bump #264993 by Arfrever Frehtes Taifersar Arahesis.
*man-db-2.5.3 (17 Nov 2008)
17 Nov 2008; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.3.ebuild:
Version bump.
*man-db-2.5.2 (25 Oct 2008)
25 Oct 2008; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.2.ebuild:
Version bump.
*man-db-2.5.1 (24 Feb 2008)
24 Feb 2008; Mike Frysinger <vapier@gentoo.org> +man-db-2.5.1.ebuild:
Version bump.
*man-db-2.4.4 (13 Apr 2007)
13 Apr 2007; Mike Frysinger <vapier@gentoo.org>
+files/man-db-2.4.4-sections.patch, +man-db-2.4.4.ebuild:
Version bump #173919 by Pierre-Yves Rofes.
*man-db-2.4.3-r1 (06 Oct 2006)
06 Oct 2006; Mike Frysinger <vapier@gentoo.org>
+files/man-db-2.4.3-sections.patch, +man-db-2.4.3-r1.ebuild:
Respect more man sections #149857.
*man-db-2.4.3 (21 Feb 2006)
21 Feb 2006; Mike Frysinger <vapier@gentoo.org> :
Initial import. Ebuild submitted by me.

View File

@ -1,29 +1,6 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
AUX man-db.cron 196 SHA256 8aa4346f537c846b458705eaa4021504f7f8ea40488485263b5e9abac3966ff8 SHA512 0d57adab78ea2ba4023c7e46ae892e4eaef64c49be12696f5f5d61b11d66247ca3eef50f545364539bbf5ef7a3119623a9f46a76ed9069455815d239ee61f061 WHIRLPOOL 4451db102b25c63ad84215ed163a8f05c5a60235528bd8096634342aeeaa41e85065b01b55da2c1a2a40f0b1d8f827f462a3288f9caa877430064e0fb3047596
DIST man-db-2.6.6.tar.xz 1448576 SHA256 7da90f8d8df91e0e682769d50f4bdb905f525b5d0f01e7e5b8cc3c6da45f66c3 SHA512 7abb8609e1113dd1852076c4c71557c3b376fefa7e42fa39198f7b882f4b3fe733983045742c4b3903be2c953c09c724f735619b4396283a4ed2ad7816aaf4ec WHIRLPOOL e5c7b41afd7374bb1df3024134f9bd8a1af42b5ad63d4e516e946b0e8ccc88bafc055fdba707b0c764030e92748b225a72672bfe07e2bc3e8d78526d17f5ff72
DIST man-db-2.6.7.1.tar.xz 1452280 SHA256 8d65559838fccca774e3ef7c15c073180c786e728785c735e136297facca41fc SHA512 91e1036701174c5623a4cf4208a93130822dc9c61ffd9c6bf0dddaf7c4c5b2401e6238f60578dfa81a11d67d360cbc4d45af920542fb4a0624c7169b17a618f8 WHIRLPOOL 30c510289d1444b3231704c22ddf2c17b58d4aa8b9e8a94552537fbc971b23f16b2c43a32fa9f85fb7b8eca2fd71a73d52955fcd0ab24ef49d3903832eafecf7
DIST man-db-2.7.1.tar.xz 1498272 SHA256 c4876204a3fafb4d8ccc1d172c0431ee581d95558cbd6c4e79caca7717049e0e SHA512 246d833bd456a6dd178035b4be37dc810872b6480145d6c2c605deeb664d105b285f61827b739717d6936de28c4275a99ed8fae2d173b16c1c0673b1171a65ce WHIRLPOOL 10c56b861411674f4ca92bafe7c0faf4f6c2cbcc6b2db8f87f2e2ee59152797667619e60ae50cae33ee21ff3e58cb7b10627ce2f16adf65fd8794b0fabb71290
EBUILD man-db-2.6.6.ebuild 2291 SHA256 598de59d854a7014e0d96f2f5f9c8b1ce60bf5865edf75fc5724445925032621 SHA512 6d0cd5572589e8c036601b0f438d89c7ea997c7781d2ee36a443ef556c614c06be2fbc8d6630676b60113cdf35f8a2ec869ce7c295dfd6b5013277b19bf2418f WHIRLPOOL ce3a83cbe1dd9acbf0bb5e02780477bd1d0ea844d8f1e9e06627bdbf70dd6d545f6357c602b9ddadd332d1c0f40d7a734b92230699b295856c15d4bab560886a
EBUILD man-db-2.6.7.1.ebuild 2313 SHA256 743dd2a0d889186b7425298e171151b9e15bf54a4a9a3e4c882c7bbb42932a5b SHA512 b0435998dc634ba3e84b7c897d138b97e5afe950f8df0e548cb5d4d84b1976dcae2792e8a05bd105a75249c6c355c91011c865afed9b16655ae93a05876c5d0e WHIRLPOOL 67aca8ec0179da849e66398c63c7881ac3c39d86a682d4c361bea93ec8a505d023cc3c86f891c693db2530cea2bc9aad665b9013cea0a79f10b73b0640ff99c9
EBUILD man-db-2.7.1.ebuild 2572 SHA256 d715e3d93934d6b8feb18dc20f36302da9f8154392951fcf9b2e355277c00800 SHA512 8392198c7c99232bc1ac8773210e4810ce8b8ee3f1dbc41831afea2ffda187d056b20ff31668f4b6cf7a49d867ff0c71337923da0b8ccff04f3ed14add4cff1d WHIRLPOOL 0abfe09c21aad68aa1e7d3d75a094919fc5826a341136125de60c719f47b90b6a83ae9860619221aab3fe1e2571ccffa61751c2100cbecd0ccdd785b1147942b
MISC ChangeLog 10778 SHA256 61a539cf1188343ade360c912c661e1519caecb69a988ca71a72851112a5522a SHA512 81a3235e84a62bc6f8d14c753676d1263f93d76707ab0ea4d02f0c445c34c45b0f4ae3a6e81152186abd81a99ca3d414874214cdcd7cfc7261d84d2f664e2e76 WHIRLPOOL 0fa35ef0a80cf94f055c16cb547be92ecbbeaa1bff2d03b48b74e14817fb118a5859d75a02e1c32fce7ed7396b3a062172e88a207a87d7fd3431b62122acf961
MISC metadata.xml 164 SHA256 f5f2891f2a4791cd31350bb2bb572131ad7235cd0eeb124c9912c187ac10ce92 SHA512 8eb0d5153d388f6ea069c64b93882244816a0a09aecc0d73cb872121ce0eb24c5ccafa96aad0b620b2300f319e1af101fa7fa6c5d0d561719d49bb07da0a2eca WHIRLPOOL 11a1441bddb7a6c69653c663902b7da5767ae6ad515ac2aabfc42fe37927a1ccc21472deeee454009ff720201a41c3e4a912df42661a0a87150fb46126da2d52
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQIcBAEBCAAGBQJU4bm3AAoJECn7Dp7HGe4gntUP/26mGFX+x/yRlRQ1fbCJHY+e
gswdSnpcNLlp+LHKvRtA4vPkCZgMhWqaq7W+DtqGip7HjyoPYMNcl6JVds3BKLO8
sv6uizaXBvH7mUuf8Ugvm+8LMb4+wdwo4nwcgwjlLgeOogb9pIj+EmYVqDvXCAOq
K7ZD9Ncg4eiJzMV7I1XFLaFKPkSM45Ji3CeX09opCI9OVHOOxFvpixyrWvba2bFb
c12Eegrzj4rH2rU7QXv7Js7v2Q1UWLjh8H96AR0ZxvlMQ7a4lEVALJ/5eOGVGDkP
hB0uW8BCHHbckWPbA/SEhMFEQwGXM9ddencVAlLxXlvMmof7zwoDdgejSx7E+9WF
CBmAwUATlwib9tjTBV5pogglrDRyfEyoZqOTvxxVwd3oyWX/aZKh1he9wLu4baYF
AzG7g8h6WcLEViPYReTguFhBMg0OdbN255ASD+Flu8QdeZA6nVOWviGMUefmpHEw
GKmt4raxzmKnStNCg00Vd0/WSOWtg//xh+OjiBo4ezNaclf2eRysDYBuWM5UNGV0
b5VEZC4lQYcARKPRWdRoe19s8yKGWTxnm6Td+uiwFru4YL6OxhzjrIkj89pFAsyz
Quqm+gDh08ghhzOA9uWmEsv2dPdjF++1Boygdp1nBwUYv6yDEoQQICVdFy4EkRyI
iOEXJFcho1E0RvkTEi/O
=rgMw
-----END PGP SIGNATURE-----
AUX man-db.cron 217 SHA256 5b2e690a12e6c5335ca3e7d180baa367d54adf18647f0e4a821f14b0ae45ade0 SHA512 81a7082d7f0cdf17d8277af7142aaa98feb8c12cf41bb96c12af53fdd3e436a4d15a57ef76fb90390133cfdb25e1bb1b16e17a39b39b6517afc529b871426331 WHIRLPOOL bda82f5a771cbe68077430798fdb9cacf9d2011f2ae598cba164bf0a2fb95c30348bba94208f78112cfd8bf19741c13699b940650b5c29755a2c13d39e56abe6
DIST man-db-2.7.6.1.tar.xz 1541316 SHA256 08edbc52f24aca3eebac429b5444efd48b9b90b9b84ca0ed5507e5c13ed10f3f SHA512 623c5e7f8b7c289908b2c926f8777293b8d39aeceef0d2509d701a8b0bfa81408650f655c8608318221786c751a79ee91124b07993de5298cd7fa6d8bb737301 WHIRLPOOL 10ca0e397a53354ba6687c4057c8d8b7f57c0a97b806727ee05285a5aa1d8f2d17eae9f532b0edb364edde149108c765f812e4ecd6a28932cdceef56e0b5dbee
EBUILD man-db-2.7.6.1-r2.ebuild 3145 SHA256 d69d4a0bd97c49bdbc87543269e4111394a7ef6f49020a4001a771649a0951a2 SHA512 323d3f53ce81d65d6012b310db9b31acb732bb457b0cd1a5e36d5d741668006711e3ed6ca4155c189c0ae59dd747ee36c67c63563ff08a3df0fb06100eac8651 WHIRLPOOL 64b1cff7a4286fd2a09b620be4519a0753cbef2aff3a6f4f9cda5dbba0fb3a3d025a5f5685a4228d23bb3aaefae96d7a13d9d8f99c25600256488ee58687aad0
MISC ChangeLog 9327 SHA256 cb45d2db7d1cbf34fdbf354f7a6673b5556dbbe81ac6082ef1ee1994fec4ae8f SHA512 aa4100bd98703ab350cea86f9b73c6d8088e6a3f91eaa073db809d079d964387e53038a4438081bf939d06f1addf4d40332847556c0ff8c699b2ad8d2719c2e8 WHIRLPOOL 6fccb055c9e7e41e0c8078940353033c7f1154fc7f7c5c0b9671e0ecc2991c35195aa0e1ff53a52e157b8dd16a7909b76d932ccc210239c9231e24190d51eaa1
MISC ChangeLog-2015 10778 SHA256 61a539cf1188343ade360c912c661e1519caecb69a988ca71a72851112a5522a SHA512 81a3235e84a62bc6f8d14c753676d1263f93d76707ab0ea4d02f0c445c34c45b0f4ae3a6e81152186abd81a99ca3d414874214cdcd7cfc7261d84d2f664e2e76 WHIRLPOOL 0fa35ef0a80cf94f055c16cb547be92ecbbeaa1bff2d03b48b74e14817fb118a5859d75a02e1c32fce7ed7396b3a062172e88a207a87d7fd3431b62122acf961
MISC metadata.xml 342 SHA256 c81419f3ac855515743a636bfbd46d0534455d7d2d20f46e907f95dcd04af484 SHA512 553cf56ab0b3b6c9403612a7ccd1db073f557b432c68d60adb4716169250a9986b4c112023f6ae200a6fbc2df31cdafd9ab08e04d92ca35cffb81f690bd43d79 WHIRLPOOL 155a9ad5b173dd5ac75e4c93315b0ddd9ba5ec6299a778c63e2281f7aed499cae99e573585270fdd5d7e29b93160ac967785eeeaa78f9a933147764d56107fff

View File

@ -1,10 +1,11 @@
#!/bin/sh
# Use same perms/settings as the ebuild.
if [ ! -d /var/cache/man ]; then
mkdir -p /var/cache/man
chown man:root /var/cache/man
chmod 2755 /var/cache/man
cachedir="/var/cache/man"
if [ ! -d "${cachedir}" ]; then
mkdir -p "${cachedir}"
chown man:man "${cachedir}"
chmod 0755 "${cachedir}"
fi
exec nice mandb --quiet

View File

@ -1,81 +0,0 @@
# Copyright 1999-2015 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-apps/man-db/man-db-2.6.6.ebuild,v 1.13 2015/01/13 14:31:25 polynomial-c Exp $
EAPI="4"
inherit eutils user
DESCRIPTION="a man replacement that utilizes berkdb instead of flat files"
HOMEPAGE="http://www.nongnu.org/man-db/"
SRC_URI="mirror://nongnu/${PN}/${P}.tar.xz"
LICENSE="GPL-3"
SLOT="0"
KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~arm-linux ~x86-linux"
IUSE="berkdb +gdbm nls selinux static-libs zlib"
CDEPEND="dev-libs/libpipeline
berkdb? ( sys-libs/db )
gdbm? ( sys-libs/gdbm )
!berkdb? ( !gdbm? ( sys-libs/gdbm ) )
sys-apps/groff
zlib? ( sys-libs/zlib )
!sys-apps/man"
DEPEND="${CDEPEND}
app-arch/xz-utils
virtual/pkgconfig
nls? (
>=app-text/po4a-0.45
sys-devel/gettext
)"
RDEPEND="${CDEPEND}
selinux? ( sec-policy/selinux-mandb )
"
pkg_setup() {
# Create user now as Makefile in src_install does setuid/chown
enewgroup man 15
enewuser man 13 -1 /usr/share/man man
if (use gdbm && use berkdb) || (use !gdbm && use !berkdb) ; then #496150
ewarn "Defaulting to USE=gdbm due to ambiguous berkdb/gdbm USE flag settings"
fi
}
src_configure() {
export ac_cv_lib_z_gzopen=$(usex zlib)
econf \
--docdir='$(datarootdir)'/doc/${PF} \
--enable-setuid \
--with-sections="1 1p 8 2 3 3p 4 5 6 7 9 0p tcl n l p o 1x 2x 3x 4x 5x 6x 7x 8x" \
$(use_enable nls) \
$(use_enable static-libs static) \
--with-db=$(usex gdbm gdbm $(usex berkdb db gdbm))
}
src_install() {
default
dodoc docs/{HACKING,TODO}
prune_libtool_files
exeinto /etc/cron.daily
newexe "${FILESDIR}"/man-db.cron man-db #289884
keepdir /var/cache/man
fowners man:0 /var/cache/man
fperms 2755 /var/cache/man
}
pkg_preinst() {
if [[ -f ${EROOT}var/cache/man/whatis ]] ; then
einfo "Cleaning ${EROOT}var/cache/man from sys-apps/man"
find "${EROOT}"var/cache/man -type f '!' '(' -name index.bt -o -name index.db ')' -delete
fi
if [[ ! -g ${EROOT}var/cache/man ]] ; then
einfo "Resetting permissions on ${EROOT}var/cache/man" #447944
mkdir -p "${EROOT}var/cache/man"
chown -R man:0 "${EROOT}"var/cache/man
find "${EROOT}"var/cache/man -type d '!' -perm /g=s -exec chmod 2755 {} +
fi
}

View File

@ -1,81 +0,0 @@
# Copyright 1999-2015 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-apps/man-db/man-db-2.6.7.1.ebuild,v 1.3 2015/01/13 14:31:25 polynomial-c Exp $
EAPI="4"
inherit eutils user
DESCRIPTION="a man replacement that utilizes berkdb instead of flat files"
HOMEPAGE="http://www.nongnu.org/man-db/"
SRC_URI="mirror://nongnu/${PN}/${P}.tar.xz"
LICENSE="GPL-3"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~arm-linux ~x86-linux"
IUSE="berkdb +gdbm nls selinux static-libs zlib"
CDEPEND=">=dev-libs/libpipeline-1.3.0
berkdb? ( sys-libs/db )
gdbm? ( sys-libs/gdbm )
!berkdb? ( !gdbm? ( sys-libs/gdbm ) )
sys-apps/groff
zlib? ( sys-libs/zlib )
!sys-apps/man"
DEPEND="${CDEPEND}
app-arch/xz-utils
virtual/pkgconfig
nls? (
>=app-text/po4a-0.45
sys-devel/gettext
)"
RDEPEND="${CDEPEND}
selinux? ( sec-policy/selinux-mandb )
"
pkg_setup() {
# Create user now as Makefile in src_install does setuid/chown
enewgroup man 15
enewuser man 13 -1 /usr/share/man man
if (use gdbm && use berkdb) || (use !gdbm && use !berkdb) ; then #496150
ewarn "Defaulting to USE=gdbm due to ambiguous berkdb/gdbm USE flag settings"
fi
}
src_configure() {
export ac_cv_lib_z_gzopen=$(usex zlib)
econf \
--docdir='$(datarootdir)'/doc/${PF} \
--enable-setuid \
--with-sections="1 1p 8 2 3 3p 4 5 6 7 9 0p tcl n l p o 1x 2x 3x 4x 5x 6x 7x 8x" \
$(use_enable nls) \
$(use_enable static-libs static) \
--with-db=$(usex gdbm gdbm $(usex berkdb db gdbm))
}
src_install() {
default
dodoc docs/{HACKING,TODO}
prune_libtool_files
exeinto /etc/cron.daily
newexe "${FILESDIR}"/man-db.cron man-db #289884
keepdir /var/cache/man
fowners man:0 /var/cache/man
fperms 2755 /var/cache/man
}
pkg_preinst() {
if [[ -f ${EROOT}var/cache/man/whatis ]] ; then
einfo "Cleaning ${EROOT}var/cache/man from sys-apps/man"
find "${EROOT}"var/cache/man -type f '!' '(' -name index.bt -o -name index.db ')' -delete
fi
if [[ ! -g ${EROOT}var/cache/man ]] ; then
einfo "Resetting permissions on ${EROOT}var/cache/man" #447944
mkdir -p "${EROOT}var/cache/man"
chown -R man:0 "${EROOT}"var/cache/man
find "${EROOT}"var/cache/man -type d '!' -perm /g=s -exec chmod 2755 {} +
fi
}

View File

@ -1,8 +1,7 @@
# Copyright 1999-2015 Gentoo Foundation
# Copyright 1999-2017 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-apps/man-db/man-db-2.7.1.ebuild,v 1.3 2015/02/16 09:34:44 haubi Exp $
EAPI="4"
EAPI=5
inherit eutils user versionator
@ -12,11 +11,11 @@ SRC_URI="mirror://nongnu/${PN}/${P}.tar.xz"
LICENSE="GPL-3"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~arm-linux ~x86-linux"
IUSE="berkdb +gdbm nls selinux static-libs zlib"
KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-linux ~arm-linux ~x86-linux"
IUSE="berkdb +gdbm +manpager nls selinux static-libs zlib"
CDEPEND=">=dev-libs/libpipeline-1.4.0
berkdb? ( sys-libs/db )
berkdb? ( sys-libs/db:= )
gdbm? ( sys-libs/gdbm )
!berkdb? ( !gdbm? ( sys-libs/gdbm ) )
sys-apps/groff
@ -32,6 +31,7 @@ DEPEND="${CDEPEND}
RDEPEND="${CDEPEND}
selinux? ( sec-policy/selinux-mandb )
"
PDEPEND="manpager? ( app-text/manpager )"
pkg_setup() {
# Create user now as Makefile in src_install does setuid/chown
@ -49,10 +49,16 @@ src_configure() {
--docdir='$(datarootdir)'/doc/${PF} \
--with-systemdtmpfilesdir="${EPREFIX}"/usr/lib/tmpfiles.d \
--enable-setuid \
--enable-cache-owner=man \
--with-sections="1 1p 8 2 3 3p 4 5 6 7 9 0p tcl n l p o 1x 2x 3x 4x 5x 6x 7x 8x" \
$(use_enable nls) \
$(use_enable static-libs static) \
--with-db=$(usex gdbm gdbm $(usex berkdb db gdbm))
# Disable color output from groff so that the manpager can add it. #184604
sed -i \
-e '/^#DEFINE.*\<[nt]roff\>/{s:^#::;s:$: -c:}' \
src/man_db.conf || die
}
src_install() {
@ -62,22 +68,35 @@ src_install() {
exeinto /etc/cron.daily
newexe "${FILESDIR}"/man-db.cron man-db #289884
keepdir /var/cache/man
fowners man:0 /var/cache/man
fperms 2755 /var/cache/man
}
pkg_preinst() {
if [[ -f ${EROOT}var/cache/man/whatis ]] ; then
einfo "Cleaning ${EROOT}var/cache/man from sys-apps/man"
find "${EROOT}"var/cache/man -type f '!' '(' -name index.bt -o -name index.db ')' -delete
local cachedir="${EROOT}var/cache/man"
# If the system was already exploited, and the attacker is hiding in the
# cachedir of the old man-db, let's wipe them out.
# see bug #602588 comment 18
local _replacing_version=
local _setgid_vuln=0
for _replacing_version in ${REPLACING_VERSIONS}; do
if version_is_at_least '2.7.6.1-r2' "${_replacing_version}"; then
debug-print "Skipping security bug #602588 ... existing installation (${_replacing_version}) should not be affected!"
else
_setgid_vuln=1
debug-print "Applying cleanup for security bug #602588"
fi
if [[ ! -g ${EROOT}var/cache/man ]] ; then
einfo "Resetting permissions on ${EROOT}var/cache/man" #447944
mkdir -p "${EROOT}var/cache/man"
chown -R man:0 "${EROOT}"var/cache/man
find "${EROOT}"var/cache/man -type d '!' -perm /g=s -exec chmod 2755 {} +
done
[[ ${_setgid_vuln} -eq 1 ]] && rm -rf "${cachedir}"
# Fall back to recreating the cachedir
if [[ ! -d ${cachedir} ]] ; then
mkdir -p "${cachedir}" || die
chown man:man "${cachedir}" || die
fi
# Update the whatis cache
if [[ -f ${cachedir}/whatis ]] ; then
einfo "Cleaning ${cachedir} from sys-apps/man"
find "${cachedir}" -type f '!' '(' -name index.bt -o -name index.db ')' -delete
fi
}

View File

@ -1,5 +1,11 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<herd>base-system</herd>
<maintainer type="project">
<email>base-system@gentoo.org</email>
<name>Gentoo Base System</name>
</maintainer>
<use>
<flag name="manpager">Enable manpager wrapper for colorizing output</flag>
</use>
</pkgmetadata>