| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
Signed-Off-By: Jay Faulkner <jay@jvf.cc>
|
|
|
|
| |
Signed-off-by: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
|
|
|
|
|
| |
Closes: https://bugs.gentoo.org/848117
Signed-off-by: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
|
|
|
|
| |
Signed-off-by: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
|
|
|
|
|
| |
Package-Manager: Portage-3.0.28, Repoman-3.0.3
Signed-off-by: Andrew Ammerlaan <andrewammerlaan@gentoo.org>
|
|
|
|
| |
Signed-off-by: James Beddek <telans@posteo.de>
|
|
|
|
| |
Signed-off-by: Alessandro Barbieri <lssndrbarbieri@gmail.com>
|
|
|
|
|
|
|
|
| |
This follows the logic in godot's build system.
Closes: https://bugs.gentoo.org/794556
Package-Manager: Portage-3.0.19, Repoman-3.0.3
Signed-off-by: Ross Charles Campbell <rossbridger.cc@gmail.com>
|
|
|
|
|
| |
Package-Manager: Portage-3.0.19, Repoman-3.0.3
Signed-off-by: Ross Charles Campbell <rossbridger.cc@gmail.com>
|
|
|
|
| |
Signed-off-by: Anna (cybertailor) Vyalkova <cyber+gentoo@sysrq.in>
|
|
|
|
|
|
|
|
| |
Since embree (https://github.com/embree/embree) is not landed
at the moment, raycast module is disabled for the moment.
Package-Manager: Portage-3.0.18, Repoman-3.0.3
Signed-off-by: Ross Charles Campbell <rossbridger.cc@gmail.com>
|
|
|
|
|
| |
Package-Manager: Portage-3.0.18, Repoman-3.0.3
Signed-off-by: Ross Charles Campbell <rossbridger.cc@gmail.com>
|
|
|
|
|
| |
Package-Manager: Portage-3.0.18, Repoman-3.0.3
Signed-off-by: Ross Charles Campbell <rossbridger.cc@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
An integer overflow issue exists in Godot Engine up to v3.2 that can
be triggered when loading specially crafted.TGA image files. The
vulnerability exists in ImageLoaderTGA::load_image() function at line:
const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size;
The bug leads to Dynamic stack buffer overflow. Depending on the
context of the application, attack vector can be local or remote,
and can lead to code execution and/or system crash.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2021-26825
Reference: https://github.com/godotengine/godot/pull/45702
Closes: https://bugs.gentoo.org/769761
Package-Manager: Portage-3.0.14, Repoman-3.0.2
Signed-off-by: Ross Charles Campbell <rossbridger.cc@gmail.com>
|
|
|
|
|
|
| |
Closes: https://bugs.gentoo.org/765553
Package-Manager: Portage-3.0.13, Repoman-3.0.2
Signed-off-by: Ross Charles Campbell <rossbridger.cc@gmail.com>
|
|
|
|
|
| |
Package-Manager: Portage-3.0.12, Repoman-3.0.2
Signed-off-by: Theo Anderson <telans@posteo.de>
|
|
|
|
|
|
|
| |
Closes: https://bugs.gentoo.org/532730
Closes: https://github.com/gentoo/gentoo/pull/17874
Package-Manager: Portage-3.0.12, Repoman-3.0.2
Signed-off-by: Ross Charles Campbell <rossbridger.cc@gmail.com>
|
|
|
|
|
| |
Package-Manager: Portage-3.0.12, Repoman-3.0.2
Signed-off-by: Theo Anderson <telans@posteo.de>
|
|
|
|
|
|
|
| |
no longer inherited automatically by docs
Package-Manager: Portage-3.0.11, Repoman-3.0.2
Signed-off-by: Andrew Ammerlaan <andrewammerlaan@riseup.net>
|
|
|
|
|
| |
Package-Manager: Portage-3.0.11, Repoman-3.0.2
Signed-off-by: Andrew Ammerlaan <andrewammerlaan@riseup.net>
|
|
|
|
|
|
|
|
| |
when USE="doc" (fixed by using eclass which removes the
problematic files)
Package-Manager: Portage-2.3.98, Repoman-2.3.22
Signed-off-by: Andrew Ammerlaan <andrewammerlaan@riseup.net>
|
|
|
|
| |
Signed-off-by: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
|
|
|
|
| |
Signed-off-by: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
|
|
|
|
|
|
|
| |
default here would override to the EAPI default function rather than
the one that cmake.eclass puts as a replacement to src_compile.
Signed-off-by: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
|
|
|
|
| |
Signed-off-by: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
|
|
|
|
|
| |
Package-Manager: Portage-2.3.93, Repoman-2.3.20
Signed-off-by: Andrew Ammerlaan <andrewammerlaan@riseup.net>
|
|
Signed-off-by: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
|