diff options
author | 2017-06-26 16:16:06 -0700 | |
---|---|---|
committer | 2017-06-26 16:16:06 -0700 | |
commit | ec025ee92ca22f9f2d2ca374605e8b8b756f6f4a (patch) | |
tree | a8cb6e9e9338bc0982be4475fe45a0360d19d36f /sys-apps | |
parent | sys-fs/reiserfsprogs: Bump to version 3.6.26 (diff) | |
download | gentoo-ec025ee92ca22f9f2d2ca374605e8b8b756f6f4a.tar.gz gentoo-ec025ee92ca22f9f2d2ca374605e8b8b756f6f4a.tar.bz2 gentoo-ec025ee92ca22f9f2d2ca374605e8b8b756f6f4a.zip |
sys-apps/intel-sa-00075-tools: New package, tools from Intel to detect and mitigate MEI/AMT vulnerability
Package-Manager: Portage-2.3.6, Repoman-2.3.2
Diffstat (limited to 'sys-apps')
4 files changed, 68 insertions, 0 deletions
diff --git a/sys-apps/intel-sa-00075-tools/Manifest b/sys-apps/intel-sa-00075-tools/Manifest new file mode 100644 index 000000000000..5f8857894b77 --- /dev/null +++ b/sys-apps/intel-sa-00075-tools/Manifest @@ -0,0 +1 @@ +DIST intel-sa-00075-tools-1.0.tar.gz 18750 SHA256 1f6f86cb7740285f49c0c2882f7f2ad318cf04adfcbfcb29ffd80e7eb6d03e14 SHA512 a42ee0e1553f4638c2976d8a28feb8c91d5ecb9163608f735406a3c80213f34933231320630f43392552fa69674afb1795f23fffef29b4cad45641827130e86e WHIRLPOOL 3accb57db89d50a558e910d8a1f091cf122f6788b754834caf5a578204cfe2ae25e5aa7231da9c1aaf20ab20f97d5647d78bab76d10d346fed168b782a560aaf diff --git a/sys-apps/intel-sa-00075-tools/files/intel-sa-00075-tools-makefile.patch b/sys-apps/intel-sa-00075-tools/files/intel-sa-00075-tools-makefile.patch new file mode 100644 index 000000000000..3cdf418315f7 --- /dev/null +++ b/sys-apps/intel-sa-00075-tools/files/intel-sa-00075-tools-makefile.patch @@ -0,0 +1,24 @@ +diff --git a/Makefile b/Makefile +index 5ccccff..f58d7bb 100644 +--- a/Makefile ++++ b/Makefile +@@ -63,12 +63,12 @@ + # + #;****************************************************************************; + ++PREFIX := /usr + + PROGS = INTEL-SA-00075-Discovery-Tool \ + INTEL-SA-00075-Unprovisioning-Tool + + all:$(PROGS) +- strip $(PROGS) + + INTEL-SA-00075-Discovery-Tool: INTEL-SA-00075-Discovery-Tool.o INTEL-SA-00075.o + INTEL-SA-00075-Unprovisioning-Tool: INTEL-SA-00075-Unprovisioning-Tool.o INTEL-SA-00075.o +@@ -77,3 +77,5 @@ clean: + rm -f $(PROGS) + rm -f *.o + ++install: ++ install -D -t $(DESTDIR)$(PREFIX)/sbin/ $(PROGS) diff --git a/sys-apps/intel-sa-00075-tools/intel-sa-00075-tools-1.0.ebuild b/sys-apps/intel-sa-00075-tools/intel-sa-00075-tools-1.0.ebuild new file mode 100644 index 000000000000..ad560d576889 --- /dev/null +++ b/sys-apps/intel-sa-00075-tools/intel-sa-00075-tools-1.0.ebuild @@ -0,0 +1,24 @@ +# Copyright 1999-2017 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +EAPI=6 + +inherit toolchain-funcs + +MY_PN="INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools" + +DESCRIPTION="Tools from Intel to detect and mitigate the AMT/MEI vulnerability" +HOMEPAGE="https://downloadcenter.intel.com/download/26799/INTEL-SA-00075-Linux-Detection-and-Mitigation-Tools" +SRC_URI="https://github.com/intel/${MY_PN}/archive/${PV}.tar.gz -> ${P}.tar.gz" + +LICENSE="GPL-2 BSD" +SLOT="0" +KEYWORDS="~amd64 ~x86" + +S="${WORKDIR}/${MY_PN}-${PV}" + +PATCHES=("${FILESDIR}/${PN}-makefile.patch") + +src_compile() { + emake CC="$(tc-getCC)" CFLAGS="${CFLAGS}" LDFLAGS="${LDFLAGS}" +} diff --git a/sys-apps/intel-sa-00075-tools/metadata.xml b/sys-apps/intel-sa-00075-tools/metadata.xml new file mode 100644 index 000000000000..bf8d19147b75 --- /dev/null +++ b/sys-apps/intel-sa-00075-tools/metadata.xml @@ -0,0 +1,19 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> + <maintainer type="person"> + <email>chutzpah@gentoo.org</email> + <name>Patrick McLean</name> + </maintainer> + <longdescription lang="en"> + The INTEL-SA-00075-Discovery-Tool for local analysis of a single or + multiple systems. + + The INTEL-SA-00075-Unprovisioning-Tool will unprovision computers with + Intel® Active Management Technology (Intel® AMT), Intel® Standard + Manageability, and Intel® Small Business Technology (Intel® SBT) that + are vulnerable to the issue identified in INTEL-SA-00075. This tool + will allow you to unprovision management features, configured in + Client Control Mode (CCM). + </longdescription> +</pkgmetadata> |