diff options
author | 2020-09-04 14:07:06 +0200 | |
---|---|---|
committer | 2020-09-04 14:07:18 +0200 | |
commit | 7a8736c5acc6898bf74f7788560bf8667f441f67 (patch) | |
tree | 267442a4c944c4a8c3b51a35600bc2e8474b69df /media-sound/sox | |
parent | sys-devel/gdb: stable 9.2 for sparc (diff) | |
download | gentoo-7a8736c5acc6898bf74f7788560bf8667f441f67.tar.gz gentoo-7a8736c5acc6898bf74f7788560bf8667f441f67.tar.bz2 gentoo-7a8736c5acc6898bf74f7788560bf8667f441f67.zip |
media-sound/sox: security cleanup
Bug: https://bugs.gentoo.org/711320
Package-Manager: Portage-3.0.5, Repoman-3.0.1
Signed-off-by: Miroslav Šulc <fordfrog@gentoo.org>
Diffstat (limited to 'media-sound/sox')
-rw-r--r-- | media-sound/sox/Manifest | 1 | ||||
-rw-r--r-- | media-sound/sox/files/sox-14.4.2-CVE-2017-11332.patch | 25 | ||||
-rw-r--r-- | media-sound/sox/files/sox-14.4.2-CVE-2017-11333.patch | 43 | ||||
-rw-r--r-- | media-sound/sox/files/sox-14.4.2-CVE-2017-11358.patch | 26 | ||||
-rw-r--r-- | media-sound/sox/files/sox-14.4.2-CVE-2017-11359.patch | 27 | ||||
-rw-r--r-- | media-sound/sox/files/sox-14.4.2-CVE-2017-15370.patch | 25 | ||||
-rw-r--r-- | media-sound/sox/files/sox-14.4.2-CVE-2017-15371.patch | 37 | ||||
-rw-r--r-- | media-sound/sox/files/sox-14.4.2-CVE-2017-15372.patch | 97 | ||||
-rw-r--r-- | media-sound/sox/files/sox-14.4.2-CVE-2017-15642.patch | 28 | ||||
-rw-r--r-- | media-sound/sox/files/sox-14.4.2-CVE-2017-18189.patch | 30 | ||||
-rw-r--r-- | media-sound/sox/files/sox-14.4.2-wavpack-chk-errors-on-init.patch | 35 | ||||
-rw-r--r-- | media-sound/sox/sox-14.4.2-r1.ebuild | 98 |
12 files changed, 0 insertions, 472 deletions
diff --git a/media-sound/sox/Manifest b/media-sound/sox/Manifest index c561e3e27dc8..f8cd840cafa0 100644 --- a/media-sound/sox/Manifest +++ b/media-sound/sox/Manifest @@ -1,2 +1 @@ -DIST sox-14.4.2.tar.gz 1134299 BLAKE2B 9fae987d421fc733b84746f8dc8f09ced1c3ce066643a426d7c64c4ed4ceeb18e5d00165108b39065a4ce40ff39e9d020fc6e734ff1121ee39bfeed4ad822bc5 SHA512 b5c6203f4f5577503a034fe5b3d6a033ee97fe4d171c533933e2b036118a43a14f97c9668433229708609ccf9ee16abdeca3fc7501aa0aafe06baacbba537eca DIST sox-14.4.2_p20200803.zip 1089835 BLAKE2B fa53d8c9f14620675bf534090bf6c69ec256bb977aa1b3c01b2d95ba8e685eb4f9d479872f303b2954aa1b063c095bf3b90e5b746fd8d7d66e35476e5218fa6b SHA512 8c485a53b9ecce9ecf759d7bbf8d95e568a89505bec7d1258afded4c7ad0f28c624b637a188ab87b64dee720db59b8de20c347805910f0401f00550832e16392 diff --git a/media-sound/sox/files/sox-14.4.2-CVE-2017-11332.patch b/media-sound/sox/files/sox-14.4.2-CVE-2017-11332.patch deleted file mode 100644 index 2b4448ed2d71..000000000000 --- a/media-sound/sox/files/sox-14.4.2-CVE-2017-11332.patch +++ /dev/null @@ -1,25 +0,0 @@ -From 7405bcaacb1ded8c595cb751d407cf738cb26571 Mon Sep 17 00:00:00 2001 -From: Mans Rullgard <mans@mansr.com> -Date: Sun, 5 Nov 2017 16:29:28 +0000 -Subject: [PATCH] wav: fix crash if channel count is zero (CVE-2017-11332) - ---- - src/wav.c | 5 +++++ - 1 file changed, 5 insertions(+) - -diff --git a/src/wav.c b/src/wav.c -index 3e80e692..3eaebfa7 100644 ---- a/src/wav.c -+++ b/src/wav.c -@@ -712,6 +712,11 @@ static int startread(sox_format_t * ft) - else - lsx_report("User options overriding channels read in .wav header"); - -+ if (ft->signal.channels == 0) { -+ lsx_fail_errno(ft, SOX_EHDR, "Channel count is zero"); -+ return SOX_EOF; -+ } -+ - if (ft->signal.rate == 0 || ft->signal.rate == dwSamplesPerSecond) - ft->signal.rate = dwSamplesPerSecond; - else diff --git a/media-sound/sox/files/sox-14.4.2-CVE-2017-11333.patch b/media-sound/sox/files/sox-14.4.2-CVE-2017-11333.patch deleted file mode 100644 index a9a5b2762199..000000000000 --- a/media-sound/sox/files/sox-14.4.2-CVE-2017-11333.patch +++ /dev/null @@ -1,43 +0,0 @@ -From 93b6e4b5b0efa47b318151d39c35277fc06525f1 Mon Sep 17 00:00:00 2001 -Message-Id: <93b6e4b5b0efa47b318151d39c35277fc06525f1.1511192342.git.agx@sigxcpu.org> -From: =?UTF-8?q?Guido=20G=C3=BCnther?= <agx@sigxcpu.org> -Date: Wed, 15 Nov 2017 18:36:58 +0100 -Subject: [PATCH] Handle vorbis_analysis_headerout errors - -This is related to - - https://github.com/xiph/vorbis/pull/34 - -but could also happen today with on other errors in the called function. -https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882236 -Forwarded: sox-devel@lists.sourceforge.net ---- - src/vorbis.c | 8 ++++++-- - 1 file changed, 6 insertions(+), 2 deletions(-) - -Index: sox/src/vorbis.c -=================================================================== ---- sox.orig/src/vorbis.c -+++ sox/src/vorbis.c -@@ -270,8 +270,11 @@ static int write_vorbis_header(sox_forma - vc.comment_lengths[i] = strlen(text); - } - } -- vorbis_analysis_headerout( /* Build the packets */ -- &ve->vd, &vc, &header_main, &header_comments, &header_codebooks); -+ if (vorbis_analysis_headerout( /* Build the packets */ -+ &ve->vd, &vc, &header_main, &header_comments, &header_codebooks) < 0) { -+ ret = HEADER_ERROR; -+ goto cleanup; -+ } - - ogg_stream_packetin(&ve->os, &header_main); /* And stream them out */ - ogg_stream_packetin(&ve->os, &header_comments); -@@ -280,6 +283,7 @@ static int write_vorbis_header(sox_forma - while (ogg_stream_flush(&ve->os, &ve->og) && ret == HEADER_OK) - if (!oe_write_page(&ve->og, ft)) - ret = HEADER_ERROR; -+cleanup: - for (i = 0; i < vc.comments; ++i) - free(vc.user_comments[i]); - free(vc.user_comments); diff --git a/media-sound/sox/files/sox-14.4.2-CVE-2017-11358.patch b/media-sound/sox/files/sox-14.4.2-CVE-2017-11358.patch deleted file mode 100644 index 6cd8c2bb15f6..000000000000 --- a/media-sound/sox/files/sox-14.4.2-CVE-2017-11358.patch +++ /dev/null @@ -1,26 +0,0 @@ -From 6cb44a44b9eda6b321ccdbf6483348d4a9798b00 Mon Sep 17 00:00:00 2001 -From: Mans Rullgard <mans@mansr.com> -Date: Sun, 5 Nov 2017 16:43:35 +0000 -Subject: [PATCH] hcom: fix crash on input with corrupt dictionary - (CVE-2017-11358) - ---- - src/hcom.c | 5 +++++ - 1 file changed, 5 insertions(+) - -diff --git a/src/hcom.c b/src/hcom.c -index c62b020c..1b0e09dd 100644 ---- a/src/hcom.c -+++ b/src/hcom.c -@@ -150,6 +150,11 @@ static int startread(sox_format_t * ft) - lsx_debug("%d %d", - p->dictionary[i].dict_leftson, - p->dictionary[i].dict_rightson); -+ if ((unsigned) p->dictionary[i].dict_leftson >= dictsize || -+ (unsigned) p->dictionary[i].dict_rightson >= dictsize) { -+ lsx_fail_errno(ft, SOX_EHDR, "Invalid dictionary"); -+ return SOX_EOF; -+ } - } - rc = lsx_skipbytes(ft, (size_t) 1); /* skip pad byte */ - if (rc) diff --git a/media-sound/sox/files/sox-14.4.2-CVE-2017-11359.patch b/media-sound/sox/files/sox-14.4.2-CVE-2017-11359.patch deleted file mode 100644 index 180d7d1c867b..000000000000 --- a/media-sound/sox/files/sox-14.4.2-CVE-2017-11359.patch +++ /dev/null @@ -1,27 +0,0 @@ -From 8b590b3a52f4ccc4eea3f41b4a067c38b3565b60 Mon Sep 17 00:00:00 2001 -From: Mans Rullgard <mans@mansr.com> -Date: Sun, 5 Nov 2017 17:02:11 +0000 -Subject: [PATCH] wav: fix crash writing header when channel count >64k - (CVE-2017-11359) - ---- - src/wav.c | 6 ++++++ - 1 file changed, 6 insertions(+) - -diff --git a/src/wav.c b/src/wav.c -index 3eaebfa7..fad334cf 100644 ---- a/src/wav.c -+++ b/src/wav.c -@@ -1379,6 +1379,12 @@ static int wavwritehdr(sox_format_t * ft, int second_header) - long blocksWritten = 0; - sox_bool isExtensible = sox_false; /* WAVE_FORMAT_EXTENSIBLE? */ - -+ if (ft->signal.channels > UINT16_MAX) { -+ lsx_fail_errno(ft, SOX_EOF, "Too many channels (%u)", -+ ft->signal.channels); -+ return SOX_EOF; -+ } -+ - dwSamplesPerSecond = ft->signal.rate; - wChannels = ft->signal.channels; - wBitsPerSample = ft->encoding.bits_per_sample; diff --git a/media-sound/sox/files/sox-14.4.2-CVE-2017-15370.patch b/media-sound/sox/files/sox-14.4.2-CVE-2017-15370.patch deleted file mode 100644 index 473c383a663a..000000000000 --- a/media-sound/sox/files/sox-14.4.2-CVE-2017-15370.patch +++ /dev/null @@ -1,25 +0,0 @@ -From ef3d8be0f80cbb650e4766b545d61e10d7a24c9e Mon Sep 17 00:00:00 2001 -From: Mans Rullgard <mans@mansr.com> -Date: Sun, 5 Nov 2017 16:21:23 +0000 -Subject: [PATCH] wav: ima_adpcm: fix buffer overflow on corrupt input - (CVE-2017-15370) - -Add the same check bad block size as was done for MS adpcm in commit -f39c574b ("More checks for invalid MS ADPCM blocks"). ---- - src/wav.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/wav.c b/src/wav.c -index 5202556c..3e80e692 100644 ---- a/src/wav.c -+++ b/src/wav.c -@@ -127,7 +127,7 @@ static unsigned short ImaAdpcmReadBlock(sox_format_t * ft) - /* work with partial blocks. Specs say it should be null */ - /* padded but I guess this is better than trailing quiet. */ - samplesThisBlock = lsx_ima_samples_in((size_t)0, (size_t)ft->signal.channels, bytesRead, (size_t) 0); -- if (samplesThisBlock == 0) -+ if (samplesThisBlock == 0 || samplesThisBlock > wav->samplesPerBlock) - { - lsx_warn("Premature EOF on .wav input file"); - return 0; diff --git a/media-sound/sox/files/sox-14.4.2-CVE-2017-15371.patch b/media-sound/sox/files/sox-14.4.2-CVE-2017-15371.patch deleted file mode 100644 index cde253da4ecb..000000000000 --- a/media-sound/sox/files/sox-14.4.2-CVE-2017-15371.patch +++ /dev/null @@ -1,37 +0,0 @@ -From 818bdd0ccc1e5b6cae742c740c17fd414935cf39 Mon Sep 17 00:00:00 2001 -From: Mans Rullgard <mans@mansr.com> -Date: Sun, 5 Nov 2017 15:57:48 +0000 -Subject: [PATCH] flac: fix crash on corrupt metadata (CVE-2017-15371) - ---- - src/flac.c | 8 +++++--- - 1 file changed, 5 insertions(+), 3 deletions(-) - -Index: sox/src/flac.c -=================================================================== ---- sox.orig/src/flac.c -+++ sox/src/flac.c -@@ -119,9 +119,10 @@ static void decoder_metadata_callback(FL - p->total_samples = metadata->data.stream_info.total_samples; - } - else if (metadata->type == FLAC__METADATA_TYPE_VORBIS_COMMENT) { -+ const FLAC__StreamMetadata_VorbisComment *vc = &metadata->data.vorbis_comment; - size_t i; - -- if (metadata->data.vorbis_comment.num_comments == 0) -+ if (vc->num_comments == 0) - return; - - if (ft->oob.comments != NULL) { -@@ -129,8 +130,9 @@ static void decoder_metadata_callback(FL - return; - } - -- for (i = 0; i < metadata->data.vorbis_comment.num_comments; ++i) -- sox_append_comment(&ft->oob.comments, (char const *) metadata->data.vorbis_comment.comments[i].entry); -+ for (i = 0; i < vc->num_comments; ++i) -+ if (vc->comments[i].entry) -+ sox_append_comment(&ft->oob.comments, (char const *) vc->comments[i].entry); - } - } - diff --git a/media-sound/sox/files/sox-14.4.2-CVE-2017-15372.patch b/media-sound/sox/files/sox-14.4.2-CVE-2017-15372.patch deleted file mode 100644 index 8671213a98f3..000000000000 --- a/media-sound/sox/files/sox-14.4.2-CVE-2017-15372.patch +++ /dev/null @@ -1,97 +0,0 @@ -From 3f7ed312614649e2695b54b398475d32be4f64f3 Mon Sep 17 00:00:00 2001 -From: Mans Rullgard <mans@mansr.com> -Date: Wed, 8 Nov 2017 00:29:14 +0000 -Subject: adpcm: fix stack overflow with >4 channels (CVE-2017-15372) - ---- - src/adpcm.c | 8 +++++++- - src/adpcm.h | 3 +++ - src/wav.c | 5 ++++- - 3 files changed, 14 insertions(+), 2 deletions(-) - -Index: sox/src/adpcm.c -=================================================================== ---- sox.orig/src/adpcm.c -+++ sox/src/adpcm.c -@@ -71,6 +71,11 @@ const short lsx_ms_adpcm_i_coef[7][2] = - { 392,-232} - }; - -+extern void *lsx_ms_adpcm_alloc(unsigned chans) -+{ -+ return lsx_malloc(chans * sizeof(MsState_t)); -+} -+ - static inline sox_sample_t AdpcmDecode(sox_sample_t c, MsState_t *state, - sox_sample_t sample1, sox_sample_t sample2) - { -@@ -102,6 +107,7 @@ static inline sox_sample_t AdpcmDecode(s - - /* lsx_ms_adpcm_block_expand_i() outputs interleaved samples into one output buffer */ - const char *lsx_ms_adpcm_block_expand_i( -+ void *priv, - unsigned chans, /* total channels */ - int nCoef, - const short *coef, -@@ -113,7 +119,7 @@ const char *lsx_ms_adpcm_block_expand_i( - const unsigned char *ip; - unsigned ch; - const char *errmsg = NULL; -- MsState_t state[4]; /* One decompressor state for each channel */ -+ MsState_t *state = priv; /* One decompressor state for each channel */ - - /* Read the four-byte header for each channel */ - ip = ibuff; -Index: sox/src/adpcm.h -=================================================================== ---- sox.orig/src/adpcm.h -+++ sox/src/adpcm.h -@@ -29,8 +29,11 @@ - /* default coef sets */ - extern const short lsx_ms_adpcm_i_coef[7][2]; - -+extern void *lsx_ms_adpcm_alloc(unsigned chans); -+ - /* lsx_ms_adpcm_block_expand_i() outputs interleaved samples into one output buffer */ - extern const char *lsx_ms_adpcm_block_expand_i( -+ void *priv, - unsigned chans, /* total channels */ - int nCoef, - const short *coef, -Index: sox/src/wav.c -=================================================================== ---- sox.orig/src/wav.c -+++ sox/src/wav.c -@@ -82,6 +82,7 @@ typedef struct { - /* following used by *ADPCM wav files */ - unsigned short nCoefs; /* ADPCM: number of coef sets */ - short *lsx_ms_adpcm_i_coefs; /* ADPCM: coef sets */ -+ void *ms_adpcm_data; /* Private data of adpcm decoder */ - unsigned char *packet; /* Temporary buffer for packets */ - short *samples; /* interleaved samples buffer */ - short *samplePtr; /* Pointer to current sample */ -@@ -175,7 +176,7 @@ static unsigned short AdpcmReadBlock(so - } - } - -- errmsg = lsx_ms_adpcm_block_expand_i(ft->signal.channels, wav->nCoefs, wav->lsx_ms_adpcm_i_coefs, wav->packet, wav->samples, samplesThisBlock); -+ errmsg = lsx_ms_adpcm_block_expand_i(wav->ms_adpcm_data, ft->signal.channels, wav->nCoefs, wav->lsx_ms_adpcm_i_coefs, wav->packet, wav->samples, samplesThisBlock); - - if (errmsg) - lsx_warn("%s", errmsg); -@@ -791,6 +792,7 @@ static int startread(sox_format_t * ft) - - /* nCoefs, lsx_ms_adpcm_i_coefs used by adpcm.c */ - wav->lsx_ms_adpcm_i_coefs = lsx_malloc(wav->nCoefs * 2 * sizeof(short)); -+ wav->ms_adpcm_data = lsx_ms_adpcm_alloc(wChannels); - { - int i, errct=0; - for (i=0; len>=2 && i < 2*wav->nCoefs; i++) { -@@ -1216,6 +1218,7 @@ static int stopread(sox_format_t * ft) - free(wav->packet); - free(wav->samples); - free(wav->lsx_ms_adpcm_i_coefs); -+ free(wav->ms_adpcm_data); - free(wav->comment); - wav->comment = NULL; - diff --git a/media-sound/sox/files/sox-14.4.2-CVE-2017-15642.patch b/media-sound/sox/files/sox-14.4.2-CVE-2017-15642.patch deleted file mode 100644 index d43ef50d1012..000000000000 --- a/media-sound/sox/files/sox-14.4.2-CVE-2017-15642.patch +++ /dev/null @@ -1,28 +0,0 @@ -Description: This fixes a use after free and double free if an empty comment -chunk follows a non-empty one. -Author: Mans Rullgard <mans@mansr.com> -Forwarded: not-needed ---- - src/aiff.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -Index: sox/src/aiff.c -=================================================================== ---- sox.orig/src/aiff.c -+++ sox/src/aiff.c -@@ -62,7 +62,6 @@ int lsx_aiffstartread(sox_format_t * ft) - size_t ssndsize = 0; - char *annotation; - char *author; -- char *comment = NULL; - char *copyright; - char *nametext; - -@@ -270,6 +269,7 @@ int lsx_aiffstartread(sox_format_t * ft) - free(annotation); - } - else if (strncmp(buf, "COMT", (size_t)4) == 0) { -+ char *comment = NULL; - rc = commentChunk(&comment, "Comment:", ft); - if (rc) { - /* Fail already called in function */ diff --git a/media-sound/sox/files/sox-14.4.2-CVE-2017-18189.patch b/media-sound/sox/files/sox-14.4.2-CVE-2017-18189.patch deleted file mode 100644 index fd04bcdff131..000000000000 --- a/media-sound/sox/files/sox-14.4.2-CVE-2017-18189.patch +++ /dev/null @@ -1,30 +0,0 @@ -Description: A corrupt header specifying zero channels would send read_channels() -into an infinite loop. Prevent this by sanity checking the channel -count in open_read(). Also add an upper bound to prevent overflow -in multiplication. -https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881121 -Author: Mans Rullgard <mans@mansr.com> - Jaromír Mikeš <mira.mikes@seznam.cz> -Forwarded: not-needed - ---- - src/xa.c | 6 ++++++ - 1 file changed, 6 insertions(+) - -Index: sox/src/xa.c -=================================================================== ---- sox.orig/src/xa.c -+++ sox/src/xa.c -@@ -143,6 +143,12 @@ static int startread(sox_format_t * ft) - lsx_report("User options overriding rate read in .xa header"); - } - -+ if (ft->signal.channels == 0 || ft->signal.channels > UINT16_MAX) { -+ lsx_fail_errno(ft, SOX_EFMT, "invalid channel count %d", -+ ft->signal.channels); -+ return SOX_EOF; -+ } -+ - /* Check for supported formats */ - if (ft->encoding.bits_per_sample != 16) { - lsx_fail_errno(ft, SOX_EFMT, "%d-bit sample resolution not supported.", diff --git a/media-sound/sox/files/sox-14.4.2-wavpack-chk-errors-on-init.patch b/media-sound/sox/files/sox-14.4.2-wavpack-chk-errors-on-init.patch deleted file mode 100644 index 4ebb31c0ae94..000000000000 --- a/media-sound/sox/files/sox-14.4.2-wavpack-chk-errors-on-init.patch +++ /dev/null @@ -1,35 +0,0 @@ -Description: wavpack: check errors when initializing -https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881145 -Author: Eric Wong <normalperson@yhbt.net> - Jaromír Mikeš <mira.mikes@seznam.cz> -Forwarded: not-needed - - src/wavpack.c | 8 ++++++++ - 1 file changed, 8 insertions(+) - -diff --git a/src/wavpack.c b/src/wavpack.c -index 9e525cd4..b7e8dafa 100644 ---- a/src/wavpack.c -+++ b/src/wavpack.c -@@ -65,6 +65,10 @@ static int start_read(sox_format_t * ft) - char msg[80]; - - p->codec = WavpackOpenFileInputEx(&io_fns, ft, NULL, msg, OPEN_NORMALIZE, 0); -+ if (!p->codec) { -+ lsx_fail_errno(ft, SOX_EHDR, "%s", msg); -+ return SOX_EOF; -+ } - ft->encoding.bits_per_sample = WavpackGetBytesPerSample(p->codec) << 3; - ft->signal.channels = WavpackGetNumChannels(p->codec); - if (WavpackGetSampleRate(p->codec) && ft->signal.rate && ft->signal.rate != WavpackGetSampleRate(p->codec)) -@@ -108,6 +112,10 @@ static int start_write(sox_format_t * ft) - uint64_t size64; - - p->codec = WavpackOpenFileOutput(ft_write_b_buf, ft, NULL); -+ if (!p->codec) { -+ lsx_fail_errno(ft, SOX_ENOMEM, "WavPack error creating output instance"); -+ return SOX_EOF; -+ } - memset(&config, 0, sizeof(config)); - config.bytes_per_sample = ft->encoding.bits_per_sample >> 3; - config.bits_per_sample = ft->encoding.bits_per_sample; diff --git a/media-sound/sox/sox-14.4.2-r1.ebuild b/media-sound/sox/sox-14.4.2-r1.ebuild deleted file mode 100644 index f6a0b545d51a..000000000000 --- a/media-sound/sox/sox-14.4.2-r1.ebuild +++ /dev/null @@ -1,98 +0,0 @@ -# Copyright 1999-2020 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=6 - -inherit autotools - -DESCRIPTION="The swiss army knife of sound processing programs" -HOMEPAGE="http://sox.sourceforge.net" -SRC_URI="mirror://sourceforge/sox/${P}.tar.gz" - -LICENSE="LGPL-2.1" -SLOT="0" -KEYWORDS="~alpha amd64 arm arm64 ~hppa ~ia64 ~mips ppc ppc64 sparc x86 ~amd64-linux ~x86-linux ~ppc-macos ~x86-solaris" -IUSE="alsa amr ao debug encode flac id3tag ladspa mad ogg openmp oss opus png pulseaudio sndfile static-libs twolame wavpack" - -RDEPEND=" - dev-libs/libltdl:0= - >=media-sound/gsm-1.0.12-r1 - alsa? ( media-libs/alsa-lib ) - amr? ( media-libs/opencore-amr ) - ao? ( media-libs/libao ) - encode? ( >=media-sound/lame-3.98.4 ) - flac? ( >=media-libs/flac-1.1.3 ) - id3tag? ( media-libs/libid3tag ) - ladspa? ( media-libs/ladspa-sdk ) - mad? ( media-libs/libmad ) - ogg? ( - media-libs/libogg - media-libs/libvorbis - ) - opus? ( - media-libs/opus - media-libs/opusfile - ) - png? ( - media-libs/libpng:0= - sys-libs/zlib - ) - pulseaudio? ( media-sound/pulseaudio ) - sndfile? ( >=media-libs/libsndfile-1.0.11 ) - twolame? ( media-sound/twolame ) - wavpack? ( media-sound/wavpack )" -DEPEND="${RDEPEND} - virtual/pkgconfig" - -DOCS=( AUTHORS ChangeLog NEWS README ) - -PATCHES=( - "${FILESDIR}"/${P}-CVE-2017-11332.patch - "${FILESDIR}"/${P}-CVE-2017-11333.patch - "${FILESDIR}"/${P}-CVE-2017-11358.patch - "${FILESDIR}"/${P}-CVE-2017-11359.patch - "${FILESDIR}"/${P}-CVE-2017-15370.patch - "${FILESDIR}"/${P}-CVE-2017-15371.patch - "${FILESDIR}"/${P}-CVE-2017-15372.patch - "${FILESDIR}"/${P}-CVE-2017-15642.patch - "${FILESDIR}"/${P}-CVE-2017-18189.patch - "${FILESDIR}"/${P}-wavpack-chk-errors-on-init.patch -) - -src_prepare() { - default - sed -i -e 's:CFLAGS="-g":CFLAGS="$CFLAGS -g":' configure.ac || die #386027 - eautoreconf -} - -src_configure() { - econf \ - $(use_with alsa) \ - $(use_with amr amrnb) \ - $(use_with amr amrwb) \ - $(use_with ao) \ - $(use_enable debug) \ - $(use_with encode lame) \ - $(use_with flac) \ - $(use_with id3tag) \ - $(use_with ladspa) \ - $(use_with mad) \ - $(use_enable openmp) \ - $(use_with ogg oggvorbis) \ - $(use_with oss) \ - $(use_with opus) \ - $(use_with png) \ - $(use_with pulseaudio) \ - $(use_with sndfile) \ - $(use_enable static-libs static) \ - $(use_with twolame) \ - $(use_with wavpack) \ - --with-distro="Gentoo" -} - -src_install() { - default - # libltdl is used for loading plugins, keeping libtool files with empty - # dependency_libs what otherwise would be -exec rm -f {} + - find "${ED}" -name '*.la' -exec sed -i -e "/^dependency_libs/s:=.*:='':" {} + -} |