summaryrefslogtreecommitdiff
path: root/0.xml
diff options
context:
space:
mode:
Diffstat (limited to '0.xml')
-rw-r--r--0.xml29
1 files changed, 0 insertions, 29 deletions
diff --git a/0.xml b/0.xml
index 8c9b5d5b29..eb8bcfb7db 100644
--- a/0.xml
+++ b/0.xml
@@ -10,14 +10,6 @@
<result><category>dev-python</category><package>bsddb3</package><version>6.1.0</version><class>DroppedKeywordWarning</class><msg>keywords dropped: hppa</msg></result>
<result><category>dev-python</category><package>cvxopt</package><class>SizeViolation</class><msg>"files/cvxopt-1.1.6-glpk.patch" exceeds 20k in size; 32201 bytes total</msg></result>
<result><category>dev-python</category><package>cvxopt</package><class>SizeViolation</class><msg>"files/cvxopt-1.1.6-glpk449.patch" exceeds 20k in size; 39362 bytes total</msg></result>
-<result><category>dev-python</category><package>django</package><version>1.4.22</version><class>VulnerablePackage</class><msg>vulnerable via glsa(201406-26) ( ver &lt; 1.6.5 &amp;&amp; ver not = 1.5.8 &amp;&amp; ver not = 1.4.13 &amp;&amp; ver not = 1.5.10 &amp;&amp; ver not = 1.4.15 ), keywords ('amd64', 'amd64-linux', 'ia64', 'ppc', 'ppc-macos', 'ppc64', 'sparc', 'x64-macos', 'x86', 'x86-fbsd', 'x86-linux', 'x86-macos')</msg></result>
-<result><category>dev-python</category><package>django</package><version>1.4.22</version><class>VulnerablePackage</class><msg>vulnerable via glsa(201412-22) ( ver &lt; 1.6.7 &amp;&amp; ver not = 1.5.10 &amp;&amp; ver not = 1.4.15 ), keywords ('amd64', 'amd64-linux', 'ia64', 'ppc', 'ppc-macos', 'ppc64', 'sparc', 'x64-macos', 'x86', 'x86-fbsd', 'x86-linux', 'x86-macos')</msg></result>
-<result><category>dev-python</category><package>django</package><version>1.4.22</version><class>VulnerablePackage</class><msg>vulnerable via glsa(201510-06) ( ver &lt; 1.8.3 &amp;&amp; ver not = 1.7.9 &amp;&amp; ver not = 1.4.21 ), keywords ('amd64', 'amd64-linux', 'ia64', 'ppc', 'ppc-macos', 'ppc64', 'sparc', 'x64-macos', 'x86', 'x86-fbsd', 'x86-linux', 'x86-macos')</msg></result>
-<result><category>dev-python</category><package>django</package><version>1.5.12</version><class>VulnerablePackage</class><msg>vulnerable via glsa(201406-26) ( ver &lt; 1.6.5 &amp;&amp; ver not = 1.5.8 &amp;&amp; ver not = 1.4.13 &amp;&amp; ver not = 1.5.10 &amp;&amp; ver not = 1.4.15 ), keywords ()</msg></result>
-<result><category>dev-python</category><package>django</package><version>1.5.12</version><class>VulnerablePackage</class><msg>vulnerable via glsa(201412-22) ( ver &lt; 1.6.7 &amp;&amp; ver not = 1.5.10 &amp;&amp; ver not = 1.4.15 ), keywords ()</msg></result>
-<result><category>dev-python</category><package>django</package><version>1.5.12</version><class>VulnerablePackage</class><msg>vulnerable via glsa(201510-06) ( ver &lt; 1.8.3 &amp;&amp; ver not = 1.7.9 &amp;&amp; ver not = 1.4.21 ), keywords ()</msg></result>
-<result><category>dev-python</category><package>django</package><version>1.6.11</version><class>VulnerablePackage</class><msg>vulnerable via glsa(201510-06) ( ver &lt; 1.8.3 &amp;&amp; ver not = 1.7.9 &amp;&amp; ver not = 1.4.21 ), keywords ()</msg></result>
-<result><category>dev-python</category><package>django</package><version>1.7.11</version><class>VulnerablePackage</class><msg>vulnerable via glsa(201510-06) ( ver &lt; 1.8.3 &amp;&amp; ver not = 1.7.9 &amp;&amp; ver not = 1.4.21 ), keywords ('amd64', 'amd64-linux', 'ia64', 'ppc', 'ppc-macos', 'ppc64', 'sparc', 'x64-macos', 'x86', 'x86-fbsd', 'x86-linux', 'x86-macos')</msg></result>
<result><category>dev-python</category><package>django</package><version>1.5.12</version><class>DroppedKeywordWarning</class><msg>keywords dropped: amd64, ia64, ppc, ppc64, sparc, x86</msg></result>
<result><category>dev-python</category><package>django-classy-tags</package><version>0.6.2</version><class>NoFinalNewline</class><msg>ebuild lacks an ending newline</msg></result>
<result><category>dev-python</category><package>django-durationfield</package><version>0.5.2</version><class>NoFinalNewline</class><msg>ebuild lacks an ending newline</msg></result>
@@ -153,27 +145,6 @@ flagged token- uri mirror://berlios/utidylib/uTidylib-0.2.zip isn't a known mirr
<result><category>sys-kernel</category><package>genkernel-next</package><version>60</version><class>DroppedKeywordWarning</class><msg>keywords dropped: ppc, ppc64</msg></result>
<result><category>sys-kernel</category><package>genkernel-next</package><version>55</version><class>DroppedKeywordWarning</class><msg>keywords dropped: alpha</msg></result>
<result><category>sys-kernel</category><package>vanilla-sources</package><class>UnusedLocalFlags</class><msg>metadata.xml unused local use flag: [ deblob ]</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.0.36.32</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-02) ( ( ver &lt; 2.0 || ver &gt;= 2.4 || ver-rev &lt; 2.4.26.1.3.9-r2 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.0.36.32</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-16) ( ( ver-rev &lt; 2.4.26.1.28-r1 || ver &gt;= 2.4 || ver &lt; 2.0 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.0.36.32</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200408-24) ( ( ver-rev &lt; 2.4.26.1.28-r4 || ver &lt; 2.0 || ver &gt;= 2.4 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.6.5</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-02) ( ( ver &lt; 2.0 || ver &gt;= 2.4 || ver-rev &lt; 2.4.26.1.3.9-r2 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.6.5</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-16) ( ( ver-rev &lt; 2.4.26.1.28-r1 || ver &gt;= 2.4 || ver &lt; 2.0 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.6.5</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200408-24) ( ( ver-rev &lt; 2.4.26.1.28-r4 || ver &lt; 2.0 || ver &gt;= 2.4 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.6.8</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-02) ( ( ver &lt; 2.0 || ver &gt;= 2.4 || ver-rev &lt; 2.4.26.1.3.9-r2 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.6.8</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-16) ( ( ver-rev &lt; 2.4.26.1.28-r1 || ver &gt;= 2.4 || ver &lt; 2.0 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.6.8</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200408-24) ( ( ver-rev &lt; 2.4.26.1.28-r4 || ver &lt; 2.0 || ver &gt;= 2.4 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.6.11</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-02) ( ( ver &lt; 2.0 || ver &gt;= 2.4 || ver-rev &lt; 2.4.26.1.3.9-r2 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.6.11</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-16) ( ( ver-rev &lt; 2.4.26.1.28-r1 || ver &gt;= 2.4 || ver &lt; 2.0 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.6.11</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200408-24) ( ( ver-rev &lt; 2.4.26.1.28-r4 || ver &lt; 2.0 || ver &gt;= 2.4 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.6.14</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-02) ( ( ver &lt; 2.0 || ver &gt;= 2.4 || ver-rev &lt; 2.4.26.1.3.9-r2 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.6.14</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-16) ( ( ver-rev &lt; 2.4.26.1.28-r1 || ver &gt;= 2.4 || ver &lt; 2.0 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.6.14</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200408-24) ( ( ver-rev &lt; 2.4.26.1.28-r4 || ver &lt; 2.0 || ver &gt;= 2.4 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.7.3</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-02) ( ( ver &lt; 2.0 || ver &gt;= 2.4 || ver-rev &lt; 2.4.26.1.3.9-r2 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.7.3</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-16) ( ( ver-rev &lt; 2.4.26.1.28-r1 || ver &gt;= 2.4 || ver &lt; 2.0 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.7.3</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200408-24) ( ( ver-rev &lt; 2.4.26.1.28-r4 || ver &lt; 2.0 || ver &gt;= 2.4 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.7.4</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-02) ( ( ver &lt; 2.0 || ver &gt;= 2.4 || ver-rev &lt; 2.4.26.1.3.9-r2 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.7.4</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200407-16) ( ( ver-rev &lt; 2.4.26.1.28-r1 || ver &gt;= 2.4 || ver &lt; 2.0 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
-<result><category>sys-kernel</category><package>vserver-sources</package><version>2.3.7.4</version><class>VulnerablePackage</class><msg>vulnerable via glsa(200408-24) ( ( ver-rev &lt; 2.4.26.1.28-r4 || ver &lt; 2.0 || ver &gt;= 2.4 ) ), keywords ('amd64', 'hppa', 'x86')</msg></result>
<result><category>www-client</category><package>epiphany</package><version>3.18.0</version><class>DroppedKeywordWarning</class><msg>keywords dropped: alpha, ia64</msg></result>
<result><category>www-client</category><package>netrik</package><version>1.16.1-r1</version><class>MissingSlotDep</class><msg>'sys-libs/readline' matches more than one slot: [ 0, 4, 5 ]</msg></result>
<result><category>www-client</category><package>opera</package><version>33.0.1990.43</version><class>DroppedKeywordWarning</class><msg>keywords dropped: x86</msg></result>