This follows the logic in godot's build system.
Closes: https://bugs.gentoo.org/794556
Package-Manager: Portage-3.0.19, Repoman-3.0.3
Signed-off-by: Ross Charles Campbell <rossbridger.cc@gmail.com>
Since embree (https://github.com/embree/embree) is not landed
at the moment, raycast module is disabled for the moment.
Package-Manager: Portage-3.0.18, Repoman-3.0.3
Signed-off-by: Ross Charles Campbell <rossbridger.cc@gmail.com>
An integer overflow issue exists in Godot Engine up to v3.2 that can
be triggered when loading specially crafted.TGA image files. The
vulnerability exists in ImageLoaderTGA::load_image() function at line:
const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size;
The bug leads to Dynamic stack buffer overflow. Depending on the
context of the application, attack vector can be local or remote,
and can lead to code execution and/or system crash.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2021-26825
Reference: https://github.com/godotengine/godot/pull/45702
Closes: https://bugs.gentoo.org/769761
Package-Manager: Portage-3.0.14, Repoman-3.0.2
Signed-off-by: Ross Charles Campbell <rossbridger.cc@gmail.com>
when USE="doc" (fixed by using eclass which removes the
problematic files)
Package-Manager: Portage-2.3.98, Repoman-2.3.22
Signed-off-by: Andrew Ammerlaan <andrewammerlaan@riseup.net>
default here would override to the EAPI default function rather than
the one that cmake.eclass puts as a replacement to src_compile.
Signed-off-by: Haelwenn (lanodan) Monnier <contact@hacktivis.me>