Skip to content

Commit

Permalink
sys-apps/intel-sa-00075-tools: New package, tools from Intel to detec…
Browse files Browse the repository at this point in the history
…t and mitigate MEI/AMT vulnerability

Package-Manager: Portage-2.3.6, Repoman-2.3.2
  • Loading branch information
chutz committed Jun 26, 2017
1 parent bcd984c commit ec025ee
Show file tree
Hide file tree
Showing 4 changed files with 68 additions and 0 deletions.
1 change: 1 addition & 0 deletions sys-apps/intel-sa-00075-tools/Manifest
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
DIST intel-sa-00075-tools-1.0.tar.gz 18750 SHA256 1f6f86cb7740285f49c0c2882f7f2ad318cf04adfcbfcb29ffd80e7eb6d03e14 SHA512 a42ee0e1553f4638c2976d8a28feb8c91d5ecb9163608f735406a3c80213f34933231320630f43392552fa69674afb1795f23fffef29b4cad45641827130e86e WHIRLPOOL 3accb57db89d50a558e910d8a1f091cf122f6788b754834caf5a578204cfe2ae25e5aa7231da9c1aaf20ab20f97d5647d78bab76d10d346fed168b782a560aaf
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
diff --git a/Makefile b/Makefile
index 5ccccff..f58d7bb 100644
--- a/Makefile
+++ b/Makefile
@@ -63,12 +63,12 @@
#
#;****************************************************************************;

+PREFIX := /usr

PROGS = INTEL-SA-00075-Discovery-Tool \
INTEL-SA-00075-Unprovisioning-Tool

all:$(PROGS)
- strip $(PROGS)

INTEL-SA-00075-Discovery-Tool: INTEL-SA-00075-Discovery-Tool.o INTEL-SA-00075.o
INTEL-SA-00075-Unprovisioning-Tool: INTEL-SA-00075-Unprovisioning-Tool.o INTEL-SA-00075.o
@@ -77,3 +77,5 @@ clean:
rm -f $(PROGS)
rm -f *.o

+install:
+ install -D -t $(DESTDIR)$(PREFIX)/sbin/ $(PROGS)
24 changes: 24 additions & 0 deletions sys-apps/intel-sa-00075-tools/intel-sa-00075-tools-1.0.ebuild
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
# Copyright 1999-2017 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2

EAPI=6

inherit toolchain-funcs

MY_PN="INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools"

DESCRIPTION="Tools from Intel to detect and mitigate the AMT/MEI vulnerability"
HOMEPAGE="https://downloadcenter.intel.com/download/26799/INTEL-SA-00075-Linux-Detection-and-Mitigation-Tools"
SRC_URI="https://github.com/intel/${MY_PN}/archive/${PV}.tar.gz -> ${P}.tar.gz"

LICENSE="GPL-2 BSD"
SLOT="0"
KEYWORDS="~amd64 ~x86"

S="${WORKDIR}/${MY_PN}-${PV}"

PATCHES=("${FILESDIR}/${PN}-makefile.patch")

src_compile() {
emake CC="$(tc-getCC)" CFLAGS="${CFLAGS}" LDFLAGS="${LDFLAGS}"
}
19 changes: 19 additions & 0 deletions sys-apps/intel-sa-00075-tools/metadata.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<maintainer type="person">
<email>[email protected]</email>
<name>Patrick McLean</name>
</maintainer>
<longdescription lang="en">
The INTEL-SA-00075-Discovery-Tool for local analysis of a single or
multiple systems.

The INTEL-SA-00075-Unprovisioning-Tool will unprovision computers with
Intel® Active Management Technology (Intel® AMT), Intel® Standard
Manageability, and Intel® Small Business Technology (Intel® SBT) that
are vulnerable to the issue identified in INTEL-SA-00075. This tool
will allow you to unprovision management features, configured in
Client Control Mode (CCM).
</longdescription>
</pkgmetadata>

0 comments on commit ec025ee

Please sign in to comment.