{"bugs":[{"bugid":644760,"firstseen":"2025-07-11T02:48:40.189262","severity":"normal","status":"CONFIRMED","summary":"sys-apps\/intel-sa-00075-tools-1.2 version bump"},{"bugid":829634,"firstseen":"2025-07-11T02:48:40.189262","severity":"normal","status":"CONFIRMED","summary":"sys-apps\/intel-sa-00075-tools-1.0 - INTEL-SA-00075.h: fatal error: bits\/wordsize.h: No such file or directory"}],"categories":[{"categoryid":343,"name":"sys-apps","summary":"The sys-apps category contains various core system applications, and some non-core system applications which have not yet been moved out into other sys- categories."}],"changelog":[{"authoremail":"repomirrorci@gentoo.org","authorname":"Repository mirror & CI","commitid":"01864e0cab1bfedc82808a0861f888ecb511e8e6","committime":"2025-10-05T20:33:49","packageid":67831,"repoid":1,"summary":"Merge updates from master"},{"authoremail":"arthurzam@gentoo.org","authorname":"Arthur Zamarin","body":"::musl had another patch, which just drops the include for\n<bits\/wordsize.h>, but this caused failure on glibc. Better\nsolution is to replace it with <limits.h> which exposes publicly\nthe needed macros (internally imports <bits\/wordsize.h>) and on\nmusl also works.\n\nSigned-off-by: Arthur Zamarin <arthurzam@gentoo.org>","commitid":"99edaffa00fe9d17a436568e4d68301e80fb66a6","committime":"2025-10-05T20:18:01","packageid":67831,"repoid":1,"summary":"sys-apps\/intel-sa-00075-tools: fix build on musl"},{"authoremail":"repomirrorci@gentoo.org","authorname":"Repository mirror & CI","commitid":"a08431f0bb6c2432135701c8812c9b96b6811abb","committime":"2024-04-17T21:19:00","packageid":67831,"repoid":1,"summary":"Merge updates from master"},{"authoremail":"mmk@levelnine.at","authorname":"Michael Mair-Keimberger","body":"Signed-off-by: Michael Mair-Keimberger <mmk@levelnine.at>\nCloses: https:\/\/github.com\/gentoo\/gentoo\/pull\/36142\nSigned-off-by: Conrad Kostecki <conikost@gentoo.org>","commitid":"de03c39ab42171f660953a0784d0769b5e63b594","committime":"2024-04-06T15:26:49","packageid":67831,"repoid":1,"summary":"sys-apps\/intel-sa-00075-tools: EAPI8 bump"},{"authoremail":"repo-qa-checks@gentoo.org","authorname":"Repository QA checks","commitid":"ad03c984b222ed90d473ec437835cfdee32499af","committime":"2017-06-26T23:23:42","packageid":67831,"repoid":1,"summary":"Merge updates from master"},{"authoremail":"chutzpah@gentoo.org","authorname":"Patrick McLean","body":"Package-Manager: Portage-2.3.6, Repoman-2.3.2","commitid":"ec025ee92ca22f9f2d2ca374605e8b8b756f6f4a","committime":"2017-06-26T23:16:06","packageid":67831,"repoid":1,"summary":"sys-apps\/intel-sa-00075-tools: New package, tools from Intel to detect and mitigate MEI\/AMT vulnerability"}],"dependencies":[],"depending":[],"ebuilds":[{"archs":["~amd64","~x86"],"ebuildid":823558,"firstseen":"2024-04-17T22:31:14.952697","license":"GPL-2 BSD","moddate":"2026-03-22T20:20:58","packageid":67831,"repoid":1,"slot":"0","uses":[],"version":"1.0-r1"}],"masks":[],"package":{"categoryid":343,"description":"Tools from Intel to detect and mitigate the AMT\/MEI vulnerability","firstseen":"2017-06-26T23:42:03.780515","name":"intel-sa-00075-tools","packageid":67831,"summary":"The INTEL-SA-00075-Discovery-Tool for local analysis of a single or multiple systems. The INTEL-SA-00075-Unprovisioning-Tool will unprovision computers with Intel® Active Management Technology (Intel® AMT), Intel® Standard Manageability, and Intel® Small Business Technology (Intel® SBT) that are vulnerable to the issue identified in INTEL-SA-00075. This tool will allow you to unprovision management features, configured in Client Control Mode (CCM)."},"rdependencies":[],"repos":[{"branch":"master","lastcommit":"09daf722ab2fdfcd52776c73efabc1635c80eaa1","name":"gentoo","path":"\/usr\/portage","repoid":1,"upstream":"origin"}],"tracked":false,"urls":["https:\/\/downloadcenter.intel.com\/download\/26799\/INTEL-SA-00075-Linux-Detection-and-Mitigation-Tools"],"uses":[]}