<<< ebuild_src_offline >>> sys-firmware/edk2|https://uefi.org/sites/default/files/resources/x64_DBXUpdate_05092023.bin:https://uefi.org/sites/default/files/resources/arm64_DBXUpdate_05092023.bin|virtualization@gentoo.org:chewi@gentoo.org <<< packages_pkgcheck_scan >>> ExcessiveLineLength: version 202202: excessive line length (over 120 characters) on lines: 23, 24 VariableOrderWrong: version 202202: variable S should occur before KEYWORDS DeadUrl: version 202502-r1: SRC_URI: 403 Client Error: Forbidden for url: https://uefi.org/sites/default/files/resources/arm64_DBXUpdate.bin DeadUrl: version 202502-r1: SRC_URI: 403 Client Error: Forbidden for url: https://uefi.org/sites/default/files/resources/arm64_DBXUpdate_05092023.bin DeadUrl: version 202502-r1: SRC_URI: 403 Client Error: Forbidden for url: https://uefi.org/sites/default/files/resources/x64_DBXUpdate.bin DeadUrl: version 202502-r1: SRC_URI: 403 Client Error: Forbidden for url: https://uefi.org/sites/default/files/resources/x64_DBXUpdate_05092023.bin <<< open bugs >>> https://bugs.gentoo.org/867772 sys-cluster/minikube:_kvm2_driver_uses_wrong_hardcoded_paths_for_aarch64_efi_firmware_(sys-firmware/edk2) https://bugs.gentoo.org/797703 sys-firmware/edk2-202105:_heap_overflow_vulnerability_(CVE-2021-28211) https://bugs.gentoo.org/921729 sys-firmware/edk2{,-bin}:_multiple_vulnerabilities https://bugs.gentoo.org/922253 sys-firmware/edk2{-bin,}:_multiple_vulnerabilities https://bugs.gentoo.org/945354 sys-firmware/edk2-202408_fails_to_compile:_main.c:163:42:_error:_too_many_arguments_to_function_p-process https://bugs.gentoo.org/947789 sys-firmware/edk2-bin_package_not_generating_files_for_architectures_other_than_host https://bugs.gentoo.org/964058 sys-firmware/edk2-202502-r1_with_dev-lang/nasm-3.01:_error:_instruction_not_valid_with_32-bit_operand_size https://bugs.gentoo.org/797232 sys-firmware/edk2-202105:_privilege_escalation_with_local_access_(CVE-2019-14584)