diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-04-27 21:43:51 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-04-28 08:59:37 +0200 |
commit | 2ab30d1fd90998cdb2715bec99430671123c3ece (patch) | |
tree | a328234d670d7f3771dda79b370354b4344986f3 /source/d | |
parent | ee861a17268a54a17b3b321d9a1ff82ed547e606 (diff) | |
download | current-2ab30d1fd90998cdb2715bec99430671123c3ece.tar.gz |
Wed Apr 27 21:43:51 UTC 202220220427214351
a/kernel-generic-5.17.5-x86_64-1.txz: Upgraded.
a/kernel-huge-5.17.5-x86_64-1.txz: Upgraded.
a/kernel-modules-5.17.5-x86_64-1.txz: Upgraded.
a/sysvinit-3.04-x86_64-1.txz: Upgraded.
ap/sqlite-3.38.3-x86_64-1.txz: Upgraded.
d/gcc-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-brig-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-g++-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-gdc-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-gfortran-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-gnat-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-go-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-objc-11.3.0-x86_64-1.txz: Upgraded.
d/kernel-headers-5.17.5-x86-1.txz: Upgraded.
d/libtool-2.4.7-x86_64-1.txz: Upgraded.
This also updates the embedded GCC version number.
k/kernel-source-5.17.5-noarch-1.txz: Upgraded.
CC_VERSION_TEXT "gcc (GCC) 11.2.0" -> "gcc (GCC) 11.3.0"
GCC_VERSION 110200 -> 110300
+CC_HAS_SLS y
+SLS y
kde/krita-5.0.6-x86_64-1.txz: Upgraded.
l/netpbm-10.98.02-x86_64-1.txz: Upgraded.
l/nodejs-16.15.0-x86_64-1.txz: Upgraded.
n/curl-7.83.0-x86_64-1.txz: Upgraded.
This update fixes security issues:
OAUTH2 bearer bypass in connection re-use.
Credential leak on redirect.
Bad local IPv6 connection reuse.
Auth/cookie leak on redirect.
For more information, see:
https://curl.se/docs/CVE-2022-22576.html
https://curl.se/docs/CVE-2022-27774.html
https://curl.se/docs/CVE-2022-27775.html
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
(* Security fix *)
n/fetchmail-6.4.30-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'source/d')
-rwxr-xr-x | source/d/gcc/gcc.SlackBuild | 6 | ||||
-rw-r--r-- | source/d/gcc/patches/7185690.diff | 27 | ||||
-rwxr-xr-x | source/d/libtool/libtool.SlackBuild | 2 |
3 files changed, 2 insertions, 33 deletions
diff --git a/source/d/gcc/gcc.SlackBuild b/source/d/gcc/gcc.SlackBuild index 6e5e6b32..a1a6c4c6 100755 --- a/source/d/gcc/gcc.SlackBuild +++ b/source/d/gcc/gcc.SlackBuild @@ -57,7 +57,7 @@ cd $(dirname $0) ; CWD=$(pwd) PKGNAM=gcc SRCVER=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)} VERSION=$(echo $SRCVER | cut -f 1 -d _) -BUILD=${BUILD:-2} +BUILD=${BUILD:-1} # How many jobs to run in parallel: NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "} @@ -174,10 +174,6 @@ zcat $CWD/patches/gfortran.deferred-shape-vs-assumed-shape.patch.gz | patch -p0 # Fix regressions in 10.3.0 (and presumably 11.1.0 since they still apply cleanly): zcat $CWD/patches/PR100102-2.a1b3484a8e6c53c8084723e3f1738d402374198e.patch.gz | patch -p1 --verbose --backup --suffix=.orig || exit 1 -# Fix compiler error in gcc-go -# https://github.com/golang/go/issues/47771 -zcat $CWD/patches/7185690.diff.gz | patch -p1 --verbose --backup --suffix=.orig || exit 1 - # Fix perms/owners: chown -R root:root . find . \ diff --git a/source/d/gcc/patches/7185690.diff b/source/d/gcc/patches/7185690.diff deleted file mode 100644 index 4d0824fd..00000000 --- a/source/d/gcc/patches/7185690.diff +++ /dev/null @@ -1,27 +0,0 @@ -From 71856902b87505ff8ab6845533b598bffe5333bb Mon Sep 17 00:00:00 2001 -From: Ian Lance Taylor <iant@golang.org> -Date: Sat, 21 Aug 2021 12:42:19 -0700 -Subject: [PATCH] compiler: correct condition for calling memclrHasPointers - -When compiling append(s, make([]typ, ln)...), where typ has a pointer, -and the append fits within the existing capacity of s, the condition -used to clear out the new elements was reversed. - -Fixes golang/go#47771 - -Change-Id: Ia880adc08ab723afe3f927e65c9e081f9f717f90 ---- - -diff --git a/gcc/go/gofrontend/expressions.cc b/gcc/go/gofrontend/expressions.cc -index 8d4d168..ddb1d91 100644 ---- a/gcc/go/gofrontend/expressions.cc -+++ b/gcc/go/gofrontend/expressions.cc -@@ -9350,7 +9350,7 @@ - ref2 = Expression::make_cast(uint_type, ref2, loc); - cond = Expression::make_binary(OPERATOR_GT, ref, ref2, loc); - zero = Expression::make_integer_ul(0, int_type, loc); -- call = Expression::make_conditional(cond, call, zero, loc); -+ call = Expression::make_conditional(cond, zero, call, loc); - } - } - else diff --git a/source/d/libtool/libtool.SlackBuild b/source/d/libtool/libtool.SlackBuild index cd6fd761..bf80013e 100755 --- a/source/d/libtool/libtool.SlackBuild +++ b/source/d/libtool/libtool.SlackBuild @@ -24,7 +24,7 @@ cd $(dirname $0) ; CWD=$(pwd) PKGNAM=libtool VERSION=${VERSION:-$(echo libtool-*.tar.xz | rev | cut -f 3- -d . | cut -f 1 -d - | rev)} -BUILD=${BUILD:-18} +BUILD=${BUILD:-1} NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "} |