diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-04-27 21:43:51 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-04-28 08:59:37 +0200 |
commit | 2ab30d1fd90998cdb2715bec99430671123c3ece (patch) | |
tree | a328234d670d7f3771dda79b370354b4344986f3 /source/d/gcc/gcc.SlackBuild | |
parent | ee861a17268a54a17b3b321d9a1ff82ed547e606 (diff) | |
download | current-2ab30d1fd90998cdb2715bec99430671123c3ece.tar.gz current-2ab30d1fd90998cdb2715bec99430671123c3ece.tar.xz |
Wed Apr 27 21:43:51 UTC 202220220427214351
a/kernel-generic-5.17.5-x86_64-1.txz: Upgraded.
a/kernel-huge-5.17.5-x86_64-1.txz: Upgraded.
a/kernel-modules-5.17.5-x86_64-1.txz: Upgraded.
a/sysvinit-3.04-x86_64-1.txz: Upgraded.
ap/sqlite-3.38.3-x86_64-1.txz: Upgraded.
d/gcc-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-brig-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-g++-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-gdc-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-gfortran-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-gnat-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-go-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-objc-11.3.0-x86_64-1.txz: Upgraded.
d/kernel-headers-5.17.5-x86-1.txz: Upgraded.
d/libtool-2.4.7-x86_64-1.txz: Upgraded.
This also updates the embedded GCC version number.
k/kernel-source-5.17.5-noarch-1.txz: Upgraded.
CC_VERSION_TEXT "gcc (GCC) 11.2.0" -> "gcc (GCC) 11.3.0"
GCC_VERSION 110200 -> 110300
+CC_HAS_SLS y
+SLS y
kde/krita-5.0.6-x86_64-1.txz: Upgraded.
l/netpbm-10.98.02-x86_64-1.txz: Upgraded.
l/nodejs-16.15.0-x86_64-1.txz: Upgraded.
n/curl-7.83.0-x86_64-1.txz: Upgraded.
This update fixes security issues:
OAUTH2 bearer bypass in connection re-use.
Credential leak on redirect.
Bad local IPv6 connection reuse.
Auth/cookie leak on redirect.
For more information, see:
https://curl.se/docs/CVE-2022-22576.html
https://curl.se/docs/CVE-2022-27774.html
https://curl.se/docs/CVE-2022-27775.html
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
(* Security fix *)
n/fetchmail-6.4.30-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'source/d/gcc/gcc.SlackBuild')
-rwxr-xr-x | source/d/gcc/gcc.SlackBuild | 6 |
1 files changed, 1 insertions, 5 deletions
diff --git a/source/d/gcc/gcc.SlackBuild b/source/d/gcc/gcc.SlackBuild index 6e5e6b321..a1a6c4c6c 100755 --- a/source/d/gcc/gcc.SlackBuild +++ b/source/d/gcc/gcc.SlackBuild @@ -57,7 +57,7 @@ cd $(dirname $0) ; CWD=$(pwd) PKGNAM=gcc SRCVER=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)} VERSION=$(echo $SRCVER | cut -f 1 -d _) -BUILD=${BUILD:-2} +BUILD=${BUILD:-1} # How many jobs to run in parallel: NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "} @@ -174,10 +174,6 @@ zcat $CWD/patches/gfortran.deferred-shape-vs-assumed-shape.patch.gz | patch -p0 # Fix regressions in 10.3.0 (and presumably 11.1.0 since they still apply cleanly): zcat $CWD/patches/PR100102-2.a1b3484a8e6c53c8084723e3f1738d402374198e.patch.gz | patch -p1 --verbose --backup --suffix=.orig || exit 1 -# Fix compiler error in gcc-go -# https://github.com/golang/go/issues/47771 -zcat $CWD/patches/7185690.diff.gz | patch -p1 --verbose --backup --suffix=.orig || exit 1 - # Fix perms/owners: chown -R root:root . find . \ |