summaryrefslogtreecommitdiffstats
path: root/testing/source/glibc/profile.d/glibc.csh.new
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2023-09-28 21:37:06 +0000
committer Eric Hameleers <alien@slackware.com>2023-09-29 00:41:46 +0200
commite9c0b54c5cc41c2482d05f82b68e6bc6abfc0e77 (patch)
tree760907293e8313a935a76dd563c3a5eeb21d9594 /testing/source/glibc/profile.d/glibc.csh.new
parentd5cee66c5760e888f2b53c2e21453a3b11832425 (diff)
downloadcurrent-e9c0b54c5cc41c2482d05f82b68e6bc6abfc0e77.tar.gz
current-e9c0b54c5cc41c2482d05f82b68e6bc6abfc0e77.tar.xz
Thu Sep 28 21:37:06 UTC 202320230928213706
ap/mpg123-1.32.2-x86_64-1.txz: Upgraded. l/cairo-1.18.0-x86_64-1.txz: Upgraded. l/gtk4-4.12.3-x86_64-1.txz: Upgraded. x/fonttosfnt-1.2.3-x86_64-1.txz: Upgraded. xap/geeqie-2.1-x86_64-2.txz: Rebuilt. Patched and recompiled against lua-5.4.6. xap/mozilla-firefox-115.3.1esr-x86_64-1.txz: Upgraded. This update contains a security fix. For more information, see: https://www.mozilla.org/en-US/firefox/115.3.1/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/ https://www.cve.org/CVERecord?id=CVE-2023-5217 (* Security fix *) xfce/xfce4-panel-4.18.5-x86_64-1.txz: Upgraded. testing/packages/aaa_glibc-solibs-2.38-x86_64-1.txz: Added. testing/packages/glibc-2.38-x86_64-1.txz: Added. Instead of building the deprecated glibc crypt library, bundle libxcrypt-4.4.36 (both .so.1 compat version and .so.2 new API version). testing/packages/glibc-i18n-2.38-x86_64-1.txz: Added. testing/packages/glibc-profile-2.38-x86_64-1.txz: Added.
Diffstat (limited to 'testing/source/glibc/profile.d/glibc.csh.new')
-rwxr-xr-xtesting/source/glibc/profile.d/glibc.csh.new9
1 files changed, 9 insertions, 0 deletions
diff --git a/testing/source/glibc/profile.d/glibc.csh.new b/testing/source/glibc/profile.d/glibc.csh.new
new file mode 100755
index 000000000..1f33e9663
--- /dev/null
+++ b/testing/source/glibc/profile.d/glibc.csh.new
@@ -0,0 +1,9 @@
+#!/bin/csh
+# Set more relaxed (glibc-2.3.5 like) malloc() checking.
+#
+# This relaxes the default paranoia level so that it reports
+# bugs, but does not kill the questionable process. You can
+# get away with running broken programs with this setting,
+# but at a possible performance and security cost.
+#
+#setenv MALLOC_CHECK_ 1