summaryrefslogtreecommitdiffstats
path: root/recompress.sh
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-01-19 18:18:02 +0000
committer Eric Hameleers <alien@slackware.com>2022-01-20 08:59:56 +0100
commitf8721233ca388707ef95cde2fe3fcfad12f50f46 (patch)
treeee58f27d2192509882b82c55b7e19caaa326cdaf /recompress.sh
parent1c7cd7d8173b5ad45462c7bfd8ba99cd013b959e (diff)
downloadcurrent-f8721233ca388707ef95cde2fe3fcfad12f50f46.tar.gz
current-f8721233ca388707ef95cde2fe3fcfad12f50f46.tar.xz
Wed Jan 19 18:18:02 UTC 202220220119181802
ap/inxi-3.3.12_1-noarch-1.txz: Upgraded. ap/man-db-2.9.4-x86_64-3.txz: Rebuilt. Don't use --no-purge in the daily cron job to update the databases. l/gst-plugins-bad-free-1.18.5-x86_64-4.txz: Rebuilt. Link against neon-0.32.2. Thanks to marav. n/bind-9.16.25-x86_64-1.txz: Upgraded. n/ethtool-5.16-x86_64-1.txz: Upgraded. n/samba-4.15.4-x86_64-1.txz: Upgraded. n/wpa_supplicant-2.10-x86_64-1.txz: Upgraded. The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23303 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23304 (* Security fix *) x/xterm-370-x86_64-6.txz: Rebuilt. XTerm-console: improve the font settings. Thanks to GazL.
Diffstat (limited to 'recompress.sh')
-rwxr-xr-xrecompress.sh10
1 files changed, 1 insertions, 9 deletions
diff --git a/recompress.sh b/recompress.sh
index 549ba023b..8e1f6eedc 100755
--- a/recompress.sh
+++ b/recompress.sh
@@ -544,15 +544,6 @@ gzip ./source/n/nc/nc-110-21.diff
gzip ./source/n/nc/nc.diff
gzip ./source/n/wpa_supplicant/patches/wpa_supplicant-quiet-scan-results-message.patch
gzip ./source/n/wpa_supplicant/patches/wpa_supplicant-gui-qt4.patch
-gzip ./source/n/wpa_supplicant/patches/0001-AP-Silently-ignore-management-frame-from-unexpected-.patch
-gzip ./source/n/wpa_supplicant/patches/wpa_supplicant-flush-debug-output.patch
-gzip ./source/n/wpa_supplicant/patches/a0541334a6394f8237a4393b7372693cd7e96f15.patch
-gzip ./source/n/wpa_supplicant/patches/0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
-gzip ./source/n/wpa_supplicant/patches/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch
-gzip ./source/n/wpa_supplicant/patches/8ca330bd709bf7c000dfda5b1edbc0cbeabb8b55.patch
-gzip ./source/n/wpa_supplicant/patches/0001-P2P-Fix-copying-of-secondary-device-types-for-P2P-gr.patch
-gzip ./source/n/wpa_supplicant/patches/0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch
-gzip ./source/n/wpa_supplicant/patches/0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch
gzip ./source/n/wpa_supplicant/patches/allow-tlsv1.patch
gzip ./source/n/wpa_supplicant/doinst.sh
gzip ./source/n/php/php-fpm.conf.diff
@@ -853,6 +844,7 @@ gzip ./source/l/freetype/freetype.compile.both.subpixel.hinting.methods.diff
gzip ./source/l/freetype/freetype.subpixel.rendering.diff
gzip ./source/l/freetype/doinst.sh
gzip ./source/l/freetype/freetype.csh
+gzip ./source/l/gst-plugins-bad-free/1267.patch
gzip ./source/l/gcr/doinst.sh
gzip ./source/l/gcr/gcr.meson.disable.schemas-compile.update-mime.update-icon-cache.diff
gzip ./source/l/sdl/sdl-1.2.14-fix-mouse-clicking.patch