summaryrefslogtreecommitdiffstats
path: root/source/d/gcc/gcc.SlackBuild
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-04-27 21:43:51 +0000
committer Eric Hameleers <alien@slackware.com>2022-04-28 08:59:37 +0200
commit2ab30d1fd90998cdb2715bec99430671123c3ece (patch)
treea328234d670d7f3771dda79b370354b4344986f3 /source/d/gcc/gcc.SlackBuild
parentee861a17268a54a17b3b321d9a1ff82ed547e606 (diff)
downloadcurrent-2ab30d1fd90998cdb2715bec99430671123c3ece.tar.gz
current-2ab30d1fd90998cdb2715bec99430671123c3ece.tar.xz
Wed Apr 27 21:43:51 UTC 202220220427214351
a/kernel-generic-5.17.5-x86_64-1.txz: Upgraded. a/kernel-huge-5.17.5-x86_64-1.txz: Upgraded. a/kernel-modules-5.17.5-x86_64-1.txz: Upgraded. a/sysvinit-3.04-x86_64-1.txz: Upgraded. ap/sqlite-3.38.3-x86_64-1.txz: Upgraded. d/gcc-11.3.0-x86_64-1.txz: Upgraded. d/gcc-brig-11.3.0-x86_64-1.txz: Upgraded. d/gcc-g++-11.3.0-x86_64-1.txz: Upgraded. d/gcc-gdc-11.3.0-x86_64-1.txz: Upgraded. d/gcc-gfortran-11.3.0-x86_64-1.txz: Upgraded. d/gcc-gnat-11.3.0-x86_64-1.txz: Upgraded. d/gcc-go-11.3.0-x86_64-1.txz: Upgraded. d/gcc-objc-11.3.0-x86_64-1.txz: Upgraded. d/kernel-headers-5.17.5-x86-1.txz: Upgraded. d/libtool-2.4.7-x86_64-1.txz: Upgraded. This also updates the embedded GCC version number. k/kernel-source-5.17.5-noarch-1.txz: Upgraded. CC_VERSION_TEXT "gcc (GCC) 11.2.0" -> "gcc (GCC) 11.3.0" GCC_VERSION 110200 -> 110300 +CC_HAS_SLS y +SLS y kde/krita-5.0.6-x86_64-1.txz: Upgraded. l/netpbm-10.98.02-x86_64-1.txz: Upgraded. l/nodejs-16.15.0-x86_64-1.txz: Upgraded. n/curl-7.83.0-x86_64-1.txz: Upgraded. This update fixes security issues: OAUTH2 bearer bypass in connection re-use. Credential leak on redirect. Bad local IPv6 connection reuse. Auth/cookie leak on redirect. For more information, see: https://curl.se/docs/CVE-2022-22576.html https://curl.se/docs/CVE-2022-27774.html https://curl.se/docs/CVE-2022-27775.html https://curl.se/docs/CVE-2022-27776.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776 (* Security fix *) n/fetchmail-6.4.30-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'source/d/gcc/gcc.SlackBuild')
-rwxr-xr-xsource/d/gcc/gcc.SlackBuild6
1 files changed, 1 insertions, 5 deletions
diff --git a/source/d/gcc/gcc.SlackBuild b/source/d/gcc/gcc.SlackBuild
index 6e5e6b321..a1a6c4c6c 100755
--- a/source/d/gcc/gcc.SlackBuild
+++ b/source/d/gcc/gcc.SlackBuild
@@ -57,7 +57,7 @@ cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=gcc
SRCVER=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
VERSION=$(echo $SRCVER | cut -f 1 -d _)
-BUILD=${BUILD:-2}
+BUILD=${BUILD:-1}
# How many jobs to run in parallel:
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}
@@ -174,10 +174,6 @@ zcat $CWD/patches/gfortran.deferred-shape-vs-assumed-shape.patch.gz | patch -p0
# Fix regressions in 10.3.0 (and presumably 11.1.0 since they still apply cleanly):
zcat $CWD/patches/PR100102-2.a1b3484a8e6c53c8084723e3f1738d402374198e.patch.gz | patch -p1 --verbose --backup --suffix=.orig || exit 1
-# Fix compiler error in gcc-go
-# https://github.com/golang/go/issues/47771
-zcat $CWD/patches/7185690.diff.gz | patch -p1 --verbose --backup --suffix=.orig || exit 1
-
# Fix perms/owners:
chown -R root:root .
find . \