summaryrefslogtreecommitdiffstats
path: root/testing/source/gcc/patches/gcc-no_fixincludes.diff
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-04-27 21:43:51 +0000
committer Eric Hameleers <alien@slackware.com>2022-04-28 08:59:37 +0200
commit2ab30d1fd90998cdb2715bec99430671123c3ece (patch)
treea328234d670d7f3771dda79b370354b4344986f3 /testing/source/gcc/patches/gcc-no_fixincludes.diff
parentee861a17268a54a17b3b321d9a1ff82ed547e606 (diff)
downloadcurrent-2ab30d1fd90998cdb2715bec99430671123c3ece.tar.gz
current-2ab30d1fd90998cdb2715bec99430671123c3ece.tar.xz
Wed Apr 27 21:43:51 UTC 202220220427214351
a/kernel-generic-5.17.5-x86_64-1.txz: Upgraded. a/kernel-huge-5.17.5-x86_64-1.txz: Upgraded. a/kernel-modules-5.17.5-x86_64-1.txz: Upgraded. a/sysvinit-3.04-x86_64-1.txz: Upgraded. ap/sqlite-3.38.3-x86_64-1.txz: Upgraded. d/gcc-11.3.0-x86_64-1.txz: Upgraded. d/gcc-brig-11.3.0-x86_64-1.txz: Upgraded. d/gcc-g++-11.3.0-x86_64-1.txz: Upgraded. d/gcc-gdc-11.3.0-x86_64-1.txz: Upgraded. d/gcc-gfortran-11.3.0-x86_64-1.txz: Upgraded. d/gcc-gnat-11.3.0-x86_64-1.txz: Upgraded. d/gcc-go-11.3.0-x86_64-1.txz: Upgraded. d/gcc-objc-11.3.0-x86_64-1.txz: Upgraded. d/kernel-headers-5.17.5-x86-1.txz: Upgraded. d/libtool-2.4.7-x86_64-1.txz: Upgraded. This also updates the embedded GCC version number. k/kernel-source-5.17.5-noarch-1.txz: Upgraded. CC_VERSION_TEXT "gcc (GCC) 11.2.0" -> "gcc (GCC) 11.3.0" GCC_VERSION 110200 -> 110300 +CC_HAS_SLS y +SLS y kde/krita-5.0.6-x86_64-1.txz: Upgraded. l/netpbm-10.98.02-x86_64-1.txz: Upgraded. l/nodejs-16.15.0-x86_64-1.txz: Upgraded. n/curl-7.83.0-x86_64-1.txz: Upgraded. This update fixes security issues: OAUTH2 bearer bypass in connection re-use. Credential leak on redirect. Bad local IPv6 connection reuse. Auth/cookie leak on redirect. For more information, see: https://curl.se/docs/CVE-2022-22576.html https://curl.se/docs/CVE-2022-27774.html https://curl.se/docs/CVE-2022-27775.html https://curl.se/docs/CVE-2022-27776.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776 (* Security fix *) n/fetchmail-6.4.30-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'testing/source/gcc/patches/gcc-no_fixincludes.diff')
-rw-r--r--testing/source/gcc/patches/gcc-no_fixincludes.diff27
1 files changed, 0 insertions, 27 deletions
diff --git a/testing/source/gcc/patches/gcc-no_fixincludes.diff b/testing/source/gcc/patches/gcc-no_fixincludes.diff
deleted file mode 100644
index e152e0821..000000000
--- a/testing/source/gcc/patches/gcc-no_fixincludes.diff
+++ /dev/null
@@ -1,27 +0,0 @@
---- ./gcc/Makefile.in.orig 2018-03-09 09:24:44.000000000 -0600
-+++ ./gcc/Makefile.in 2018-05-02 12:25:43.958002771 -0500
-@@ -3004,9 +3004,9 @@
- chmod a+r $${fix_dir}/limits.h; \
- done
- # Install the README
-- rm -f include-fixed/README
-- cp $(srcdir)/../fixincludes/README-fixinc include-fixed/README
-- chmod a+r include-fixed/README
-+# rm -f include-fixed/README
-+# cp $(srcdir)/../fixincludes/README-fixinc include-fixed/README
-+# chmod a+r include-fixed/README
- $(STAMP) $@
-
- .PHONY: install-gcc-tooldir
-@@ -3087,10 +3087,7 @@
- (TARGET_MACHINE='$(target)'; srcdir=`cd $(srcdir); ${PWD_COMMAND}`; \
- SHELL='$(SHELL)'; MACRO_LIST=`${PWD_COMMAND}`/macro_list ; \
- gcc_dir=`${PWD_COMMAND}` ; \
-- export TARGET_MACHINE srcdir SHELL MACRO_LIST && \
-- cd $(build_objdir)/fixincludes && \
-- $(SHELL) ./fixinc.sh "$${gcc_dir}/$${fix_dir}" \
-- $(BUILD_SYSTEM_HEADER_DIR) $(OTHER_FIXINCLUDES_DIRS) ); \
-+ export TARGET_MACHINE srcdir SHELL MACRO_LIST ); \
- rm -f $${fix_dir}/syslimits.h; \
- if [ -f $${fix_dir}/limits.h ]; then \
- mv $${fix_dir}/limits.h $${fix_dir}/syslimits.h; \