summaryrefslogtreecommitdiffstats
path: root/source/d/binutils/patches/binutils-bfd-close-fds.patch (follow)
Commit message (Expand)AuthorAgeFilesLines
* Fri Feb 11 20:36:58 UTC 2022...a/kernel-firmware-20220209_6342082-noarch-1.txz: Upgraded. a/kernel-generic-5.16.9-x86_64-1.txz: Upgraded. a/kernel-huge-5.16.9-x86_64-1.txz: Upgraded. a/kernel-modules-5.16.9-x86_64-1.txz: Upgraded. ap/qpdf-10.6.1-x86_64-1.txz: Upgraded. d/binutils-2.38-x86_64-1.txz: Upgraded. d/kernel-headers-5.16.9-x86-1.txz: Upgraded. d/oprofile-1.4.0-x86_64-9.txz: Rebuilt. Recompiled against binutils-2.38. k/kernel-source-5.16.9-noarch-1.txz: Upgraded. l/glib2-2.70.4-x86_64-1.txz: Upgraded. n/ModemManager-1.18.6-x86_64-1.txz: Upgraded. n/NetworkManager-1.34.0-x86_64-1.txz: Upgraded. n/libqmi-1.30.4-x86_64-1.txz: Upgraded. x/ibus-table-1.16.7-x86_64-1.txz: Upgraded. x/xorg-server-1.20.14-x86_64-3.txz: Rebuilt. Rebuilt using --with-xkb-path=/usr/share/X11/xkb. Thanks to TheRealGrogan. Bump OS name: --with-os-name="Slackware 15.1". x/xorg-server-xephyr-1.20.14-x86_64-3.txz: Rebuilt. x/xorg-server-xnest-1.20.14-x86_64-3.txz: Rebuilt. x/xorg-server-xvfb-1.20.14-x86_64-3.txz: Rebuilt. x/xorg-server-xwayland-21.1.4-x86_64-2.txz: Rebuilt. Rebuilt using -Dxkb_dir=/usr/share/X11/xkb. xap/libnma-1.8.34-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20220211203658 Patrick J Volkerding2022-02-121-232/+0
* Sun Aug 29 18:23:50 UTC 2021...ap/man-pages-5.13-noarch-1.txz: Upgraded. d/binutils-2.37-x86_64-1.txz: Upgraded. With a few upstream patches to fix some regressions in the release, we no longer get any new FTBFS with this, so we'll take it. d/oprofile-1.4.0-x86_64-8.txz: Rebuilt. Recompiled against binutils-2.37. kde/sddm-0.19.0-x86_64-8.txz: Rebuilt. Patched to fix build. l/libcap-2.54-x86_64-1.txz: Upgraded. l/libssh-0.9.6-x86_64-1.txz: Upgraded. Fix possible heap-buffer overflow when rekeying with different key exchange mechanism. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3634 (* Security fix *) l/qt5-5.15.3_20210826_21ea9c12-x86_64-1.txz: Upgraded. Switched to the patched qt5 from https://invent.kde.org/qt/qt/qt5.git. Huge thanks to Heinz Wiesinger for the script to create a release tarball. Likely this fixes many security issues. (* Security fix *) x/libglvnd-1.3.3-x86_64-1.txz: Upgraded. Reverted to this version because changes to the header files won't allow the EGL portions of Qt to properly compile. 20210829182350 Patrick J Volkerding2021-08-301-0/+232