summaryrefslogtreecommitdiffstats
path: root/source/d/binutils/patches (follow)
Commit message (Expand)AuthorAgeFilesLines
* Wed Jan 18 06:11:54 UTC 2023...ap/diffutils-3.9-x86_64-1.txz: Upgraded. ap/lsof-4.97.0-x86_64-1.txz: Upgraded. ap/mpg123-1.31.2-x86_64-1.txz: Upgraded. d/binutils-2.40-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/git-2.39.1-x86_64-1.txz: Upgraded. d/oprofile-1.4.0-x86_64-11.txz: Rebuilt. Recompiled against binutils-2.40. n/httpd-2.4.55-x86_64-1.txz: Upgraded. This update fixes bugs and the following security issues: mod_proxy allows a backend to trigger HTTP response splitting. mod_proxy_ajp possible request smuggling. mod_dav out of bounds read, or write of zero byte. For more information, see: https://downloads.apache.org/httpd/CHANGES_2.4.55 https://www.cve.org/CVERecord?id=CVE-2022-37436 https://www.cve.org/CVERecord?id=CVE-2022-36760 https://www.cve.org/CVERecord?id=CVE-2006-20001 (* Security fix *) x/ibus-libpinyin-1.15.0-x86_64-1.txz: Upgraded. Compiled against libpinyin-2.8.1. x/igt-gpu-tools-1.27-x86_64-1.txz: Upgraded. x/libXpm-3.5.15-x86_64-1.txz: Upgraded. This update fixes security issues: Infinite loop on unclosed comments. Runaway loop with width of 0 and enormous height. Compression commands depend on $PATH. For more information, see: https://www.cve.org/CVERecord?id=CVE-2022-46285 https://www.cve.org/CVERecord?id=CVE-2022-44617 https://www.cve.org/CVERecord?id=CVE-2022-4883 (* Security fix *) x/libinput-1.22.1-x86_64-1.txz: Upgraded. x/libpinyin-2.8.1-x86_64-1.txz: Upgraded. Shared library .so-version bump. xap/mozilla-firefox-109.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. Thanks to marav for the build help. For more information, see: https://www.mozilla.org/en-US/firefox/109.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/ https://www.cve.org/CVERecord?id=CVE-2023-23597 https://www.cve.org/CVERecord?id=CVE-2023-23598 https://www.cve.org/CVERecord?id=CVE-2023-23599 https://www.cve.org/CVERecord?id=CVE-2023-23600 https://www.cve.org/CVERecord?id=CVE-2023-23601 https://www.cve.org/CVERecord?id=CVE-2023-23602 https://www.cve.org/CVERecord?id=CVE-2023-23603 https://www.cve.org/CVERecord?id=CVE-2023-23604 https://www.cve.org/CVERecord?id=CVE-2023-23605 https://www.cve.org/CVERecord?id=CVE-2023-23606 (* Security fix *) 20230118061154 Patrick J Volkerding2023-01-181-243/+0
* Wed Aug 10 18:50:54 UTC 2022...a/kernel-firmware-20220810_ad5ae82-noarch-1.txz: Upgraded. d/binutils-2.39-x86_64-1.txz: Upgraded. d/oprofile-1.4.0-x86_64-10.txz: Rebuilt. Recompiled against binutils-2.39. l/gdk-pixbuf2-2.42.9-x86_64-1.txz: Upgraded. l/nodejs-18.7.0-x86_64-1.txz: Upgraded. Might as well go with the latest version of this since everyone else does. Fixed a sed substitution to get the correct lib${LIBDIRSUFFIX} in npm.js. Thanks to conraid and zerouno. n/gpgme-1.18.0-x86_64-1.txz: Upgraded. n/libnftnl-1.2.3-x86_64-1.txz: Upgraded. n/nfs-utils-2.6.2-x86_64-1.txz: Upgraded. n/nftables-1.0.5-x86_64-1.txz: Upgraded. 20220810185054 Patrick J Volkerding2022-08-112-53/+0
* Fri Feb 11 20:36:58 UTC 2022...a/kernel-firmware-20220209_6342082-noarch-1.txz: Upgraded. a/kernel-generic-5.16.9-x86_64-1.txz: Upgraded. a/kernel-huge-5.16.9-x86_64-1.txz: Upgraded. a/kernel-modules-5.16.9-x86_64-1.txz: Upgraded. ap/qpdf-10.6.1-x86_64-1.txz: Upgraded. d/binutils-2.38-x86_64-1.txz: Upgraded. d/kernel-headers-5.16.9-x86-1.txz: Upgraded. d/oprofile-1.4.0-x86_64-9.txz: Rebuilt. Recompiled against binutils-2.38. k/kernel-source-5.16.9-noarch-1.txz: Upgraded. l/glib2-2.70.4-x86_64-1.txz: Upgraded. n/ModemManager-1.18.6-x86_64-1.txz: Upgraded. n/NetworkManager-1.34.0-x86_64-1.txz: Upgraded. n/libqmi-1.30.4-x86_64-1.txz: Upgraded. x/ibus-table-1.16.7-x86_64-1.txz: Upgraded. x/xorg-server-1.20.14-x86_64-3.txz: Rebuilt. Rebuilt using --with-xkb-path=/usr/share/X11/xkb. Thanks to TheRealGrogan. Bump OS name: --with-os-name="Slackware 15.1". x/xorg-server-xephyr-1.20.14-x86_64-3.txz: Rebuilt. x/xorg-server-xnest-1.20.14-x86_64-3.txz: Rebuilt. x/xorg-server-xvfb-1.20.14-x86_64-3.txz: Rebuilt. x/xorg-server-xwayland-21.1.4-x86_64-2.txz: Rebuilt. Rebuilt using -Dxkb_dir=/usr/share/X11/xkb. xap/libnma-1.8.34-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20220211203658 Patrick J Volkerding2022-02-125-1413/+16
* Sun Aug 29 18:23:50 UTC 2021...ap/man-pages-5.13-noarch-1.txz: Upgraded. d/binutils-2.37-x86_64-1.txz: Upgraded. With a few upstream patches to fix some regressions in the release, we no longer get any new FTBFS with this, so we'll take it. d/oprofile-1.4.0-x86_64-8.txz: Rebuilt. Recompiled against binutils-2.37. kde/sddm-0.19.0-x86_64-8.txz: Rebuilt. Patched to fix build. l/libcap-2.54-x86_64-1.txz: Upgraded. l/libssh-0.9.6-x86_64-1.txz: Upgraded. Fix possible heap-buffer overflow when rekeying with different key exchange mechanism. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3634 (* Security fix *) l/qt5-5.15.3_20210826_21ea9c12-x86_64-1.txz: Upgraded. Switched to the patched qt5 from https://invent.kde.org/qt/qt/qt5.git. Huge thanks to Heinz Wiesinger for the script to create a release tarball. Likely this fixes many security issues. (* Security fix *) x/libglvnd-1.3.3-x86_64-1.txz: Upgraded. Reverted to this version because changes to the header files won't allow the EGL portions of Qt to properly compile. 20210829182350 Patrick J Volkerding2021-08-3026-3821/+2614
* Fri Feb 12 21:42:42 UTC 2021...a/inih-53-x86_64-1.txz: Upgraded. a/kernel-firmware-20210211_f7915a0-noarch-1.txz: Upgraded. a/util-linux-2.36.2-x86_64-1.txz: Upgraded. d/binutils-2.36.1-x86_64-1.txz: Upgraded. d/oprofile-1.4.0-x86_64-6.txz: Rebuilt. Recompiled against binutils-2.36.1. kde/digikam-7.1.0-x86_64-4.txz: Rebuilt. Recompiled against imagemagick-7.0.10_62. l/glib2-2.66.7-x86_64-1.txz: Upgraded. l/openexr-2.5.5-x86_64-1.txz: Upgraded. 20210212214242 Patrick J Volkerding2021-02-131-0/+3696
* Sat Jan 30 21:55:04 UTC 2021...a/e2fsprogs-1.46.0-x86_64-1.txz: Upgraded. a/kernel-generic-5.10.12-x86_64-1.txz: Upgraded. a/kernel-huge-5.10.12-x86_64-1.txz: Upgraded. a/kernel-modules-5.10.12-x86_64-1.txz: Upgraded. a/sysklogd-2.2.1-x86_64-1.txz: Upgraded. d/binutils-2.35.2-x86_64-1.txz: Upgraded. We're probably better off with this branch for now. d/kernel-headers-5.10.12-x86-1.txz: Upgraded. d/oprofile-1.4.0-x86_64-5.txz: Rebuilt. Recompiled against binutils-2.35.2. k/kernel-source-5.10.12-noarch-1.txz: Upgraded. l/gd-2.3.1-x86_64-1.txz: Upgraded. l/libwebp-1.2.0-x86_64-1.txz: Upgraded. l/python-packaging-20.9-x86_64-1.txz: Upgraded. x/fcitx-libpinyin-0.5.4-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20210130215504 Patrick J Volkerding2021-01-312-3956/+3
* Tue Jan 26 21:20:58 UTC 2021...ap/sudo-1.9.5p2-x86_64-1.txz: Upgraded. When invoked as sudoedit, the same set of command line options are now accepted as for "sudo -e". The -H and -P options are now rejected for sudoedit and "sudo -e" which matches the sudo 1.7 behavior. This is part of the fix for CVE-2021-3156. Fixed a potential buffer overflow when unescaping backslashes in the command's arguments. Normally, sudo escapes special characters when running a command via a shell (sudo -s or sudo -i). However, it was also possible to run sudoedit with the -s or -i flags in which case no escaping had actually been done, making a buffer overflow possible. This fixes CVE-2021-3156. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156 (* Security fix *) d/binutils-2.36-x86_64-2.txz: Rebuilt. Revert commit d1bcae833b32f1408485ce69f844dcd7ded093a8: [PATCH] ELF: Don't generate unused section symbols This fixes building the kernel. l/loudmouth-1.5.4-x86_64-1.txz: Upgraded. n/autofs-5.1.7-x86_64-1.txz: Upgraded. n/dnsmasq-2.84-x86_64-1.txz: Upgraded. n/tin-2.4.5-x86_64-1.txz: Upgraded. xap/gparted-1.2.0-x86_64-1.txz: Upgraded. xap/mozilla-thunderbird-78.7.0-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/78.7.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2021-05/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964 (* Security fix *) 20210126212058 Patrick J Volkerding2021-01-271-0/+3939
* Thu Dec 3 23:52:38 UTC 2020...a/kernel-generic-5.4.81-x86_64-1.txz: Upgraded. a/kernel-huge-5.4.81-x86_64-1.txz: Upgraded. a/kernel-modules-5.4.81-x86_64-1.txz: Upgraded. ap/cups-filters-1.28.6-x86_64-1.txz: Upgraded. ap/nano-5.4-x86_64-1.txz: Upgraded. d/binutils-2.35.1-x86_64-1.txz: Upgraded. d/gcc-10.2.0-x86_64-2.txz: Rebuilt. These are the same GCC packages that were previously in /testing. d/gcc-brig-10.2.0-x86_64-2.txz: Rebuilt. d/gcc-g++-10.2.0-x86_64-2.txz: Rebuilt. d/gcc-gdc-10.2.0-x86_64-2.txz: Rebuilt. Shared library .so-version bump. d/gcc-gfortran-10.2.0-x86_64-2.txz: Rebuilt. d/gcc-gnat-10.2.0-x86_64-2.txz: Rebuilt. d/gcc-go-10.2.0-x86_64-2.txz: Rebuilt. Shared library .so-version bump. d/gcc-objc-10.2.0-x86_64-2.txz: Rebuilt. d/kernel-headers-5.4.81-x86-1.txz: Upgraded. d/libtool-2.4.6-x86_64-14.txz: Rebuilt. Recompiled to update embedded GCC version number. d/mercurial-5.6.1-x86_64-1.txz: Upgraded. d/oprofile-1.4.0-x86_64-2.txz: Rebuilt. d/python-pip-20.3.1-x86_64-1.txz: Upgraded. k/kernel-source-5.4.81-noarch-1.txz: Upgraded. GCC_VERSION 90300 -> 100200 l/PyQt5-5.15.2-x86_64-1.txz: Upgraded. l/glibmm-2.64.5-x86_64-1.txz: Upgraded. x/mesa-20.3.0-x86_64-1.txz: Upgraded. xap/geeqie-1.6-x86_64-1.txz: Upgraded. xap/mozilla-thunderbird-78.5.1-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/78.5.1/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2020-53/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26970 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20201203235238 Patrick J Volkerding2020-12-041-63/+0
* Sat Feb 2 22:09:17 UTC 2019...ap/qpdf-8.4.0-x86_64-1.txz: Upgraded. d/Cython-0.29.4-x86_64-1.txz: Upgraded. d/binutils-2.32-x86_64-1.txz: Upgraded. Shared library .so-version bump. Is it safe to use --enable-initfini-array yet? Guess we'll find out. d/cmake-3.13.4-x86_64-1.txz: Upgraded. d/mercurial-4.9-x86_64-1.txz: Upgraded. d/oprofile-1.3.0-x86_64-2.txz: Rebuilt. Recompiled against binutils-2.32. n/iw-5.0-x86_64-1.txz: Upgraded. n/mutt-1.11.3-x86_64-1.txz: Upgraded. x/libva-utils-2.4.0-x86_64-1.txz: Upgraded. 20190202220917 Patrick J Volkerding2019-02-032-119/+13
* Thu Sep 6 06:15:46 UTC 2018...a/acpid-2.0.30-x86_64-1.txz: Upgraded. a/etc-15.0-x86_64-9.txz: Rebuilt. Added support for /etc/ld.so.conf.d/. Thanks to Qury. a/kernel-firmware-20180904_85c5d90-noarch-1.txz: Upgraded. a/kernel-generic-4.14.68-x86_64-1.txz: Upgraded. a/kernel-huge-4.14.68-x86_64-1.txz: Upgraded. a/kernel-modules-4.14.68-x86_64-1.txz: Upgraded. a/pkgtools-15.0-noarch-22.txz: Rebuilt. installpkg: prevent noise from the "stray cat" if tar hands it a broken pipe. Thanks to ivandi. Also (in the comments) provide a possibly better but untested solution. Thanks to SeB. a/sysvinit-2.90-x86_64-2.txz: Rebuilt. sysvinit-2.90 added an undocumented feature that tries to spawn agetty if it sees console= in the kernel command line. Avoiding the debate about whether this code belongs in init at all, at least such a change should be documented, and probably made opt-in. This patch disables the new behavior unless "sysvinit_agetty" is also seen in the kernel command line. It seems like this might have been something added for Hurd, and it might be wise to stick to what we've got rather than following upstream on this particular package. If anyone notices any other odd behavior, please let me know. Thanks to shastah. a/sysvinit-scripts-2.1-noarch-19.txz: Rebuilt. When checking for intel_pstate, direct the stderr to /dev/null in case the file doesn't exist in /sys. Thanks to ivandi. Allow forcing an option by editing /etc/default/cpufreq. ap/cups-filters-1.21.2-x86_64-1.txz: Upgraded. ap/ghostscript-9.24-x86_64-1.txz: Upgraded. Patched multiple -dSAFER sandbox bypass vulnerabilities. Thanks to Tavis Ormandy. For more information, see: https://www.ghostscript.com/doc/9.24/News.htm https://www.kb.cert.org/vuls/id/332928 (* Security fix *) ap/sudo-1.8.25-x86_64-1.txz: Upgraded. d/binutils-2.31.1-x86_64-2.txz: Rebuilt. elf.c (_bfd_elf_get_symbol_version_string): Return _("<corrupt>") for corrupt symbol version info. elflink.c (bfd_elf_record_link_assignment): Always clear h->verinfo.verdef when overriding a dynamic definition. Thanks to Michael Short for pointing out the upstream patches. d/ccache-3.4.3-x86_64-1.txz: Upgraded. d/kernel-headers-4.14.68-x86-1.txz: Upgraded. d/llvm-6.0.1-x86_64-2.txz: Rebuilt. Recompiled with -DCLANG_BUILD_SHARED_LIBS=ON to fix issues when multiple OpenCL drivers are installed. Thanks to Heinz Wiesinger. d/mercurial-4.7.1-x86_64-1.txz: Upgraded. k/kernel-source-4.14.68-noarch-1.txz: Upgraded. l/mozilla-nss-3.39-x86_64-1.txz: Upgraded. n/curl-7.61.1-x86_64-1.txz: Upgraded. This update fixes an NTLM password overflow via integer overflow. For more information, see: https://curl.haxx.se/docs/CVE-2018-14618.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618 (* Security fix *) n/gnupg2-2.2.10-x86_64-1.txz: Upgraded. n/libtirpc-1.1.4-x86_64-1.txz: Upgraded. n/netatalk-3.1.11-x86_64-2.txz: Rebuilt. rc.atalk: fixed errors in status output. Thanks to marav. n/nghttp2-1.33.0-x86_64-1.txz: Upgraded. n/p11-kit-0.23.14-x86_64-1.txz: Upgraded. n/stunnel-5.49-x86_64-1.txz: Upgraded. x/libdrm-2.4.94-x86_64-1.txz: Upgraded. x/xf86-video-ati-20180824_de88ea27-x86_64-1.txz: Upgraded. xap/hexchat-2.14.2-x86_64-1.txz: Upgraded. xap/mozilla-firefox-60.2.0esr-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html (* Security fix *) xap/xlockmore-5.56-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20180906061546 Patrick J Volkerding2018-09-061-0/+106
* Sat Jul 14 21:49:31 UTC 2018...l/pulseaudio-12.1-x86_64-1.txz: Upgraded. l/utf8proc-2.1.1-x86_64-1.txz: Upgraded. 20180714214931 Patrick J Volkerding2018-07-151-20/+17
* Mon May 28 19:12:29 UTC 2018...a/pkgtools-15.0-noarch-13.txz: Rebuilt. installpkg: default line length for --terselength is the number of columns. removepkg: added --terse mode. upgradepkg: default line length for --terselength is the number of columns. upgradepkg: accept -option in addition to --option. ap/vim-8.1.0026-x86_64-1.txz: Upgraded. d/bison-3.0.5-x86_64-1.txz: Upgraded. e/emacs-26.1-x86_64-1.txz: Upgraded. kde/kopete-4.14.3-x86_64-8.txz: Rebuilt. Recompiled against libidn-1.35. n/conntrack-tools-1.4.5-x86_64-1.txz: Upgraded. n/libnetfilter_conntrack-1.0.7-x86_64-1.txz: Upgraded. n/libnftnl-1.1.0-x86_64-1.txz: Upgraded. n/links-2.16-x86_64-2.txz: Rebuilt. Rebuilt to enable X driver for -g mode. n/lynx-2.8.9dev.19-x86_64-1.txz: Upgraded. n/nftables-0.8.5-x86_64-1.txz: Upgraded. n/p11-kit-0.23.11-x86_64-1.txz: Upgraded. n/ulogd-2.0.7-x86_64-1.txz: Upgraded. n/whois-5.3.1-x86_64-1.txz: Upgraded. xap/network-manager-applet-1.8.12-x86_64-1.txz: Upgraded. xap/vim-gvim-8.1.0026-x86_64-1.txz: Upgraded. 20180528191229 Patrick J Volkerding2018-05-319-3317/+0
* Slackware 14.2...Thu Jun 30 20:26:57 UTC 2016 Slackware 14.2 x86_64 stable is released! The long development cycle (the Linux community has lately been living in "interesting times", as they say) is finally behind us, and we're proud to announce the release of Slackware 14.2. The new release brings many updates and modern tools, has switched from udev to eudev (no systemd), and adds well over a hundred new packages to the system. Thanks to the team, the upstream developers, the dedicated Slackware community, and everyone else who pitched in to help make this release a reality. The ISOs are off to be replicated, a 6 CD-ROM 32-bit set and a dual-sided 32-bit/64-bit x86/x86_64 DVD. Please consider supporting the Slackware project by picking up a copy from store.slackware.com. We're taking pre-orders now, and offer a discount if you sign up for a subscription. Have fun! :-) slackware-14.2 Patrick J Volkerding2018-05-3118-0/+3840