slackware-current/source/d/FTBFSlog
Patrick J Volkerding 9cc1c3b360 Wed Jan 18 06:11:54 UTC 2023
ap/diffutils-3.9-x86_64-1.txz:  Upgraded.
ap/lsof-4.97.0-x86_64-1.txz:  Upgraded.
ap/mpg123-1.31.2-x86_64-1.txz:  Upgraded.
d/binutils-2.40-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
d/git-2.39.1-x86_64-1.txz:  Upgraded.
d/oprofile-1.4.0-x86_64-11.txz:  Rebuilt.
  Recompiled against binutils-2.40.
n/httpd-2.4.55-x86_64-1.txz:  Upgraded.
  This update fixes bugs and the following security issues:
  mod_proxy allows a backend to trigger HTTP response splitting.
  mod_proxy_ajp possible request smuggling.
  mod_dav out of bounds read, or write of zero byte.
  For more information, see:
    https://downloads.apache.org/httpd/CHANGES_2.4.55
    https://www.cve.org/CVERecord?id=CVE-2022-37436
    https://www.cve.org/CVERecord?id=CVE-2022-36760
    https://www.cve.org/CVERecord?id=CVE-2006-20001
  (* Security fix *)
x/ibus-libpinyin-1.15.0-x86_64-1.txz:  Upgraded.
  Compiled against libpinyin-2.8.1.
x/igt-gpu-tools-1.27-x86_64-1.txz:  Upgraded.
x/libXpm-3.5.15-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  Infinite loop on unclosed comments.
  Runaway loop with width of 0 and enormous height.
  Compression commands depend on $PATH.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-46285
    https://www.cve.org/CVERecord?id=CVE-2022-44617
    https://www.cve.org/CVERecord?id=CVE-2022-4883
  (* Security fix *)
x/libinput-1.22.1-x86_64-1.txz:  Upgraded.
x/libpinyin-2.8.1-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
xap/mozilla-firefox-109.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  Thanks to marav for the build help.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/109.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/
    https://www.cve.org/CVERecord?id=CVE-2023-23597
    https://www.cve.org/CVERecord?id=CVE-2023-23598
    https://www.cve.org/CVERecord?id=CVE-2023-23599
    https://www.cve.org/CVERecord?id=CVE-2023-23600
    https://www.cve.org/CVERecord?id=CVE-2023-23601
    https://www.cve.org/CVERecord?id=CVE-2023-23602
    https://www.cve.org/CVERecord?id=CVE-2023-23603
    https://www.cve.org/CVERecord?id=CVE-2023-23604
    https://www.cve.org/CVERecord?id=CVE-2023-23605
    https://www.cve.org/CVERecord?id=CVE-2023-23606
  (* Security fix *)
2023-01-18 08:41:55 +01:00

20 lines
787 B
Text

Tue Jan 17 21:57:52 UTC 2023
gdb: patched to fix the build with readline-8.2.001.
Thanks to nobodino and marav.
+--------------------------+
Sat Aug 6 04:18:11 UTC 2022
llvm: patched to fix the build with glibc-2.36.
rust: patched to fix the build with glibc-2.36.
+--------------------------+
Thu Aug 4 19:14:56 UTC 2022
gcc: applied upstream patches to fix the build with glibc-2.36 (although it's
unlikely we'll need to rebuild this before gcc-12.2.0 comes along).
Cheers to nobodino. :-)
+--------------------------+
Tue Jul 19 19:02:03 UTC 2022
doxygen: patch to fix build with gcc12.
Thanks to nobodino and USUARIONUEVO.
+--------------------------+
Mon Feb 7 20:57:55 UTC 2022
All packages tested and found to compile properly.
+--------------------------+