mirror of
git://slackware.nl/current.git
synced 2025-01-15 15:41:54 +01:00
9cc1c3b360
ap/diffutils-3.9-x86_64-1.txz: Upgraded. ap/lsof-4.97.0-x86_64-1.txz: Upgraded. ap/mpg123-1.31.2-x86_64-1.txz: Upgraded. d/binutils-2.40-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/git-2.39.1-x86_64-1.txz: Upgraded. d/oprofile-1.4.0-x86_64-11.txz: Rebuilt. Recompiled against binutils-2.40. n/httpd-2.4.55-x86_64-1.txz: Upgraded. This update fixes bugs and the following security issues: mod_proxy allows a backend to trigger HTTP response splitting. mod_proxy_ajp possible request smuggling. mod_dav out of bounds read, or write of zero byte. For more information, see: https://downloads.apache.org/httpd/CHANGES_2.4.55 https://www.cve.org/CVERecord?id=CVE-2022-37436 https://www.cve.org/CVERecord?id=CVE-2022-36760 https://www.cve.org/CVERecord?id=CVE-2006-20001 (* Security fix *) x/ibus-libpinyin-1.15.0-x86_64-1.txz: Upgraded. Compiled against libpinyin-2.8.1. x/igt-gpu-tools-1.27-x86_64-1.txz: Upgraded. x/libXpm-3.5.15-x86_64-1.txz: Upgraded. This update fixes security issues: Infinite loop on unclosed comments. Runaway loop with width of 0 and enormous height. Compression commands depend on $PATH. For more information, see: https://www.cve.org/CVERecord?id=CVE-2022-46285 https://www.cve.org/CVERecord?id=CVE-2022-44617 https://www.cve.org/CVERecord?id=CVE-2022-4883 (* Security fix *) x/libinput-1.22.1-x86_64-1.txz: Upgraded. x/libpinyin-2.8.1-x86_64-1.txz: Upgraded. Shared library .so-version bump. xap/mozilla-firefox-109.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. Thanks to marav for the build help. For more information, see: https://www.mozilla.org/en-US/firefox/109.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/ https://www.cve.org/CVERecord?id=CVE-2023-23597 https://www.cve.org/CVERecord?id=CVE-2023-23598 https://www.cve.org/CVERecord?id=CVE-2023-23599 https://www.cve.org/CVERecord?id=CVE-2023-23600 https://www.cve.org/CVERecord?id=CVE-2023-23601 https://www.cve.org/CVERecord?id=CVE-2023-23602 https://www.cve.org/CVERecord?id=CVE-2023-23603 https://www.cve.org/CVERecord?id=CVE-2023-23604 https://www.cve.org/CVERecord?id=CVE-2023-23605 https://www.cve.org/CVERecord?id=CVE-2023-23606 (* Security fix *)
37 lines
1 KiB
Diff
37 lines
1 KiB
Diff
From 1add37b567a7dee39d99f37b37802034c3fce9c4 Mon Sep 17 00:00:00 2001
|
|
From: Andreas Schwab <schwab@linux-m68k.org>
|
|
Date: Sun, 20 Mar 2022 14:01:54 +0100
|
|
Subject: [PATCH] Add support for readline 8.2
|
|
|
|
In readline 8.2 the type of rl_completer_word_break_characters changed to
|
|
include const.
|
|
---
|
|
gdb/completer.c | 4 ++--
|
|
1 file changed, 2 insertions(+), 2 deletions(-)
|
|
|
|
diff --git a/gdb/completer.c b/gdb/completer.c
|
|
index d3900ae2014..a51c16ac7f8 100644
|
|
--- a/gdb/completer.c
|
|
+++ b/gdb/completer.c
|
|
@@ -36,7 +36,7 @@
|
|
calling a hook instead so we eliminate the CLI dependency. */
|
|
#include "gdbcmd.h"
|
|
|
|
-/* Needed for rl_completer_word_break_characters() and for
|
|
+/* Needed for rl_completer_word_break_characters and for
|
|
rl_filename_completion_function. */
|
|
#include "readline/readline.h"
|
|
|
|
@@ -2011,7 +2011,7 @@ gdb_completion_word_break_characters_throw ()
|
|
rl_basic_quote_characters = NULL;
|
|
}
|
|
|
|
- return rl_completer_word_break_characters;
|
|
+ return (char *) rl_completer_word_break_characters;
|
|
}
|
|
|
|
char *
|
|
--
|
|
2.31.1
|
|
|
|
|