1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-01-15 15:41:54 +01:00
slackware-current/source/d/gdb/1add37b567a7dee39d99f37b37802034c3fce9c4.patch
Patrick J Volkerding 9cc1c3b360 Wed Jan 18 06:11:54 UTC 2023
ap/diffutils-3.9-x86_64-1.txz:  Upgraded.
ap/lsof-4.97.0-x86_64-1.txz:  Upgraded.
ap/mpg123-1.31.2-x86_64-1.txz:  Upgraded.
d/binutils-2.40-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
d/git-2.39.1-x86_64-1.txz:  Upgraded.
d/oprofile-1.4.0-x86_64-11.txz:  Rebuilt.
  Recompiled against binutils-2.40.
n/httpd-2.4.55-x86_64-1.txz:  Upgraded.
  This update fixes bugs and the following security issues:
  mod_proxy allows a backend to trigger HTTP response splitting.
  mod_proxy_ajp possible request smuggling.
  mod_dav out of bounds read, or write of zero byte.
  For more information, see:
    https://downloads.apache.org/httpd/CHANGES_2.4.55
    https://www.cve.org/CVERecord?id=CVE-2022-37436
    https://www.cve.org/CVERecord?id=CVE-2022-36760
    https://www.cve.org/CVERecord?id=CVE-2006-20001
  (* Security fix *)
x/ibus-libpinyin-1.15.0-x86_64-1.txz:  Upgraded.
  Compiled against libpinyin-2.8.1.
x/igt-gpu-tools-1.27-x86_64-1.txz:  Upgraded.
x/libXpm-3.5.15-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  Infinite loop on unclosed comments.
  Runaway loop with width of 0 and enormous height.
  Compression commands depend on $PATH.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-46285
    https://www.cve.org/CVERecord?id=CVE-2022-44617
    https://www.cve.org/CVERecord?id=CVE-2022-4883
  (* Security fix *)
x/libinput-1.22.1-x86_64-1.txz:  Upgraded.
x/libpinyin-2.8.1-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
xap/mozilla-firefox-109.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  Thanks to marav for the build help.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/109.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/
    https://www.cve.org/CVERecord?id=CVE-2023-23597
    https://www.cve.org/CVERecord?id=CVE-2023-23598
    https://www.cve.org/CVERecord?id=CVE-2023-23599
    https://www.cve.org/CVERecord?id=CVE-2023-23600
    https://www.cve.org/CVERecord?id=CVE-2023-23601
    https://www.cve.org/CVERecord?id=CVE-2023-23602
    https://www.cve.org/CVERecord?id=CVE-2023-23603
    https://www.cve.org/CVERecord?id=CVE-2023-23604
    https://www.cve.org/CVERecord?id=CVE-2023-23605
    https://www.cve.org/CVERecord?id=CVE-2023-23606
  (* Security fix *)
2023-01-18 08:41:55 +01:00

37 lines
1 KiB
Diff

From 1add37b567a7dee39d99f37b37802034c3fce9c4 Mon Sep 17 00:00:00 2001
From: Andreas Schwab <schwab@linux-m68k.org>
Date: Sun, 20 Mar 2022 14:01:54 +0100
Subject: [PATCH] Add support for readline 8.2
In readline 8.2 the type of rl_completer_word_break_characters changed to
include const.
---
gdb/completer.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/gdb/completer.c b/gdb/completer.c
index d3900ae2014..a51c16ac7f8 100644
--- a/gdb/completer.c
+++ b/gdb/completer.c
@@ -36,7 +36,7 @@
calling a hook instead so we eliminate the CLI dependency. */
#include "gdbcmd.h"
-/* Needed for rl_completer_word_break_characters() and for
+/* Needed for rl_completer_word_break_characters and for
rl_filename_completion_function. */
#include "readline/readline.h"
@@ -2011,7 +2011,7 @@ gdb_completion_word_break_characters_throw ()
rl_basic_quote_characters = NULL;
}
- return rl_completer_word_break_characters;
+ return (char *) rl_completer_word_break_characters;
}
char *
--
2.31.1