diff options
author | Marius Bakke <mbakke@fastmail.com> | 2020-01-07 17:43:20 +0100 |
---|---|---|
committer | Marius Bakke <mbakke@fastmail.com> | 2020-01-07 17:43:20 +0100 |
commit | 6d15516dc6ffca3622ff49179c5c7c360c11b54b (patch) | |
tree | d235b60e0605fd3aace9c3357a20658dac3e3d85 /gnu/packages/patches | |
parent | 0ed75a5f068541339bc1db6271796a3d382bb681 (diff) | |
parent | 982eff9e841f3539e4ecf93669435a290bfde571 (diff) | |
download | guix-6d15516dc6ffca3622ff49179c5c7c360c11b54b.tar.gz |
Merge branch 'staging'
Diffstat (limited to 'gnu/packages/patches')
-rw-r--r-- | gnu/packages/patches/mesa-timespec-test-32bit.patch | 17 | ||||
-rw-r--r-- | gnu/packages/patches/nss-CVE-2019-11745.patch | 24 | ||||
-rw-r--r-- | gnu/packages/patches/orc-typedef-enum.patch | 17 | ||||
-rw-r--r-- | gnu/packages/patches/pcre2-fix-jit_match-crash.patch | 25 |
4 files changed, 0 insertions, 83 deletions
diff --git a/gnu/packages/patches/mesa-timespec-test-32bit.patch b/gnu/packages/patches/mesa-timespec-test-32bit.patch deleted file mode 100644 index 3e4890f3a4..0000000000 --- a/gnu/packages/patches/mesa-timespec-test-32bit.patch +++ /dev/null @@ -1,17 +0,0 @@ -Fix a test failure on 32-bit systems. - -Taken from upstream: -https://gitlab.freedesktop.org/mesa/mesa/commit/dd1dba80b9ee74ec8b90761285a8262e374bf8ef - -diff --git a/src/util/tests/timespec/timespec_test.cpp b/src/util/tests/timespec/timespec_test.cpp ---- a/src/util/tests/timespec/timespec_test.cpp -+++ b/src/util/tests/timespec/timespec_test.cpp -@@ -206,7 +206,7 @@ TEST(timespec_test, timespec_from_nsec) - - timespec_from_nsec(&a, UINT64_MAX); - EXPECT_EQ(a.tv_nsec, UINT64_MAX % NSEC_PER_SEC); -- EXPECT_EQ(a.tv_sec, UINT64_MAX / NSEC_PER_SEC); -+ EXPECT_EQ(a.tv_sec, (time_t)(UINT64_MAX / NSEC_PER_SEC)); - } - - TEST(timespec_test, timespec_from_usec) diff --git a/gnu/packages/patches/nss-CVE-2019-11745.patch b/gnu/packages/patches/nss-CVE-2019-11745.patch deleted file mode 100644 index ae0eeda3c8..0000000000 --- a/gnu/packages/patches/nss-CVE-2019-11745.patch +++ /dev/null @@ -1,24 +0,0 @@ -Fix CVE-2019-11745 (Out-of-bounds write when passing an output buffer smaller -than the block size to NSC_EncryptUpdate). - -Copied from Debian, equivalent to upstream fix: -<https://hg.mozilla.org/projects/nss/rev/1e22a0c93afe9f46545560c86caedef9dab6cfda>. - -# HG changeset patch -# User Craig Disselkoen <cdisselk@cs.ucsd.edu> -# Date 1574189697 25200 -# Node ID 60bca7c6dc6dc44579b9b3e0fb62ca3b82d92eec -# Parent 64e55c9f658e2a75f0835d00a8a1cdc2f25c74d6 -Bug 1586176 - EncryptUpdate should use maxout not block size. r=franziskus - ---- a/nss/lib/softoken/pkcs11c.c -+++ b/nss/lib/softoken/pkcs11c.c -@@ -1285,7 +1285,7 @@ NSC_EncryptUpdate(CK_SESSION_HANDLE hSes - } - /* encrypt the current padded data */ - rv = (*context->update)(context->cipherInfo, pEncryptedPart, -- &padoutlen, context->blockSize, context->padBuf, -+ &padoutlen, maxout, context->padBuf, - context->blockSize); - if (rv != SECSuccess) { - return sftk_MapCryptError(PORT_GetError()); diff --git a/gnu/packages/patches/orc-typedef-enum.patch b/gnu/packages/patches/orc-typedef-enum.patch deleted file mode 100644 index 207bf32ba9..0000000000 --- a/gnu/packages/patches/orc-typedef-enum.patch +++ /dev/null @@ -1,17 +0,0 @@ -Orc 0.4.30 has a bug that causes duplicate symbols due to a missing typedef. - -Taken from upstream: -https://gitlab.freedesktop.org/gstreamer/orc/merge_requests/32 - -diff --git a/orc/orctarget.h b/orc/orctarget.h ---- a/orc/orctarget.h -+++ b/orc/orctarget.h -@@ -19,7 +19,7 @@ enum { - ORC_TARGET_FAST_DENORMAL = (1<<31) - }; - --enum { -+typedef enum { - ORC_TARGET_POWERPC_64BIT = (1<<0), - ORC_TARGET_POWERPC_LE = (1<<1), - ORC_TARGET_POWERPC_ALTIVEC = (1<<2), diff --git a/gnu/packages/patches/pcre2-fix-jit_match-crash.patch b/gnu/packages/patches/pcre2-fix-jit_match-crash.patch deleted file mode 100644 index 7543319ee9..0000000000 --- a/gnu/packages/patches/pcre2-fix-jit_match-crash.patch +++ /dev/null @@ -1,25 +0,0 @@ -From: Tobias Geerinckx-Rice <me@tobias.gr> -Date: Thu, 01 Aug 2019 21:12:52 +0200 -Subject: [PATCH] gnu: pcre2: Fix jit_match crash. - -Fixes <https://bugs.exim.org/show_bug.cgi?id=2421>, reported as a ‘secrity -problem’. - -Copied verbatim from upstream[0]. - -[0]: https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_jit_compile.c?view=patch&r1=1089&r2=1092&pathrev=1092 - ---- trunk/src/pcre2_jit_compile.c 2019/05/10 13:15:20 1089 -+++ trunk/src/pcre2_jit_compile.c 2019/05/13 16:38:18 1092 -@@ -8571,7 +8571,10 @@ - PCRE2_SPTR bptr; - uint32_t c; - --GETCHARINC(c, cc); -+/* Patch by PH */ -+/* GETCHARINC(c, cc); */ -+ -+c = *cc++; - #if PCRE2_CODE_UNIT_WIDTH == 32 - if (c >= 0x110000) - return NULL; |