Package: 7zip / 22.01+dfsg-8+deb12u1
Metadata
Package | Version | Patches format |
---|---|---|
7zip | 22.01+dfsg-8+deb12u1 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 Accept Debian build flags.patch | (download) |
CPP/7zip/7zip_gcc.mak |
8 4 + 4 - 0 ! |
accept debian build flags |
0002 Use GCC 10 warning options.patch | (download) |
CPP/7zip/warn_gcc.mak |
2 1 + 1 - 0 ! |
use gcc 10 warning options |
0003 Disable hardware acceleration support on armel.patch | (download) |
C/Aes.c |
2 2 + 0 - 0 ! |
disable hardware acceleration support on armel Use "__ARM_ARCH" to split "armel" and "armhf" __ARM_ARCH: armel = 5 armhf = 7 |
0004 Guard ARM v8 feature from old architecture.patch | (download) |
C/7zCrc.c |
5 3 + 2 - 0 ! |
guard arm v8 feature from old architecture |
0005 Use getcwd 3 POSIX extension to avoid PATH_MAX macro.patch | (download) |
CPP/Windows/FileDir.cpp |
13 1 + 12 - 0 ! |
use getcwd(3) posix extension to avoid path_max macro |
0006 Disable local echo display when in input passwords C.patch | (download) |
CPP/7zip/UI/Console/UserInputUtils.cpp |
33 32 + 1 - 0 ! |
disable local echo display when in input passwords (closes: #1006238) |
0007 Manually de reference pointers.patch | (download) |
C/AesOpt.c |
28 26 + 2 - 0 ! |
manually de-reference pointers Implicit de-reference breaks link time optimization (LTO). Pointer type mismatch breaks LTO because it violates strict-aliasing rules. C/Aes.h: typedef void (MY_FAST_CALL *AES_CODE_FUNC)(UInt32 *ivAes, Byte *data, size_t numBlocks); C/AesOpt.c: void MY_FAST_CALL name(__m128i *p, __m128i *data, size_t numBlocks) void MY_FAST_CALL name(v128 *p, v128 *data, size_t numBlocks) |
0008 Remove unwanted hack for object files.patch | (download) |
CPP/7zip/7zip_gcc.mak |
3 1 + 2 - 0 ! |
remove unwanted hack for object files "-fPIC" is not needed for a normal executable file. |
0009 Fix CVE 2023 52168 and CVE 2023 52169.patch | (download) |
CPP/7zip/Archive/NtfsHandler.cpp |
89 57 + 32 - 0 ! |
fix cve-2023-52168 and cve-2023-52169 Bug-Debian: https://security-tracker.debian.org/tracker/CVE-2023-52168 Bug-Debian: https://security-tracker.debian.org/tracker/CVE-2023-52169 |