summaryrefslogtreecommitdiff
path: root/gnu/packages/patches/glib-CVE-2021-27219-11.patch
diff options
context:
space:
mode:
authorLéo Le Bouter <lle-bout@zaclys.net>2021-03-11 10:53:00 +0100
committerLéo Le Bouter <lle-bout@zaclys.net>2021-03-11 11:02:23 +0100
commit500189b4d2f1e3a2d4ee8ab73d889e3d8ac70632 (patch)
treec5d89c9816f148d7f079024e782aa1bea916d3af /gnu/packages/patches/glib-CVE-2021-27219-11.patch
parentfd2751f89f04669227bbd71243bb100e3742a3fd (diff)
downloadguix-patches-500189b4d2f1e3a2d4ee8ab73d889e3d8ac70632.tar
guix-patches-500189b4d2f1e3a2d4ee8ab73d889e3d8ac70632.tar.gz
gnu: go: Update to 1.14.15 [security fixes].
This update will cause more than 300 packages to be rebuilt but due to how Go works we can't graft to fix the issue since we actually need to rebuild dependents so they include a newer version of the Go standard library. Considering the CVEs that this fixes are in great part in the Go standard library we can only proceed and push directly to master. * gnu/packages/golang.scm (go): Update to 1.14.15. [arguments]: Remove more cgo-related failing tests.
Diffstat (limited to 'gnu/packages/patches/glib-CVE-2021-27219-11.patch')
0 files changed, 0 insertions, 0 deletions