Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
0001-Accept-Debian-build-flags.patch | Accept Debian build flags | YOKOTA Hiroshi <yokota.hgml@gmail.com> | not-needed | 2021-05-09 | ||
0002-Use-GCC-10-warning-options.patch | Use GCC 10 warning options | YOKOTA Hiroshi <yokota.hgml@gmail.com> | not-needed | 2021-08-31 | ||
0003-Disable-hardware-acceleration-support-on-armel.patch | Disable hardware acceleration support on armel Use "__ARM_ARCH" to split "armel" and "armhf" __ARM_ARCH: armel = 5 armhf = 7 |
YOKOTA Hiroshi <yokota.hgml@gmail.com> | no | 2021-09-14 | ||
0004-Guard-ARM-v8-feature-from-old-architecture.patch | Guard ARM v8 feature from old architecture | YOKOTA Hiroshi <yokota.hgml@gmail.com> | not-needed | 2021-10-13 | ||
0005-Use-getcwd-3-POSIX-extension-to-avoid-PATH_MAX-macro.patch | Use getcwd(3) POSIX extension to avoid PATH_MAX macro This fix helps GNU Hurd. |
YOKOTA Hiroshi <yokota.hgml@gmail.com> | not-needed | 2021-09-15 | ||
0006-Disable-local-echo-display-when-in-input-passwords-C.patch | Disable local echo display when in input passwords (Closes: #1006238) | YOKOTA Hiroshi <yokota.hgml@gmail.com> | no | 2022-02-22 | ||
0007-Manually-de-reference-pointers.patch | Manually de-reference pointers Implicit de-reference breaks link time optimization (LTO). Pointer type mismatch breaks LTO because it violates strict-aliasing rules. C/Aes.h: typedef void (MY_FAST_CALL *AES_CODE_FUNC)(UInt32 *ivAes, Byte *data, size_t numBlocks); C/AesOpt.c: void MY_FAST_CALL name(__m128i *p, __m128i *data, size_t numBlocks) void MY_FAST_CALL name(v128 *p, v128 *data, size_t numBlocks) |
YOKOTA Hiroshi <yokota.hgml@gmail.com> | no | 2022-08-21 | ||
0008-Remove-unwanted-hack-for-object-files.patch | Remove unwanted hack for object files "-fPIC" is not needed for a normal executable file. |
YOKOTA Hiroshi <yokota.hgml@gmail.com> | no | 2022-12-07 | ||
0009-Fix-CVE-2023-52168-and-CVE-2023-52169.patch | Fix CVE-2023-52168 and CVE-2023-52169 This patch was extracted from reporter's blog and upstream/23.01..upstream/24.05 diff. > https://dfir.ru/2024/06/19/vulnerabilities-in-7-zip-and-ntfs3/ |
YOKOTA Hiroshi <yokota.hgml@gmail.com> | not-needed | debian | 2024-10-02 |