Add missing flags. --- psm-3.3/ipath/Makefile~ 1970-01-01 01:00:00.000000000 +0100 +++ psm-3.3/ipath/Makefile 2017-10-22 15:10:10.269177711 +0100 @@ -73,7 +73,7 @@ ${TARGLIB}.so.${MAJOR}.${MINOR}: ${${TARGLIB}-objs} date +'static __attribute__ ((unused)) char __psc_infinipath_revision[] ="$$""Date: %F %R ${rpm_extra_description}InfiniPath $$";' > _revision.c $(CC) -c $(BASECFLAGS) $(INCLUDES) _revision.c -o _revision.o - $(CC) -o $@ -Wl,-soname=${TARGLIB}.so.${MAJOR} -shared \ + $(CC) -o $@ -Wl,-soname=${TARGLIB}.so.${MAJOR} $(LDFLAGS) -shared \ -Wl,--unique='*fastpath*' \ ${${TARGLIB}-objs} _revision.o $(LDFLAGS) $(if $(MIC:0=),$(SCIF_LINK_FLAGS)) 2875d9c4becef2331780fee'/> Wojtek's customized Guix
aboutsummaryrefslogtreecommitdiff
path: root/nix/boost/format.hpp
/gnu/packages/patches/wpa-supplicant-fix-nonce-reuse.patch?id=aeec4a8fc1dce690b5d6aeb163871aca93d50111'>wpa-supplicant-fix-nonce-reuse.patch
AgeCommit message (Expand)Author
AgeCommit message (Expand)Author
2017-10-16gnu: wpa-supplicant: Fix "KRACK" key reinstallation attacks [security fixes]....Fixes CVE-2017-{13078,13079,13080,13081,13082,13087,13088}. See these announcements for more information: https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt https://www.krackattacks.com/ * gnu/packages/patches/wpa-supplicant-CVE-2017-13082.patch, gnu/packages/patches/wpa-supplicant-fix-key-reuse.patch, gnu/packages/patches/wpa-supplicant-fix-nonce-reuse.patch gnu/packages/patches/wpa-supplicant-fix-zeroed-keys.patch, gnu/packages/patches/wpa-supplicant-krack-followups.patch: New files. * gnu/packages/admin.scm (wpa-supplicant-minimal)[source]: Use them. * gnu/local.mk (dist_patch_DATA): Add them. Leo Famulari