Accepting request 637215 from home:dstoecker
Update to 5.28, please check - I tried to follow previous updates, but maybe I overlooked something. 3rd try to get the patch right. OBS-URL: https://build.opensuse.org/request/show/637215 OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/perl?expand=0&rev=168
This commit is contained in:
26
perl.changes
26
perl.changes
@@ -1,3 +1,29 @@
|
||||
-------------------------------------------------------------------
|
||||
Sat Sep 22 19:22:29 UTC 2018 - Dirk Stoecker <opensuse@dstoecker.de>
|
||||
|
||||
- update to perl-5.28.0
|
||||
* Core Enhancements
|
||||
* Unicode 10.0 is supported
|
||||
* delete on key/value hash slices
|
||||
* Experimentally, there are now alphabetic synonyms for some regular expression assertions
|
||||
* Mixed Unicode scripts are now detectable
|
||||
* In-place editing with perl -i is now safer
|
||||
* Initialisation of aggregate state variables
|
||||
* Full-size inode numbers
|
||||
* The sprintf %j format size modifier is now available with pre-C99 compilers
|
||||
* Close-on-exec flag set atomically
|
||||
* String- and number-specific bitwise ops are no longer experimental
|
||||
* Locales are now thread-safe on systems that support them
|
||||
* New read-only predefined variable ${^SAFE_LOCALES}
|
||||
* Security
|
||||
* [CVE-2017-12837] Heap buffer overflow in regular expression compiler
|
||||
* [CVE-2017-12883] Buffer over-read in regular expression parser
|
||||
* [CVE-2017-12814] $ENV{$key} stack buffer overflow on Windows
|
||||
* Default Hash Function Change
|
||||
* Full list of changes: https://metacpan.org/pod/release/XSAWYERX/perl-5.28.0/pod/perldelta.pod
|
||||
- update perl-5.26.0.dif to perl-5.28.0.dif
|
||||
- drop patch perl-pp-crypt.patch (included upstream)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 18 14:14:34 UTC 2018 - schwab@suse.de
|
||||
|
||||
|
Reference in New Issue
Block a user