Overview

Request 887465 accepted

- Update to version 1.2.12
* Fixed GC crash resulting from inlining of the memory
allocation procs
* Fixed “incorrect raises effect for $(NimNode)” (#17454)
- from version 1.2.10
* Fixed “JS backend doesn’t handle float->int type conversion “ (#8404)
* Fixed “The “try except” not work when the “OSError:
Too many open files” error occurs!” (#15925)
* Fixed “Nim emits #line 0 C preprocessor directives with
–debugger:native, with ICE in gcc-10” (#15942)
* Fixed “tfuturevar fails when activated” (#9695)
* Fixed “nre.escapeRe is not gcsafe” (#16103)
* Fixed ““Error: internal error: genRecordFieldAux” - in
the “version-1-4” branch” (#16069)
* Fixed “-d:fulldebug switch does not compile with gc:arc” (#16214)
* Fixed “osLastError may randomly raise defect and crash” (#16359)
* Fixed “generic importc proc’s don’t work (breaking lots
of vmops procs for js)” (#16428)
* Fixed “Concept: codegen ignores parameter passing” (#16897)
* Fixed “{.push exportc.} interacts with anonymous functions” (#16967)
* Fixed “memory allocation during {.global.} init breaks GC” (#17085)
* Fixed "Nimble arbitrary code execution for specially crafted package metadata"
+ https://github.com/nim-lang/security/security/advisories/GHSA-rg9f-w24h-962p
+ (bsc#1185083, CVE-2021-21372)
* Fixed "Nimble falls back to insecure http url when fetching packages"
+ https://github.com/nim-lang/security/security/advisories/GHSA-8w52-r35x-rgp8
+ (bsc#1185084, CVE-2021-21373)
* Fixed "Nimble fails to validate certificates due to insecure httpClient defaults"
+ https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx
+ (bsc#1185085, CVE-2021-21374)


Leap Reviewbot's avatar

home:glaubitz:branches:openSUSE:Leap:15.2:Update/nim.openSUSE_Leap_15.2_Update@d0dafcfb9ab3322f21c43a3decb6885c -> openSUSE:Leap:15.2:Update/nim

expected origin is 'None' (unchanged)

Request History
John Paul Adrian Glaubitz's avatar

glaubitz created request

- Update to version 1.2.12
* Fixed GC crash resulting from inlining of the memory
allocation procs
* Fixed “incorrect raises effect for $(NimNode)” (#17454)
- from version 1.2.10
* Fixed “JS backend doesn’t handle float->int type conversion “ (#8404)
* Fixed “The “try except” not work when the “OSError:
Too many open files” error occurs!” (#15925)
* Fixed “Nim emits #line 0 C preprocessor directives with
–debugger:native, with ICE in gcc-10” (#15942)
* Fixed “tfuturevar fails when activated” (#9695)
* Fixed “nre.escapeRe is not gcsafe” (#16103)
* Fixed ““Error: internal error: genRecordFieldAux” - in
the “version-1-4” branch” (#16069)
* Fixed “-d:fulldebug switch does not compile with gc:arc” (#16214)
* Fixed “osLastError may randomly raise defect and crash” (#16359)
* Fixed “generic importc proc’s don’t work (breaking lots
of vmops procs for js)” (#16428)
* Fixed “Concept: codegen ignores parameter passing” (#16897)
* Fixed “{.push exportc.} interacts with anonymous functions” (#16967)
* Fixed “memory allocation during {.global.} init breaks GC” (#17085)
* Fixed "Nimble arbitrary code execution for specially crafted package metadata"
+ https://github.com/nim-lang/security/security/advisories/GHSA-rg9f-w24h-962p
+ (bsc#1185083, CVE-2021-21372)
* Fixed "Nimble falls back to insecure http url when fetching packages"
+ https://github.com/nim-lang/security/security/advisories/GHSA-8w52-r35x-rgp8
+ (bsc#1185084, CVE-2021-21373)
* Fixed "Nimble fails to validate certificates due to insecure httpClient defaults"
+ https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx
+ (bsc#1185085, CVE-2021-21374)


Saul Goodman's avatar

licensedigger accepted review

ok


Factory Auto's avatar

factory-auto accepted review

Check script succeeded


Maintenance Bot's avatar

maintbot accepted review

ok


Maintenance Bot's avatar

maintbot approved review

ok


Marcus Meissner's avatar

msmeissn moved maintenance target to openSUSE:Maintenance:16136


Marcus Meissner's avatar

msmeissn accepted request

accepted request 887465:Thanks!

For information about the update, see https://build.opensuse.org/project/maintenance_incidents/openSUSE:Maintenance

openSUSE Build Service is sponsored by