[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 5113-1] firefox-esr security update



  Maybe the Qt/moc and the gcc/Firefox bugs are unrelated. I
have not heard anything about it here yet. I have found a page
that tells the moc error can be resolved by upgrading from Qt
5.4.1 -> 5.4.2.

https://topic.alibabacloud.com/a/usrincludec641bitsstl_relops67parse-error-at-std_1_31_30235235.html

  It would be a general question of mine regarding both bugs why
you do not simply up/downgrade to the last known good version.
The i386 target would work well including the required security
updates and it would not be necessary to develop a patch for
these issues.
  Given that this should not be possible for some reason, please
share your knowledge about these bugs, so that people like me
can try to find a fix.
 
Elmar


On Fri, Apr 15, 2022 at 06:37:33PM +0200, Elmar Stellnberger wrote:
> On Fri, Apr 15, 2022 at 04:52:55PM +0200, Elmar Stellnberger wrote:
> > ...
> > exist. It truely is this g++ bug that prevents Firefox and any
> > Qt programs from building under Buster/i586. I have noted that
> > there are also some amd64 targets on the OBS that expose the
> > exact same g++ bug. My question would be on why the fixup/patch
> > from amd64 can not be used for g++/i386 on Debian?
> 
>   May I see what has fixed the issue for amd64 on Debian10 /
> Buster? That may greatly facilitate the development for a patch
> on i386. I believe the issue should really be fixed.
> 
> Elmar
> 


Reply to: