Results 27 comments of Emil Mikulic

Yep, sounds good!

That's a nice and concise Makefile. I'll do a release soon.

Try: `pip3 install https://github.com/pygobject/pycairo/releases/download/v1.15.4/pycairo-1.15.4.tar.gz ` Per https://lists.cairographics.org/archives/cairo/2017-June/028155.html

I think I'm seeing the crash in scann: ``` Thread 1 "python" received signal SIGILL, Illegal instruction. 0x00007fff183f910a in google::protobuf::FieldDescriptorProto::FieldDescriptorProto() () from .../python3.10/site-packages/scann/scann_ops/cc/_scann_ops.so 0x00007fff183f9105 : vmovq %rax,%xmm0 => 0x00007fff183f910a :...

Nice, thanks! I was able to build scann without AVX2 using an older version of bazel :)

This worked for me: ``` git clone [email protected]:google-research/google-research.git --depth=1 cd google-research/scann/ python configure.py # get https://github.com/bazelbuild/bazelisk/releases/download/v1.12.0/bazelisk-linux-amd64 # install as "bazel" echo 3.7.2 > .bazelversion # note -march=native instead of -march=avx2:...

Were you able to use bazelisk to get an older version of bazel?

I can't find a patch or repro instructions for the CVE. I tried to come up with a reproducer so I passed time=9223372036854775807 to strftime, and that crashes inside glibc:...

Done: https://github.com/emikulic/darkhttpd/releases/tag/v1.14