diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-09-06 20:21:24 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-09-07 13:30:33 +0200 |
commit | 23a0b53a62a6c26dd807ce48bf150924e1e59715 (patch) | |
tree | 0372db760646e7b14f899b5ae00138c021929af8 /extra/source/rust-for-mozilla/rust.url | |
parent | ca8c1d3c22e72e640980d5320ce89b31a0061a9b (diff) | |
download | current-23a0b53a62a6c26dd807ce48bf150924e1e59715.tar.gz current-23a0b53a62a6c26dd807ce48bf150924e1e59715.tar.xz |
Tue Sep 6 20:21:24 UTC 202220220906202124_15.0
extra/rust-for-mozilla/rust-1.60.0-x86_64-1_slack15.0.txz: Upgraded.
Upgraded the Rust compiler for Firefox 102.2.0 and Thunderbird 102.2.1.
patches/packages/mozilla-firefox-102.2.0esr-x86_64-1_slack15.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/102.2.0/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2022-34/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478
(* Security fix *)
patches/packages/mozilla-thunderbird-102.2.1-x86_64-1_slack15.0.txz: Upgraded.
This release contains security fixes and improvements.
Some accounts may need to be reconfigured after moving from
Thunderbird 91.13.0 to Thunderbird 102.2.1.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/102.2.1/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-38/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059
(* Security fix *)
patches/packages/vim-9.0.0396-x86_64-1_slack15.0.txz: Upgraded.
Fixed use after free.
Thanks to marav for the heads-up.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3099
(* Security fix *)
patches/packages/vim-gvim-9.0.0396-x86_64-1_slack15.0.txz: Upgraded.
Diffstat (limited to 'extra/source/rust-for-mozilla/rust.url')
-rw-r--r-- | extra/source/rust-for-mozilla/rust.url | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/extra/source/rust-for-mozilla/rust.url b/extra/source/rust-for-mozilla/rust.url index 6733bccc5..3e7ea75a2 100644 --- a/extra/source/rust-for-mozilla/rust.url +++ b/extra/source/rust-for-mozilla/rust.url @@ -1,5 +1,5 @@ # Source code (repacked to .tar.lz): -VERSION=1.54.0 +VERSION=1.60.0 rm -f rustc-${VERSION}-src.tar.* lftpget https://static.rust-lang.org/dist/rustc-${VERSION}-src.tar.gz lftpget https://static.rust-lang.org/dist/rustc-${VERSION}-src.tar.gz.asc @@ -17,12 +17,12 @@ fi # should be able to compile the next released version of Rust. # # To find the expected date/versions for bootstrap binaries to be able to -# update the settings below, look at src/stage0.txt in the Rust sources. +# update the settings below, look at src/stage0.json in the Rust sources. exit 0 -BOOTSTRAP_DATE=2021-06-17 -BOOTSTRAP_CARGO=1.53.0 -BOOTSTRAP_VERSION=1.53.0 +BOOTSTRAP_DATE=2022-02-24 +BOOTSTRAP_CARGO=1.59.0 +BOOTSTRAP_VERSION=1.59.0 # i686 bootstrap: lftpget https://static.rust-lang.org/dist/${BOOTSTRAP_DATE}/cargo-${BOOTSTRAP_CARGO}-i686-unknown-linux-gnu.tar.xz |