diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-06-01 00:49:45 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-06-01 07:00:07 +0200 |
commit | f7ccccdcba28b2e09d0c9731e7761990f1bf6a8e (patch) | |
tree | 5b2ff96559ffaeacd4cde9a51c061f99d0165331 /extra/source/rust-for-mozilla/rust.url | |
parent | de42b727197149058ceade000c902b6fc65836fd (diff) | |
download | current-f7ccccdcba28b2e09d0c9731e7761990f1bf6a8e.tar.gz current-f7ccccdcba28b2e09d0c9731e7761990f1bf6a8e.tar.xz |
Wed Jun 1 00:49:45 UTC 202220220601004945
a/dialog-1.3_20220526-x86_64-1.txz: Upgraded.
a/kernel-generic-5.17.12-x86_64-1.txz: Upgraded.
a/kernel-huge-5.17.12-x86_64-1.txz: Upgraded.
a/kernel-modules-5.17.12-x86_64-1.txz: Upgraded.
ap/sysstat-12.6.0-x86_64-1.txz: Upgraded.
d/kernel-headers-5.17.12-x86-1.txz: Upgraded.
k/kernel-source-5.17.12-noarch-1.txz: Upgraded.
l/libtiff-4.4.0-x86_64-1.txz: Upgraded.
n/gnutls-3.7.6-x86_64-1.txz: Upgraded.
n/links-2.27-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-101.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/101.0/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2022-20/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31748
(* Security fix *)
extra/rust-for-mozilla/rust-1.59.0-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to '')
-rw-r--r-- | extra/source/rust-for-mozilla/rust.url | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/extra/source/rust-for-mozilla/rust.url b/extra/source/rust-for-mozilla/rust.url index 0de2fcb79..1fafb03a4 100644 --- a/extra/source/rust-for-mozilla/rust.url +++ b/extra/source/rust-for-mozilla/rust.url @@ -1,5 +1,5 @@ # Source code (repacked to .tar.lz): -VERSION=1.57.0 +VERSION=1.59.0 rm -f rustc-${VERSION}-src.tar.* lftpget https://static.rust-lang.org/dist/rustc-${VERSION}-src.tar.gz lftpget https://static.rust-lang.org/dist/rustc-${VERSION}-src.tar.gz.asc @@ -20,9 +20,9 @@ fi # update the settings below, look at src/stage0.json in the Rust sources. exit 0 -BOOTSTRAP_DATE=2021-11-01 -BOOTSTRAP_CARGO=1.56.1 -BOOTSTRAP_VERSION=1.56.1 +BOOTSTRAP_DATE=2022-01-13 +BOOTSTRAP_CARGO=1.58.0 +BOOTSTRAP_VERSION=1.58.0 # i686 bootstrap: lftpget https://static.rust-lang.org/dist/${BOOTSTRAP_DATE}/cargo-${BOOTSTRAP_CARGO}-i686-unknown-linux-gnu.tar.xz |