diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-12-16 04:46:51 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-12-16 06:38:01 +0100 |
commit | 7852409378db9d911b949481c914726d20a97408 (patch) | |
tree | 8ae38346ec10f5a9a082dc13140dda93d05cdcc4 /testing/source/mozilla-firefox/gkrust.a.no.networking.check.diff | |
parent | fc0ff5a5d7c45f929eb214b3147aa538e736e2aa (diff) | |
download | current-7852409378db9d911b949481c914726d20a97408.tar.gz current-7852409378db9d911b949481c914726d20a97408.tar.xz |
Fri Dec 16 04:46:51 UTC 202220221216044651
d/help2man-1.49.3-x86_64-1.txz: Upgraded.
l/pipewire-0.3.63-x86_64-1.txz: Upgraded.
x/libX11-1.8.3-x86_64-1.txz: Upgraded.
x/mesa-22.3.1-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-108.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
Thanks to marav for the build help.
For more information, see:
https://www.mozilla.org/en-US/firefox/108.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-51/
https://www.cve.org/CVERecord?id=CVE-2022-46871
https://www.cve.org/CVERecord?id=CVE-2022-46872
https://www.cve.org/CVERecord?id=CVE-2022-46873
https://www.cve.org/CVERecord?id=CVE-2022-46874
https://www.cve.org/CVERecord?id=CVE-2022-46875
https://www.cve.org/CVERecord?id=CVE-2022-46877
https://www.cve.org/CVERecord?id=CVE-2022-46878
https://www.cve.org/CVERecord?id=CVE-2022-46879
(* Security fix *)
Diffstat (limited to 'testing/source/mozilla-firefox/gkrust.a.no.networking.check.diff')
-rw-r--r-- | testing/source/mozilla-firefox/gkrust.a.no.networking.check.diff | 31 |
1 files changed, 0 insertions, 31 deletions
diff --git a/testing/source/mozilla-firefox/gkrust.a.no.networking.check.diff b/testing/source/mozilla-firefox/gkrust.a.no.networking.check.diff deleted file mode 100644 index 115ba0e7a..000000000 --- a/testing/source/mozilla-firefox/gkrust.a.no.networking.check.diff +++ /dev/null @@ -1,31 +0,0 @@ ---- ./config/makefiles/rust.mk.orig 2021-03-15 12:42:08.219987929 -0500 -+++ ./config/makefiles/rust.mk 2021-03-15 12:43:15.996984180 -0500 -@@ -332,17 +332,17 @@ - # the chance of proxy bypasses originating from rust code. - # The check only works when rust code is built with -Clto but without MOZ_LTO_RUST_CROSS. - # Sanitizers and sancov also fail because compiler-rt hooks network functions. --ifndef MOZ_PROFILE_GENERATE --ifeq ($(OS_ARCH), Linux) --ifeq (,$(rustflags_sancov)$(MOZ_ASAN)$(MOZ_TSAN)$(MOZ_UBSAN)) --ifndef MOZ_LTO_RUST_CROSS --ifneq (,$(filter -Clto,$(cargo_rustc_flags))) -- $(call py_action,check_binary,--target --networking $@) --endif --endif --endif --endif --endif -+#ifndef MOZ_PROFILE_GENERATE -+#ifeq ($(OS_ARCH), Linux) -+#ifeq (,$(rustflags_sancov)$(MOZ_ASAN)$(MOZ_TSAN)$(MOZ_UBSAN)) -+#ifndef MOZ_LTO_RUST_CROSS -+#ifneq (,$(filter -Clto,$(cargo_rustc_flags))) -+# $(call py_action,check_binary,--target --networking $@) -+#endif -+#endif -+#endif -+#endif -+#endif - - force-cargo-library-check: - $(call CARGO_CHECK) --lib $(cargo_target_flag) $(rust_features_flag) |