diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2020-09-24 19:39:47 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2020-09-25 08:59:54 +0200 |
commit | 4852620550026a476677e0c7aac2c1af2dca6be5 (patch) | |
tree | bc8dfd747c71962cc05fff5b71b5496bcbae974d /testing/source/mozilla-thunderbird/gkrust.a.no.networking.check.diff | |
parent | a5a980c2ed34202f925bb69e208a3f199be64124 (diff) | |
download | current-4852620550026a476677e0c7aac2c1af2dca6be5.tar.gz |
Thu Sep 24 19:39:47 UTC 202020200924193947
a/mcelog-173-x86_64-1.txz: Upgraded.
ap/cups-filters-1.28.3-x86_64-1.txz: Upgraded.
ap/sudo-1.9.3p1-x86_64-1.txz: Upgraded.
d/python3-3.8.6-x86_64-1.txz: Upgraded.
l/mozjs78-78.3.0esr-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-78.3.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/78.3.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2020-44/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673
(* Security fix *)
Diffstat (limited to 'testing/source/mozilla-thunderbird/gkrust.a.no.networking.check.diff')
-rw-r--r-- | testing/source/mozilla-thunderbird/gkrust.a.no.networking.check.diff | 27 |
1 files changed, 0 insertions, 27 deletions
diff --git a/testing/source/mozilla-thunderbird/gkrust.a.no.networking.check.diff b/testing/source/mozilla-thunderbird/gkrust.a.no.networking.check.diff deleted file mode 100644 index 75980927..00000000 --- a/testing/source/mozilla-thunderbird/gkrust.a.no.networking.check.diff +++ /dev/null @@ -1,27 +0,0 @@ ---- ./config/makefiles/rust.mk.orig 2020-08-04 21:42:49.000000000 -0500 -+++ ./config/makefiles/rust.mk 2020-08-24 21:44:11.930497037 -0500 -@@ -303,15 +303,15 @@ - # the chance of proxy bypasses originating from rust code. - # The check only works when rust code is built with -Clto. - # Sanitizers and sancov also fail because compiler-rt hooks network functions. --ifndef MOZ_PROFILE_GENERATE --ifeq ($(OS_ARCH), Linux) --ifeq (,$(rustflags_sancov)$(MOZ_ASAN)$(MOZ_TSAN)$(MOZ_UBSAN)) --ifneq (,$(filter -Clto,$(cargo_rustc_flags))) -- $(call py_action,check_binary,--target --networking $@) --endif --endif --endif --endif -+#ifndef MOZ_PROFILE_GENERATE -+#ifeq ($(OS_ARCH), Linux) -+#ifeq (,$(rustflags_sancov)$(MOZ_ASAN)$(MOZ_TSAN)$(MOZ_UBSAN)) -+#ifneq (,$(filter -Clto,$(cargo_rustc_flags))) -+# $(call py_action,check_binary,--target --networking $@) -+#endif -+#endif -+#endif -+#endif - - force-cargo-library-check: - $(call CARGO_CHECK) --lib $(cargo_target_flag) $(rust_features_flag) |