diff options
author | Mark H Weaver <mhw@netris.org> | 2022-05-30 18:11:43 -0400 |
---|---|---|
committer | Mark H Weaver <mhw@netris.org> | 2022-05-31 14:12:31 -0400 |
commit | 20432b839b6bc9e30c156d412597b734a726940d (patch) | |
tree | 8fe9cd475a2a86943525f138c68d153e0c84f4c2 | |
parent | be85c4d40fdbc72dba2ac1ed5f381f6da43d83ba (diff) |
gnu: icecat: Update to 91.10.0-guix0-preview1 [security fixes].
Includes fixes for CVE-2022-31736, CVE-2022-31737, CVE-2022-31738,
CVE-2022-31739, CVE-2022-31740, CVE-2022-31741, CVE-2022-31742, and
CVE-2022-31747.
* gnu/packages/gnuzilla.scm (%icecat-version, %icecat-build-id): Update.
(icecat-source): Update gnuzilla commit, base version, and hashes.
-rw-r--r-- | gnu/packages/gnuzilla.scm | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/gnu/packages/gnuzilla.scm b/gnu/packages/gnuzilla.scm index f3eb1f7b57..4728b5e347 100644 --- a/gnu/packages/gnuzilla.scm +++ b/gnu/packages/gnuzilla.scm @@ -716,8 +716,8 @@ in C/C++.") ;; XXXX: Workaround 'snippet' limitations. (define computed-origin-method (@@ (guix packages) computed-origin-method)) -(define %icecat-version "91.9.1-guix0-preview1") -(define %icecat-build-id "20220520000000") ;must be of the form YYYYMMDDhhmmss +(define %icecat-version "91.10.0-guix0-preview1") +(define %icecat-build-id "20220531000000") ;must be of the form YYYYMMDDhhmmss ;; 'icecat-source' is a "computed" origin that generates an IceCat tarball ;; from the corresponding upstream Firefox ESR tarball, using the 'makeicecat' @@ -739,11 +739,11 @@ in C/C++.") "firefox-" upstream-firefox-version ".source.tar.xz")) (sha256 (base32 - "0q5mmgjy9qpcvkpcwf0ic7kjwr7zk601wvi81wm3qdz4g56py3h9")))) + "1fz11rmbb0qjcp84wz7hmq7wy1zh9bk6vk47xwhrinmmifrqqnl2")))) - (upstream-icecat-base-version "91.9.1") ; maybe older than base-version + (upstream-icecat-base-version "91.10.0") ; maybe older than base-version ;;(gnuzilla-commit (string-append "v" upstream-icecat-base-version)) - (gnuzilla-commit "c5a087823119d3e3109cca9cab222ee926d7a2a2") + (gnuzilla-commit "4c39c619daf344f36962d958d809f6d42d3fce4e") (gnuzilla-source (origin (method git-fetch) @@ -755,7 +755,7 @@ in C/C++.") (string-take gnuzilla-commit 8))) (sha256 (base32 - "1ry5nrb74xr2lah2mijpjymv0kbq0731qli60s3rb93l5f6bkp0j")))) + "1fizsq0dphm40nj6vnvjp87v34iyg78gllv3jp5ssn43ln4jiyb7")))) ;; 'search-patch' returns either a valid file name or #f, so wrap it ;; in 'assume-valid-file-name' to avoid 'local-file' warnings. |