diff options
author | Mark H Weaver <mhw@netris.org> | 2022-10-19 22:20:14 -0400 |
---|---|---|
committer | Mark H Weaver <mhw@netris.org> | 2022-10-20 11:15:22 -0400 |
commit | b172241134b505b1a53fb29b72c7cb18592afbc0 (patch) | |
tree | 11278f5934837096228397a84e8b4b1b8407a223 | |
parent | 7ee77dc6df625b974b8fc3a00b7144087b60a410 (diff) | |
download | guix-b172241134b505b1a53fb29b72c7cb18592afbc0.tar.gz guix-b172241134b505b1a53fb29b72c7cb18592afbc0.zip |
gnu: icecat: Update to 102.4.0-guix0-preview1 [security fixes].
Includes fixes for CVE-2022-42927, CVE-2022-42928, CVE-2022-42929, and
CVE-2022-42932.
* gnu/packages/gnuzilla.scm (%icecat-version, %icecat-build-id): Update.
(icecat-source): Update gnuzilla commit, base version, and hashes.
-rw-r--r-- | gnu/packages/gnuzilla.scm | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/gnu/packages/gnuzilla.scm b/gnu/packages/gnuzilla.scm index 0bf687ac5a..be24185be7 100644 --- a/gnu/packages/gnuzilla.scm +++ b/gnu/packages/gnuzilla.scm @@ -621,8 +621,8 @@ in C/C++.") ;; XXXX: Workaround 'snippet' limitations. (define computed-origin-method (@@ (guix packages) computed-origin-method)) -(define %icecat-version "102.3.0-guix0-preview1") -(define %icecat-build-id "20220920000000") ;must be of the form YYYYMMDDhhmmss +(define %icecat-version "102.4.0-guix0-preview1") +(define %icecat-build-id "20221019000000") ;must be of the form YYYYMMDDhhmmss ;; 'icecat-source' is a "computed" origin that generates an IceCat tarball ;; from the corresponding upstream Firefox ESR tarball, using the 'makeicecat' @@ -644,11 +644,11 @@ in C/C++.") "firefox-" upstream-firefox-version ".source.tar.xz")) (sha256 (base32 - "0nmm861p4zakdvi9lj0ac8dkf9v17250rzcmrx1f6r7rvjv273ih")))) + "0klh3lbm0zdmv90kmmpkzgn15pfjibr7zsjy3kvbzpql97fhv7z7")))) - (upstream-icecat-base-version "102.3.0") ; maybe older than base-version + (upstream-icecat-base-version "102.4.0") ; maybe older than base-version ;;(gnuzilla-commit (string-append "v" upstream-icecat-base-version)) - (gnuzilla-commit "f82b5b40943fe7723486fadccb48d454ee3e9dad") + (gnuzilla-commit "8f1aa117ddca6e8cd0114265fb4ca9b5a927565a") (gnuzilla-source (origin (method git-fetch) @@ -660,7 +660,7 @@ in C/C++.") (string-take gnuzilla-commit 8))) (sha256 (base32 - "1d7lfvwi9mvaxcfiqcgch3idhyxpdf56r9b71r54yiifv6xlr7x9")))) + "0ryrn8ivm763swd0qbqhlgdwc2dj4xjd81d9i2r6hb7bsb4ky3y5")))) ;; 'search-patch' returns either a valid file name or #f, so wrap it ;; in 'assume-valid-file-name' to avoid 'local-file' warnings. |