summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMark H Weaver <mhw@netris.org>2022-02-08 02:10:51 -0500
committerMark H Weaver <mhw@netris.org>2022-02-08 14:06:05 -0500
commitf1d20dc649943b2fe3934520c3f5c1f8524eac2b (patch)
treeb2862dc5c5b3fbd127509b8f76702c316b1f4a19
parent2b677cff7d3cbc28e9f7f5da41ae52d32da3a674 (diff)
downloadguix-patches-f1d20dc649943b2fe3934520c3f5c1f8524eac2b.tar
guix-patches-f1d20dc649943b2fe3934520c3f5c1f8524eac2b.tar.gz
gnu: icecat: Update to 91.6.0-guix0-preview1 [security fixes].
Includes fixes for CVE-2022-22754, CVE-2022-22756, CVE-2022-22759, CVE-2022-22760, CVE-2022-22761, CVE-2022-22763, and CVE-2022-22764. * gnu/packages/gnuzilla.scm (%icecat-version, %icecat-build-id): Update. (icecat-source): Update gnuzilla commit, base version, and hashes.
-rw-r--r--gnu/packages/gnuzilla.scm12
1 files changed, 6 insertions, 6 deletions
diff --git a/gnu/packages/gnuzilla.scm b/gnu/packages/gnuzilla.scm
index d5d11b59d1..d08dc6bca7 100644
--- a/gnu/packages/gnuzilla.scm
+++ b/gnu/packages/gnuzilla.scm
@@ -716,8 +716,8 @@ in C/C++.")
;; XXXX: Workaround 'snippet' limitations.
(define computed-origin-method (@@ (guix packages) computed-origin-method))
-(define %icecat-version "91.5.0-guix0-preview1")
-(define %icecat-build-id "20220111000000") ;must be of the form YYYYMMDDhhmmss
+(define %icecat-version "91.6.0-guix0-preview1")
+(define %icecat-build-id "20220208000000") ;must be of the form YYYYMMDDhhmmss
;; 'icecat-source' is a "computed" origin that generates an IceCat tarball
;; from the corresponding upstream Firefox ESR tarball, using the 'makeicecat'
@@ -739,11 +739,11 @@ in C/C++.")
"firefox-" upstream-firefox-version ".source.tar.xz"))
(sha256
(base32
- "04y8nj1f065b3dn354f1ns3cm9xp4kljr5ippvmfdqr7cb4xjp7l"))))
+ "1889p8si83dglyblmyj8z5mh600v1klr50swka5mhf9c2lr2i03y"))))
- (upstream-icecat-base-version "91.5.0") ; maybe older than base-version
+ (upstream-icecat-base-version "91.6.0") ; maybe older than base-version
;;(gnuzilla-commit (string-append "v" upstream-icecat-base-version))
- (gnuzilla-commit "c0a504578cb694522c65bb6c36396df8142d4a2a")
+ (gnuzilla-commit "6c4accb674d2df8be0aabfa03f7679f66bbf70f5")
(gnuzilla-source
(origin
(method git-fetch)
@@ -755,7 +755,7 @@ in C/C++.")
(string-take gnuzilla-commit 8)))
(sha256
(base32
- "016g8vdr6w6six4f705cmbdrfknmy4bk1qjjrvsdpah4bf6c2s2c"))))
+ "14yivx4zwap2z02gj9waaccigji8ibyq40dxw5smk9w2cmcsdvic"))))
;; 'search-patch' returns either a valid file name or #f, so wrap it
;; in 'assume-valid-file-name' to avoid 'local-file' warnings.