summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMark H Weaver <mhw@netris.org>2022-05-29 22:02:28 -0400
committerMark H Weaver <mhw@netris.org>2022-05-29 23:21:41 -0400
commit7f63a6aefc8ae146150be2fb6897b1b2c9fd1907 (patch)
treecc6e4e1bd2496cd4397d10ead0998be1d9fd3f30
parentacb08304c862d65679086a9f160240bfd598289d (diff)
downloadguix-patches-7f63a6aefc8ae146150be2fb6897b1b2c9fd1907.tar
guix-patches-7f63a6aefc8ae146150be2fb6897b1b2c9fd1907.tar.gz
gnu: icecat: Update to 91.9.1-guix0-preview1 [security fixes].base-for-series-12531base-for-series-12529
Includes fixes for CVE-2022-1529 and CVE-2022-1802. * gnu/packages/gnuzilla.scm (%icecat-version, %icecat-build-id): Update. (icecat-source): Update gnuzilla commit, base version, and hashes.
-rw-r--r--gnu/packages/gnuzilla.scm12
1 files changed, 6 insertions, 6 deletions
diff --git a/gnu/packages/gnuzilla.scm b/gnu/packages/gnuzilla.scm
index 96c51cf8db..f3eb1f7b57 100644
--- a/gnu/packages/gnuzilla.scm
+++ b/gnu/packages/gnuzilla.scm
@@ -716,8 +716,8 @@ in C/C++.")
;; XXXX: Workaround 'snippet' limitations.
(define computed-origin-method (@@ (guix packages) computed-origin-method))
-(define %icecat-version "91.9.0-guix0-preview1")
-(define %icecat-build-id "20220503000000") ;must be of the form YYYYMMDDhhmmss
+(define %icecat-version "91.9.1-guix0-preview1")
+(define %icecat-build-id "20220520000000") ;must be of the form YYYYMMDDhhmmss
;; 'icecat-source' is a "computed" origin that generates an IceCat tarball
;; from the corresponding upstream Firefox ESR tarball, using the 'makeicecat'
@@ -739,11 +739,11 @@ in C/C++.")
"firefox-" upstream-firefox-version ".source.tar.xz"))
(sha256
(base32
- "175sakp772hx5c45zc1isbibhpvw7xb4l2lwaf9pvxig9j9ymgml"))))
+ "0q5mmgjy9qpcvkpcwf0ic7kjwr7zk601wvi81wm3qdz4g56py3h9"))))
- (upstream-icecat-base-version "91.9.0") ; maybe older than base-version
+ (upstream-icecat-base-version "91.9.1") ; maybe older than base-version
;;(gnuzilla-commit (string-append "v" upstream-icecat-base-version))
- (gnuzilla-commit "d7d3e9a33d2b3b78a6e08060684580c72c0d6e93")
+ (gnuzilla-commit "c5a087823119d3e3109cca9cab222ee926d7a2a2")
(gnuzilla-source
(origin
(method git-fetch)
@@ -755,7 +755,7 @@ in C/C++.")
(string-take gnuzilla-commit 8)))
(sha256
(base32
- "0mp6mknnhha88932v6pmfadjbnnvkcrsi1ljmcrcz7pb9y81gxn0"))))
+ "1ry5nrb74xr2lah2mijpjymv0kbq0731qli60s3rb93l5f6bkp0j"))))
;; 'search-patch' returns either a valid file name or #f, so wrap it
;; in 'assume-valid-file-name' to avoid 'local-file' warnings.