gnu: icecat: Update to 91.10.0-guix0-preview1 [security fixes].
Includes fixes for CVE-2022-31736, CVE-2022-31737, CVE-2022-31738, CVE-2022-31739, CVE-2022-31740, CVE-2022-31741, CVE-2022-31742, and CVE-2022-31747. * gnu/packages/gnuzilla.scm (%icecat-version, %icecat-build-id): Update. (icecat-source): Update gnuzilla commit, base version, and hashes.
parent
be85c4d40f
commit
20432b839b
|
@ -716,8 +716,8 @@ in C/C++.")
|
||||||
;; XXXX: Workaround 'snippet' limitations.
|
;; XXXX: Workaround 'snippet' limitations.
|
||||||
(define computed-origin-method (@@ (guix packages) computed-origin-method))
|
(define computed-origin-method (@@ (guix packages) computed-origin-method))
|
||||||
|
|
||||||
(define %icecat-version "91.9.1-guix0-preview1")
|
(define %icecat-version "91.10.0-guix0-preview1")
|
||||||
(define %icecat-build-id "20220520000000") ;must be of the form YYYYMMDDhhmmss
|
(define %icecat-build-id "20220531000000") ;must be of the form YYYYMMDDhhmmss
|
||||||
|
|
||||||
;; 'icecat-source' is a "computed" origin that generates an IceCat tarball
|
;; 'icecat-source' is a "computed" origin that generates an IceCat tarball
|
||||||
;; from the corresponding upstream Firefox ESR tarball, using the 'makeicecat'
|
;; from the corresponding upstream Firefox ESR tarball, using the 'makeicecat'
|
||||||
|
@ -739,11 +739,11 @@ in C/C++.")
|
||||||
"firefox-" upstream-firefox-version ".source.tar.xz"))
|
"firefox-" upstream-firefox-version ".source.tar.xz"))
|
||||||
(sha256
|
(sha256
|
||||||
(base32
|
(base32
|
||||||
"0q5mmgjy9qpcvkpcwf0ic7kjwr7zk601wvi81wm3qdz4g56py3h9"))))
|
"1fz11rmbb0qjcp84wz7hmq7wy1zh9bk6vk47xwhrinmmifrqqnl2"))))
|
||||||
|
|
||||||
(upstream-icecat-base-version "91.9.1") ; maybe older than base-version
|
(upstream-icecat-base-version "91.10.0") ; maybe older than base-version
|
||||||
;;(gnuzilla-commit (string-append "v" upstream-icecat-base-version))
|
;;(gnuzilla-commit (string-append "v" upstream-icecat-base-version))
|
||||||
(gnuzilla-commit "c5a087823119d3e3109cca9cab222ee926d7a2a2")
|
(gnuzilla-commit "4c39c619daf344f36962d958d809f6d42d3fce4e")
|
||||||
(gnuzilla-source
|
(gnuzilla-source
|
||||||
(origin
|
(origin
|
||||||
(method git-fetch)
|
(method git-fetch)
|
||||||
|
@ -755,7 +755,7 @@ in C/C++.")
|
||||||
(string-take gnuzilla-commit 8)))
|
(string-take gnuzilla-commit 8)))
|
||||||
(sha256
|
(sha256
|
||||||
(base32
|
(base32
|
||||||
"1ry5nrb74xr2lah2mijpjymv0kbq0731qli60s3rb93l5f6bkp0j"))))
|
"1fizsq0dphm40nj6vnvjp87v34iyg78gllv3jp5ssn43ln4jiyb7"))))
|
||||||
|
|
||||||
;; 'search-patch' returns either a valid file name or #f, so wrap it
|
;; 'search-patch' returns either a valid file name or #f, so wrap it
|
||||||
;; in 'assume-valid-file-name' to avoid 'local-file' warnings.
|
;; in 'assume-valid-file-name' to avoid 'local-file' warnings.
|
||||||
|
|
Reference in New Issue