gnu: icecat: Update to 91.3.0-guix0-preview1 [security fixes].
Includes fixes for CVE-2021-38503, CVE-2021-38504, CVE-2021-38506, CVE-2021-38507, CVE-2021-38508, CVE-2021-38509, MOZ-2021-0007, and MOZ-2021-0008. * gnu/packages/gnuzilla.scm (%icecat-version, %icecat-build-id): Update. (icecat-source): Update gnuzilla commit, base version, and hashes.
This commit is contained in:
parent
77c0a35af2
commit
f3b3f23493
1 changed files with 6 additions and 6 deletions
|
|
@ -690,8 +690,8 @@ in C/C++.")
|
||||||
;; XXXX: Workaround 'snippet' limitations.
|
;; XXXX: Workaround 'snippet' limitations.
|
||||||
(define computed-origin-method (@@ (guix packages) computed-origin-method))
|
(define computed-origin-method (@@ (guix packages) computed-origin-method))
|
||||||
|
|
||||||
(define %icecat-version "91.2.0-guix0-preview1")
|
(define %icecat-version "91.3.0-guix0-preview1")
|
||||||
(define %icecat-build-id "20211006000000") ;must be of the form YYYYMMDDhhmmss
|
(define %icecat-build-id "20211102000000") ;must be of the form YYYYMMDDhhmmss
|
||||||
|
|
||||||
;; 'icecat-source' is a "computed" origin that generates an IceCat tarball
|
;; 'icecat-source' is a "computed" origin that generates an IceCat tarball
|
||||||
;; from the corresponding upstream Firefox ESR tarball, using the 'makeicecat'
|
;; from the corresponding upstream Firefox ESR tarball, using the 'makeicecat'
|
||||||
|
|
@ -713,11 +713,11 @@ in C/C++.")
|
||||||
"firefox-" upstream-firefox-version ".source.tar.xz"))
|
"firefox-" upstream-firefox-version ".source.tar.xz"))
|
||||||
(sha256
|
(sha256
|
||||||
(base32
|
(base32
|
||||||
"1hs2bvzl0d4kfir3gq997kwxm90ygapqn6xlw47cihnh479wzwry"))))
|
"0v79c435vfbhsx7pqyq4jm5rv8iysig69wwqhvys1n0jy54m72qj"))))
|
||||||
|
|
||||||
(upstream-icecat-base-version "91.2.0") ; maybe older than base-version
|
(upstream-icecat-base-version "91.3.0") ; maybe older than base-version
|
||||||
;;(gnuzilla-commit (string-append "v" upstream-icecat-base-version))
|
;;(gnuzilla-commit (string-append "v" upstream-icecat-base-version))
|
||||||
(gnuzilla-commit "1537880dac3087d3779543303f0df83432831166")
|
(gnuzilla-commit "32631cac00953abbac61dc7ab1a0eafbdd59b53a")
|
||||||
(gnuzilla-source
|
(gnuzilla-source
|
||||||
(origin
|
(origin
|
||||||
(method git-fetch)
|
(method git-fetch)
|
||||||
|
|
@ -729,7 +729,7 @@ in C/C++.")
|
||||||
(string-take gnuzilla-commit 8)))
|
(string-take gnuzilla-commit 8)))
|
||||||
(sha256
|
(sha256
|
||||||
(base32
|
(base32
|
||||||
"16r42hp05qmiifw8ym89328w5b4flp3hngpjwbrzgq23q1qmixa9"))))
|
"13ckga49h5azf0c6q3c6b6wcmahzyywryxgwmwr1dahsjgy0wwrw"))))
|
||||||
|
|
||||||
;; 'search-patch' returns either a valid file name or #f, so wrap it
|
;; 'search-patch' returns either a valid file name or #f, so wrap it
|
||||||
;; in 'assume-valid-file-name' to avoid 'local-file' warnings.
|
;; in 'assume-valid-file-name' to avoid 'local-file' warnings.
|
||||||
|
|
|
||||||
Reference in a new issue