[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
01/01: UNTESTED: gnu: icecat: Update to 91.6.1-guix0-preview1 [security
From: |
guix-commits |
Subject: |
01/01: UNTESTED: gnu: icecat: Update to 91.6.1-guix0-preview1 [security fixes]. |
Date: |
Sun, 6 Mar 2022 23:07:16 -0500 (EST) |
mhw pushed a commit to branch gnuzilla-updates
in repository guix.
commit c75e162ae6a0059d68a1a53012a1aecd8ff0dd43
Author: Mark H Weaver <mhw@netris.org>
AuthorDate: Sun Mar 6 23:02:22 2022 -0500
UNTESTED: gnu: icecat: Update to 91.6.1-guix0-preview1 [security fixes].
Includes fixes for CVE-2022-26485 and CVE-2022-26486.
* gnu/packages/gnuzilla.scm (%icecat-version, %icecat-build-id): Update.
(icecat-source): Update gnuzilla commit, base version, and hashes.
---
gnu/packages/gnuzilla.scm | 12 ++++++------
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/gnu/packages/gnuzilla.scm b/gnu/packages/gnuzilla.scm
index 39156e113b..2071184388 100644
--- a/gnu/packages/gnuzilla.scm
+++ b/gnu/packages/gnuzilla.scm
@@ -716,8 +716,8 @@ in C/C++.")
;; XXXX: Workaround 'snippet' limitations.
(define computed-origin-method (@@ (guix packages) computed-origin-method))
-(define %icecat-version "91.6.0-guix0-preview1")
-(define %icecat-build-id "20220208000000") ;must be of the form YYYYMMDDhhmmss
+(define %icecat-version "91.6.1-guix0-preview1")
+(define %icecat-build-id "20220306000000") ;must be of the form YYYYMMDDhhmmss
;; 'icecat-source' is a "computed" origin that generates an IceCat tarball
;; from the corresponding upstream Firefox ESR tarball, using the 'makeicecat'
@@ -739,11 +739,11 @@ in C/C++.")
"firefox-" upstream-firefox-version ".source.tar.xz"))
(sha256
(base32
- "1889p8si83dglyblmyj8z5mh600v1klr50swka5mhf9c2lr2i03y"))))
+ "1pv59dip6k93mk3q65n406ncd5m8wz50kpwn8qvpllv1nw8y1n7r"))))
- (upstream-icecat-base-version "91.6.0") ; maybe older than
base-version
+ (upstream-icecat-base-version "91.6.1") ; maybe older than
base-version
;;(gnuzilla-commit (string-append "v" upstream-icecat-base-version))
- (gnuzilla-commit "6c4accb674d2df8be0aabfa03f7679f66bbf70f5")
+ (gnuzilla-commit "63c47b0424a09738f45d45f30dbc30b7d6c5a41d")
(gnuzilla-source
(origin
(method git-fetch)
@@ -755,7 +755,7 @@ in C/C++.")
(string-take gnuzilla-commit 8)))
(sha256
(base32
- "14yivx4zwap2z02gj9waaccigji8ibyq40dxw5smk9w2cmcsdvic"))))
+ "15jwd29h1p786ys8fa3i163yhh7dcl09r8fikr72bbnak43pnkkr"))))
;; 'search-patch' returns either a valid file name or #f, so wrap it
;; in 'assume-valid-file-name' to avoid 'local-file' warnings.