aboutsummaryrefslogtreecommitdiff
path: root/gnu/packages/gnuzilla.scm
diff options
context:
space:
mode:
authorMark H Weaver <mhw@netris.org>2021-12-07 17:15:56 -0500
committerMark H Weaver <mhw@netris.org>2021-12-07 19:09:24 -0500
commit906dd9ff6322fd7aaf3ceace95ec8c443d35c1e5 (patch)
tree49422c8ad3277856ba2f793b0d336937e6dc30d8 /gnu/packages/gnuzilla.scm
parent9e67f2ad418e9a5a7a83dc2349624572e9dbfc8b (diff)
downloadguix-906dd9ff6322fd7aaf3ceace95ec8c443d35c1e5.tar
guix-906dd9ff6322fd7aaf3ceace95ec8c443d35c1e5.tar.gz
gnu: icecat: Update to 91.4.0-guix0-preview1 [security fixes].
Includes fixes for CVE-2021-43536, CVE-2021-43537, CVE-2021-43538, CVE-2021-43539, CVE-2021-43541, CVE-2021-43542, CVE-2021-43543, CVE-2021-43545, CVE-2021-43546, and MOZ-2021-0009. * gnu/packages/gnuzilla.scm (%icecat-version, %icecat-build-id): Update. (icecat-source): Remove icecat-CVE-2021-43527.patch, which is now included in upstream icecat. Update the gnuzilla commit, base version, and hashes. * gnu/packages/patches/icecat-CVE-2021-43527.patch: Delete file. * gnu/local.mk (dist_patch_DATA): Remove it.
Diffstat (limited to 'gnu/packages/gnuzilla.scm')
-rw-r--r--gnu/packages/gnuzilla.scm13
1 files changed, 6 insertions, 7 deletions
diff --git a/gnu/packages/gnuzilla.scm b/gnu/packages/gnuzilla.scm
index 36b8a35efe..bc4ef2ce45 100644
--- a/gnu/packages/gnuzilla.scm
+++ b/gnu/packages/gnuzilla.scm
@@ -697,8 +697,8 @@ in C/C++.")
;; XXXX: Workaround 'snippet' limitations.
(define computed-origin-method (@@ (guix packages) computed-origin-method))
-(define %icecat-version "91.3.0-guix0-preview1")
-(define %icecat-build-id "20211102000000") ;must be of the form YYYYMMDDhhmmss
+(define %icecat-version "91.4.0-guix0-preview1")
+(define %icecat-build-id "20211207000000") ;must be of the form YYYYMMDDhhmmss
;; 'icecat-source' is a "computed" origin that generates an IceCat tarball
;; from the corresponding upstream Firefox ESR tarball, using the 'makeicecat'
@@ -720,11 +720,11 @@ in C/C++.")
"firefox-" upstream-firefox-version ".source.tar.xz"))
(sha256
(base32
- "0v79c435vfbhsx7pqyq4jm5rv8iysig69wwqhvys1n0jy54m72qj"))))
+ "09xkzk27krzyj1qx8cjjn2zpnws1cncka75828kk7ychnjfq48p7"))))
- (upstream-icecat-base-version "91.3.0") ; maybe older than base-version
+ (upstream-icecat-base-version "91.4.0") ; maybe older than base-version
;;(gnuzilla-commit (string-append "v" upstream-icecat-base-version))
- (gnuzilla-commit "32631cac00953abbac61dc7ab1a0eafbdd59b53a")
+ (gnuzilla-commit "dd79d69e5dc6e6e751195001f322b30746be6903")
(gnuzilla-source
(origin
(method git-fetch)
@@ -736,7 +736,7 @@ in C/C++.")
(string-take gnuzilla-commit 8)))
(sha256
(base32
- "13ckga49h5azf0c6q3c6b6wcmahzyywryxgwmwr1dahsjgy0wwrw"))))
+ "1vv97wmgdmkwddh8n30dak5l8akzbw49ca0w6krhq9dnj7n74cxh"))))
;; 'search-patch' returns either a valid file name or #f, so wrap it
;; in 'assume-valid-file-name' to avoid 'local-file' warnings.
@@ -750,7 +750,6 @@ in C/C++.")
(origin
(method computed-origin-method)
(file-name (string-append "icecat-" %icecat-version ".tar.xz"))
- (patches (search-patches "icecat-CVE-2021-43527.patch"))
(sha256 #f)
(uri
(delay