From 969c970f3806c31fe6b6f53f41af883b3804e9c2 Mon Sep 17 00:00:00 2001 From: Mark H Weaver Date: Tue, 16 Apr 2024 14:39:38 -0400 Subject: gnu: icecat: Update to 115.10.0-guix0-preview1 [security fixes]. Includes fixes for CVE-2024-2609, CVE-2024-3302, CVE-2024-3852, CVE-2024-3854, CVE-2024-3857, CVE-2024-3859, CVE-2024-3861, CVE-2024-3863, and CVE-2024-3864. * gnu/packages/gnuzilla.scm (%icecat-base-version, %icecat-build-id): Update. (icecat-source): Update gnuzilla commit, base version, and hashes. --- gnu/packages/gnuzilla.scm | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/gnu/packages/gnuzilla.scm b/gnu/packages/gnuzilla.scm index 4a9bf3ba04..1ffec770fa 100644 --- a/gnu/packages/gnuzilla.scm +++ b/gnu/packages/gnuzilla.scm @@ -523,9 +523,9 @@ (define all-mozilla-locales ;; XXXX: Workaround 'snippet' limitations. (define computed-origin-method (@@ (guix packages) computed-origin-method)) -(define %icecat-base-version "115.9.1") +(define %icecat-base-version "115.10.0") (define %icecat-version (string-append %icecat-base-version "-guix0-preview1")) -(define %icecat-build-id "20240323000000") ;must be of the form YYYYMMDDhhmmss +(define %icecat-build-id "20240416000000") ;must be of the form YYYYMMDDhhmmss ;; 'icecat-source' is a "computed" origin that generates an IceCat tarball ;; from the corresponding upstream Firefox ESR tarball, using the 'makeicecat' @@ -545,12 +545,12 @@ (define icecat-source "firefox-" upstream-firefox-version ".source.tar.xz")) (sha256 (base32 - "0agr8s42lpbq5gixsgj5kpcvimbnyx6msr4il4rvmf7gpw47hr93")))) + "1wpf4vcrvnvhnfzqavbkzqbn51bds1l9f6ld4mzh9xwm7mrkrz8a")))) ;; The upstream-icecat-base-version may be older than the ;; %icecat-base-version. - (upstream-icecat-base-version "115.9.1") - (gnuzilla-commit "a59b8a2c2e4c8b8de47b3ae4d10032154a47a01e") + (upstream-icecat-base-version "115.10.0") + (gnuzilla-commit "40e114e5e8fd0b4d3621d6c8aebf0c78100578f2") (gnuzilla-source (origin (method git-fetch) @@ -562,7 +562,7 @@ (define icecat-source (string-take gnuzilla-commit 8))) (sha256 (base32 - "0l07x59c0bmj72n0pdhb4mlphw9nmd88i9jg39xvxcw0cv7bw6qm")))) + "1x6miiafhv9ncddm7xxjz88amq9bpv6sqnw5k0yz6fy1ghw9ckw0")))) ;; 'search-patch' returns either a valid file name or #f, so wrap it ;; in 'assume-valid-file-name' to avoid 'local-file' warnings. -- cgit v1.2.3