From 4ebc36206bb80cbaa20e76790d93918d1231ae57 Mon Sep 17 00:00:00 2001 From: Mark H Weaver Date: Mon, 13 Mar 2023 16:29:20 -0400 Subject: gnu: icecat: Update to 102.9.0-guix0-preview1 [security fixes]. Includes fixes for CVE-2023-25751, CVE-2023-25752, CVE-2023-28162, CVE-2023-28163, CVE-2023-28164, and CVE-2023-28176. * gnu/packages/gnuzilla.scm (%icecat-base-version, %icecat-build-id): Update. (icecat-source): Update gnuzilla commit, base version, and hashes. --- gnu/packages/gnuzilla.scm | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) (limited to 'gnu/packages/gnuzilla.scm') diff --git a/gnu/packages/gnuzilla.scm b/gnu/packages/gnuzilla.scm index 2707fe6230..daf6f5cad2 100644 --- a/gnu/packages/gnuzilla.scm +++ b/gnu/packages/gnuzilla.scm @@ -497,9 +497,9 @@ (define all-mozilla-locales ;; XXXX: Workaround 'snippet' limitations. (define computed-origin-method (@@ (guix packages) computed-origin-method)) -(define %icecat-base-version "102.8.0") +(define %icecat-base-version "102.9.0") (define %icecat-version (string-append %icecat-base-version "-guix0-preview1")) -(define %icecat-build-id "20230214000000") ;must be of the form YYYYMMDDhhmmss +(define %icecat-build-id "20230314000000") ;must be of the form YYYYMMDDhhmmss ;; 'icecat-source' is a "computed" origin that generates an IceCat tarball ;; from the corresponding upstream Firefox ESR tarball, using the 'makeicecat' @@ -519,12 +519,12 @@ (define icecat-source "firefox-" upstream-firefox-version ".source.tar.xz")) (sha256 (base32 - "0j6afrgfsmd0adbbmffw4p1f2hznpck9d36z3bsjx36f7cjgdy27")))) + "1l8xlbba8sa9dg132k96ch8mz97i5lyhpvkxi8d85jh97xi79c1i")))) ;; The upstream-icecat-base-version may be older than the ;; %icecat-base-version. - (upstream-icecat-base-version "102.8.0") - (gnuzilla-commit "f23f8b609ef4afcc7d8ac5fa795093f1c403f8da") + (upstream-icecat-base-version "102.9.0") + (gnuzilla-commit "f55ede39713d1533734f37e39927cbb78abe1604") (gnuzilla-source (origin (method git-fetch) @@ -536,7 +536,7 @@ (define icecat-source (string-take gnuzilla-commit 8))) (sha256 (base32 - "1zvvgjvsj7k8753f7xmpmkq35dqzyik95943hzl84v2j5mnahhj4")))) + "0z15h3lxfn9pmj5bj62qim3h320dcd2v69xrg1phb7lh5gq0bylf")))) ;; 'search-patch' returns either a valid file name or #f, so wrap it ;; in 'assume-valid-file-name' to avoid 'local-file' warnings. -- cgit v1.2.3