[PATCH] gnu: profanity: Update to 0.14.0.

  • Done
  • quality assurance status badge
Details
2 participants
  • Jack Hill
  • Christopher Baines
Owner
unassigned
Submitted by
Jack Hill
Severity
normal
J
J
Jack Hill wrote on 15 Aug 2023 06:16
(address . guix-patches@gnu.org)
b50a7f646fcfb23606ff68ef316d47ed4d8bccc2.1692072960.git.jackhill@jackhill.us
* gnu/packagex/messaging.scm (profanity): Update to 0.14.0.
---

guix lint says that profanity might be vulnerable to CVE-2022-40769, but that's for a different profanity.
I'm not sure quite the best way to solve that as I don't know if profanity has a preferred cpe-name.

gnu/packages/messaging.scm | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)

Toggle diff (26 lines)
diff --git a/gnu/packages/messaging.scm b/gnu/packages/messaging.scm
index f47e1ac0f3..5fccbc8d07 100644
--- a/gnu/packages/messaging.scm
+++ b/gnu/packages/messaging.scm
@@ -2129,7 +2129,7 @@ (define-public libstrophe
(define-public profanity
(package
(name "profanity")
- (version "0.13.0")
+ (version "0.14.0")
(source
(origin
(method url-fetch)
@@ -2138,7 +2138,7 @@ (define-public profanity
version ".tar.gz"))
(sha256
(base32
- "14n45zwc6fxjargqhwqan8fyb7x0ql0hmw56rbjkjfkhpba2qmks"))))
+ "0zygsxxwdxmpppr7vyzi2r7d854yjl6918w0lrs7k41iib9zy8zx"))))
(build-system glib-or-gtk-build-system)
(arguments
`(#:configure-flags

base-commit: 82407391f74dc491662736f03ef031d31ca3913c
--
2.41.0
C
C
Christopher Baines wrote on 29 Aug 2023 15:04
(name . Jack Hill)(address . jackhill@jackhill.us)
87a5uagft4.fsf@cbaines.net
Jack Hill <jackhill@jackhill.us> writes:

Toggle quote (9 lines)
> * gnu/packagex/messaging.scm (profanity): Update to 0.14.0.
> ---
>
> guix lint says that profanity might be vulnerable to CVE-2022-40769, but that's for a different profanity.
> I'm not sure quite the best way to solve that as I don't know if profanity has a preferred cpe-name.
>
> gnu/packages/messaging.scm | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)

This looks good to me, I've pushed it to master as
456790c29953d15f164e0f55dc8f566b40952530.
-----BEGIN PGP SIGNATURE-----
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=XPDW
-----END PGP SIGNATURE-----

?
Your comment

This issue is archived.

To comment on this conversation send an email to 65302@debbugs.gnu.org

To respond to this issue using the mumi CLI, first switch to it
mumi current 65302
Then, you may apply the latest patchset in this issue (with sign off)
mumi am -- -s
Or, compose a reply to this issue
mumi compose
Or, send patches to this issue
mumi send-email *.patch