GNU bug report logs -
#65302
[PATCH] gnu: profanity: Update to 0.14.0.
Previous Next
Reported by: Jack Hill <jackhill <at> jackhill.us>
Date: Tue, 15 Aug 2023 04:20:01 UTC
Severity: normal
Tags: patch
Done: Christopher Baines <mail <at> cbaines.net>
Bug is archived. No further changes may be made.
Full log
View this message in rfc822 format
[Message part 1 (text/plain, inline)]
Your message dated Tue, 29 Aug 2023 14:04:02 +0100
with message-id <87a5uagft4.fsf <at> cbaines.net>
and subject line Re: [bug#65302] [PATCH] gnu: profanity: Update to 0.14.0.
has caused the debbugs.gnu.org bug report #65302,
regarding [PATCH] gnu: profanity: Update to 0.14.0.
to be marked as done.
(If you believe you have received this mail in error, please contact
help-debbugs <at> gnu.org.)
--
65302: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=65302
GNU Bug Tracking System
Contact help-debbugs <at> gnu.org with problems
[Message part 2 (message/rfc822, inline)]
* gnu/packagex/messaging.scm (profanity): Update to 0.14.0.
---
guix lint says that profanity might be vulnerable to CVE-2022-40769, but that's for a different profanity.
I'm not sure quite the best way to solve that as I don't know if profanity has a preferred cpe-name.
gnu/packages/messaging.scm | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/gnu/packages/messaging.scm b/gnu/packages/messaging.scm
index f47e1ac0f3..5fccbc8d07 100644
--- a/gnu/packages/messaging.scm
+++ b/gnu/packages/messaging.scm
@@ -2129,7 +2129,7 @@ (define-public libstrophe
(define-public profanity
(package
(name "profanity")
- (version "0.13.0")
+ (version "0.14.0")
(source
(origin
(method url-fetch)
@@ -2138,7 +2138,7 @@ (define-public profanity
version ".tar.gz"))
(sha256
(base32
- "14n45zwc6fxjargqhwqan8fyb7x0ql0hmw56rbjkjfkhpba2qmks"))))
+ "0zygsxxwdxmpppr7vyzi2r7d854yjl6918w0lrs7k41iib9zy8zx"))))
(build-system glib-or-gtk-build-system)
(arguments
`(#:configure-flags
base-commit: 82407391f74dc491662736f03ef031d31ca3913c
--
2.41.0
[Message part 3 (message/rfc822, inline)]
[Message part 4 (text/plain, inline)]
Jack Hill <jackhill <at> jackhill.us> writes:
> * gnu/packagex/messaging.scm (profanity): Update to 0.14.0.
> ---
>
> guix lint says that profanity might be vulnerable to CVE-2022-40769, but that's for a different profanity.
> I'm not sure quite the best way to solve that as I don't know if profanity has a preferred cpe-name.
>
> gnu/packages/messaging.scm | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
This looks good to me, I've pushed it to master as
456790c29953d15f164e0f55dc8f566b40952530.
[signature.asc (application/pgp-signature, inline)]
This bug report was last modified 1 year and 269 days ago.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.