From mboxrd@z Thu Jan 1 00:00:00 1970 From: Mark H Weaver Subject: bug#18581: icecat fails to build on i686 Date: Tue, 30 Sep 2014 13:37:08 -0400 Message-ID: <87lhp19fi3.fsf@yeeloong.lan> References: <877g0narj1.fsf@yeeloong.lan> Mime-Version: 1.0 Content-Type: text/plain Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:53614) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1XZ1NI-0004Rx-T7 for bug-guix@gnu.org; Tue, 30 Sep 2014 13:38:13 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1XZ1NC-0008SQ-R7 for bug-guix@gnu.org; Tue, 30 Sep 2014 13:38:08 -0400 Received: from debbugs.gnu.org ([140.186.70.43]:36769) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1XZ1NC-0008SC-OD for bug-guix@gnu.org; Tue, 30 Sep 2014 13:38:02 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.80) (envelope-from ) id 1XZ1NB-0000x0-SQ for bug-guix@gnu.org; Tue, 30 Sep 2014 13:38:02 -0400 Sender: "Debbugs-submit" Resent-Message-ID: In-Reply-To: <877g0narj1.fsf@yeeloong.lan> (Mark H. Weaver's message of "Mon, 29 Sep 2014 02:07:30 -0400") List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: bug-guix-bounces+gcggb-bug-guix=m.gmane.org@gnu.org Sender: bug-guix-bounces+gcggb-bug-guix=m.gmane.org@gnu.org To: 18581@debbugs.gnu.org Cc: request@debbugs.gnu.org retitle 18581 IceCat fails to build on i686 and needs security updates severity 18581 serious thanks Mark H Weaver writes: > The icecat build on i686 broke with the last core-updates merge. > See: > > http://hydra.gnu.org/build/96557/log/tail-reload > http://hydra.gnu.org/job/gnu/master/icecat-24.0.i686-linux More importantly, the version of IceCat we are using is almost a year old, with no security updates applied during that time. We should update to IceCat 31, which is currently available only from Trisquel, here: http://devel.trisquel.info/icecat/belenos/pool/main/i/icecat/icecat_31.0+gnu3.tar.gz We also need security updates applied, notably the recent NSS signature verification flaw: (CVE-2014-1568) http://seclists.org/oss-sec/2014/q3/736 https://www.mozilla.org/security/announce/2014/mfsa2014-73.html There may be other security patches as well. I suggest looking on mozilla.org for patches to version 31. Mark