Greetings,

I'm somwhat new in the OpenBSD world, so please forgive me for any
errors/not followed procedures I make.

It has been suggested to me, that I should send patches to this list if
I wanted a port to be updated, so I am doing this now.

Shortly after zero day CVE-2019-11707 another vulnerability came up in
Mozillas Firefox browser, as described here:
https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/

The impact of this vulnerability is classified as "high". The
diff updates firefox-esr to version 60.7.2esr

Kind Regards,

Henry

Index: www/firefox-esr/Makefile
===================================================================
RCS file: /cvs/ports/www/firefox-esr/Makefile,v
retrieving revision 1.97
diff -u -p -r1.97 Makefile
--- www/firefox-esr/Makefile	20 Jun 2019 15:01:26 -0000	1.97
+++ www/firefox-esr/Makefile	21 Jun 2019 15:27:23 -0000
@@ -3,7 +3,7 @@
 COMMENT =	Firefox web browser, Extended Support Release
 ONLY_FOR_ARCHS =	amd64 i386
 
-MOZILLA_VERSION =	60.7.1esr
+MOZILLA_VERSION =	60.7.2esr
 MOZILLA_BRANCH =	release
 MOZILLA_PROJECT =	firefox
 MOZILLA_CODENAME =	browser
Index: www/firefox-esr/distinfo
===================================================================
RCS file: /cvs/ports/www/firefox-esr/distinfo,v
retrieving revision 1.71
diff -u -p -r1.71 distinfo
--- www/firefox-esr/distinfo	20 Jun 2019 15:01:26 -0000	1.71
+++ www/firefox-esr/distinfo	21 Jun 2019 15:27:23 -0000
@@ -1,2 +1,2 @@
-SHA256 (mozilla/firefox-60.7.1esr.source.tar.xz) = PRGL4VWXIOQBcsw80mBcnDW1BKx3f2kKGdn1J5zgXIM=
-SIZE (mozilla/firefox-60.7.1esr.source.tar.xz) = 267808428
+SHA256 (mozilla/firefox-60.7.2esr.source.tar.xz) = ipGOpwyAZSTykzNvb0V0u25pyh6Y5uXg5cLWrSrCasI=
+SIZE (mozilla/firefox-60.7.2esr.source.tar.xz) = 268579256

Reply via email to