Greetings, I'm somwhat new in the OpenBSD world, so please forgive me for any errors/not followed procedures I make.
It has been suggested to me, that I should send patches to this list if I wanted a port to be updated, so I am doing this now. Shortly after zero day CVE-2019-11707 another vulnerability came up in Mozillas Firefox browser, as described here: https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/ The impact of this vulnerability is classified as "high". The diff updates firefox-esr to version 60.7.2esr Kind Regards, Henry
Index: www/firefox-esr/Makefile =================================================================== RCS file: /cvs/ports/www/firefox-esr/Makefile,v retrieving revision 1.97 diff -u -p -r1.97 Makefile --- www/firefox-esr/Makefile 20 Jun 2019 15:01:26 -0000 1.97 +++ www/firefox-esr/Makefile 21 Jun 2019 15:27:23 -0000 @@ -3,7 +3,7 @@ COMMENT = Firefox web browser, Extended Support Release ONLY_FOR_ARCHS = amd64 i386 -MOZILLA_VERSION = 60.7.1esr +MOZILLA_VERSION = 60.7.2esr MOZILLA_BRANCH = release MOZILLA_PROJECT = firefox MOZILLA_CODENAME = browser Index: www/firefox-esr/distinfo =================================================================== RCS file: /cvs/ports/www/firefox-esr/distinfo,v retrieving revision 1.71 diff -u -p -r1.71 distinfo --- www/firefox-esr/distinfo 20 Jun 2019 15:01:26 -0000 1.71 +++ www/firefox-esr/distinfo 21 Jun 2019 15:27:23 -0000 @@ -1,2 +1,2 @@ -SHA256 (mozilla/firefox-60.7.1esr.source.tar.xz) = PRGL4VWXIOQBcsw80mBcnDW1BKx3f2kKGdn1J5zgXIM= -SIZE (mozilla/firefox-60.7.1esr.source.tar.xz) = 267808428 +SHA256 (mozilla/firefox-60.7.2esr.source.tar.xz) = ipGOpwyAZSTykzNvb0V0u25pyh6Y5uXg5cLWrSrCasI= +SIZE (mozilla/firefox-60.7.2esr.source.tar.xz) = 268579256