Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 25 Jan 2022 22:30:02 +0000
From:      bugzilla-noreply@freebsd.org
To:        gecko@FreeBSD.org
Subject:   [Bug 261410] www/firefox: Update to 96.0.2 (unfixed security vulnerabilities)
Message-ID:  <bug-261410-21738-mjDVsZ8gzv@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-261410-21738@https.bugs.freebsd.org/bugzilla/>
References:  <bug-261410-21738@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D261410

--- Comment #6 from Evgeniy Khramtsov <evgeniy@khramtsov.org> ---
Created attachment 231338
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D231338&action=
=3Dedit
v0.3 (zstd as well, only build tested until jail gets unborked)

I am working on it. I could regen manifest and build passed. I am attaching=
 my
WIP.
Now I need to unbork my testing jail, test/unbreak/rebase PipeWire and ABI
related
patch, cleanup the mess, return WEBRTC_BSD, etc. I have patched depot_tools
etc. I will notify if I give up.

21 files changed, 93301 insertions(+), 26443 deletions(-)
(Wew)

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-261410-21738-mjDVsZ8gzv>