[Bug 261410] www/firefox: Update to 96.0.2 (unfixed security vulnerabilities)
- In reply to: bugzilla-noreply_a_freebsd.org: "[Bug 261410] www/firefox: unfixed security vulnerabilities"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 28 Jan 2022 04:39:24 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=261410
Evgeniy Khramtsov <evgeniy@khramtsov.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |gecko@FreeBSD.org
Attachment #231401| |maintainer-approval?(gecko@
Flags| |FreeBSD.org)
--- Comment #9 from Evgeniy Khramtsov <evgeniy@khramtsov.org> ---
Created attachment 231401
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=231401&action=edit
v1.0 (zstd, git)
Updated to 96.0.3, regenerated json+moz.build for aarch64 using
qemu-user-static 13.0/aarch64 chroot, adjusted BUILD_DEPENDS
versions according to rg 'pkg_check_modules'.
QA checklist:
12.2/{i386,amd64}, 13.0/amd64: build tested.
12.2/i386, 13.0/amd64: runtime tested.
13.0/i386 isn't Tier 1 so isn't QA'ed in order to not block security update for
Tier 1.
aarch64 build should likely pass. If it doesn't, consider reverting:
--- x64_False_arm64_freebsd.json
+++ arm64_False_arm64_freebsd.json
@@ -1,13 +1,13 @@
{
"gn_gen_args": {
- "host_cpu": "x64",
+ "host_cpu": "arm64",
"is_debug": false,
"target_cpu": "arm64",
"target_os": "freebsd"
},
"mozbuild_args": {
"CPU_ARCH": "aarch64",
- "HOST_CPU_ARCH": "x86_64",
+ "HOST_CPU_ARCH": "aarch64",
"MOZ_DEBUG": null,
"OS_TARGET": "FreeBSD"
},
and/or renaming arm64_False_arm64_freebsd.json to x64_False_arm64_freebsd.json.
I followed the rules for generating and target CPU literally from:
https://github.com/mozilla/gecko-dev/blob/release/dom/media/webrtc/third_party_build/gn-configs/README.md
arm64 -> x64 adjustment may be needed if the documentation is incorrect.
ppc64 can also follow later after aarch64 is OK and we get to reproduce
the regen environment/how-to. I already written down some steps
non-sequentielly.
Since v0.8 was proven to be stable for >day by cmt, and this is a point
release with minor moz.build+json readjustment (guard sse2 and avx2 for
PCs, enable neon on aarch64), I believe that regression from v0.8 is
unlikely, which received the following QA:
12.2/{i386,amd64}, 13.0/{amd64}, -CURRENT: build/runtime tested (me).
PipeWire screencapture: tested (jbeich).
v0.8 + 96.0.3: tested for a day (cmt).
--
It seems that I borked my /dev or whatever again, **95.0.2 in the
official repos** and both 96.0.3 can't move tabs with MOZ_ENABLE_WAYLAND
under x11-wm/cage with /dev, XDG_RUNTIME_DIR, WAYLAND_DISPLAY passed
from -CURRENT host. I believe that my issue is not related to 96.0.3
update, but any final testing would be appreciated. I can't test 96
on host because it is far away from vanilla FreeBSD and testing on it
would require rebasing local no-X11 patches on top of 96 which I don't want.
I now disappear for some time to rest.
--
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.