#3084: Using the XulRunner tarball
----------------------------------------+-----------------------------------
Reporter: ra...@… | Owner: blfs-b...@…
Type: task | Status: new
Priority: normal | Milestone: 6.5
Component: BOOK | Version: SVN
Severity: normal | Keywords:
----------------------------------------+-----------------------------------
Comment(by ra...@…):
Not to beat the horse to death, but I feel this is important.
I just diffed Firefox-2.6.3 and Xulrunner-1.9.2. The *only*
changes are to configure, configure.in, and Makefile.in (there
are also some changes to .hgtag files, but they probably don't
affect us).
The changes are to reflect that they call the Hildon Graphics
API (formerly just Hildon) to Maemo now (which is the mother
project of Hildon).
I just can't see a "vulnerable Xulrunner" ever being exposed.
If Xulrunner is vulnerable, that means Firefox is also. Both
packages would be updated. I suppose there could be an issue
with a user installing Xulrunner and a year later adding on
Firefox, then yeah sure, there could be a vulnerable Xulrunner.
But a simple note on the Firefox page saying to ensure the most
current Xulrunner package is installed probably would eliminate
that issue.
--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/3084#comment:6>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
--
http://linuxfromscratch.org/mailman/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page