Package firefox-esr: Information
Default inline alert: Version in the repository: 115.9.1-alt0.c10.1
Source package: firefox-esr
Version: 115.8.0-alt0.c10.1
Build time: Mar 13, 2024, 09:53 PM in the task #340631
Category: Networking/WWW
Report package bugHome page: http://www.mozilla.org/projects/firefox/
License: MPL-2.0
Summary: The Mozilla Firefox project is a redesign of Mozilla's browser (ESR version)
Description:
The Mozilla Firefox project is a redesign of Mozilla's browser component, written using the XUL user interface language and designed to be cross-platform.
List of rpms provided by this srpm:
firefox-esr (x86_64, i586, aarch64)
firefox-esr-config-privacy (x86_64, i586, aarch64)
firefox-esr-debuginfo (x86_64, i586, aarch64)
firefox-esr-wayland (x86_64, i586, aarch64)
firefox-esr (x86_64, i586, aarch64)
firefox-esr-config-privacy (x86_64, i586, aarch64)
firefox-esr-debuginfo (x86_64, i586, aarch64)
firefox-esr-wayland (x86_64, i586, aarch64)
Maintainer: Andrey Cherepanov
List of contributors:
Andrey Cherepanov
Pavel Vasenkov
Alexey Sheplyakov
Grigory Ustinov
Alexey Gladkov
Gleb Fotengauer-Malinovskiy
Ivan Zakharyaschev
Andrey Cherepanov
Pavel Vasenkov
Alexey Sheplyakov
Grigory Ustinov
Alexey Gladkov
Gleb Fotengauer-Malinovskiy
Ivan Zakharyaschev
Last changed
Feb. 24, 2024 Andrey Cherepanov 115.8.0-alt0.c10.1
- Backport new version to c10 branch.
Feb. 21, 2024 Pavel Vasenkov 115.8.0-alt1
- New ESR version. - Security fixes + CVE-2024-1546 Out-of-bounds memory read in networking channels + CVE-2024-1547 Alert dialog could have been spoofed on another site + CVE-2024-1548 Fullscreen Notification could have been hidden by select element + CVE-2024-1549 Custom cursor could obscure the permission dialog + CVE-2024-1550 Mouse cursor re-positioned unexpectedly could have led to unintended permission grants + CVE-2024-1551 Multipart HTTP Responses would accept the Set-Cookie header in response parts + CVE-2024-1552 Incorrect code generation on 32-bit ARM devices + CVE-2024-1553 Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
Feb. 6, 2024 Alexey Sheplyakov 115.7.0-alt2
- Reverted malicious upstream commit https://hg.mozilla.org/integration/autoland/rev/a03a9c72d1db3716adffc6968cfb6eb43c6fcd74 which forces firefox to autoremove yandex, mail.ru, vk search extensions. Note: reverting that (and some similar) commit is a necessary condition to make firefox obey the search engine settings specified in policies.json. Alas it might be not enough. The problem is that firefox is tightly integrated with services provided by Mozilla corporation, such as bookmark sync, telemetry, captive portal detection, you name it. Reportedly a similar malware has been deployed there, thus yandex search extension (or in fact any extension) can be removed remotely (that is, without user consent) if the user is signed in into mozilla account, sends telemetry data to mozilla, etc. Perhaps it's time to make unmozilla firefox (similarly to ungoogled chromium). - policies.json: use yandex search by default (Closes: #43516).