ALT repositories
Last updated at Fri, 24 Jul 2020 16:33:50 +0000 | SRPMs: 18242
en ru
SRPMs in branches
hide window
  • 45.9.0-alt0.M80C.1
  • 45.9.0-alt0.M80P.1
  • 45.9.0-alt0.M70C.1
  • 45.5.0-alt0.M70P.1
  • 45.5.0-alt0.M70P.1
Group :: Networking/WWW
Source RPM: firefox-gost
Current version: 45.9.0-alt0.M80P.1
Built: almost 4 years ago
Size: 179 MB
Repocop status: skip
Gear:   http://git.altlinux.org/gears/f/firefox-gost.git
Archive:   http://ftp.altlinux.org/pub/distributions/archive/p8/index/src/f/firefox-gost
Home page:   http://www.mozilla.org/projects/firefox/

License: MPL/GPL/LGPL
Summary: The Mozilla Firefox project is a redesign of Mozilla's browser (with GOST support)
Description:

The Mozilla Firefox project is a redesign of Mozilla's browser
component, written using the XUL user interface language and designed to
be cross-platform.

This package supports GOST encryption by CryptoPro.
See https://www.cryptopro.ru/products/cpfox for details.

List of contributors:

List of rpms provided by this srpm:
  • firefox-gost
  • firefox-gost-debuginfo
Recent changes (last three changelog entries):

2017-04-28 Andrey Cherepanov 45.9.0-alt0.M80P.1

    - Backport new version to p8 branch
        

2017-04-21 Andrey Cherepanov 45.9.0-alt1

    - New ESR version with GOST encryption support
        

2017-04-20 Andrey Cherepanov 45.9.0-alt1

    - New ESR version
    - Security fixes:
      + CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9,
      + CVE-2017-5462: DRBG flaw in NSS
      + CVE-2017-5445: Uninitialized values used while parsing
      + CVE-2017-5469: Potential Buffer overflow in flex-generated code
      + CVE-2017-5437: Vulnerabilities in Libevent library
      + CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
      + CVE-2017-5465: Out-of-bounds read in ConvolvePixel
      + CVE-2017-5447: Out-of-bounds read during glyph processing
      + CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with
      + CVE-2017-5444: Buffer overflow while parsing application/http-index-format
      + CVE-2017-5443: Out-of-bounds write during BinHex decoding
      + CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
      + CVE-2017-5442: Use-after-free during style changes
      + CVE-2017-5441: Use-after-free with selection during scroll events
      + CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT
      + CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
      + CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
      + CVE-2017-5460: Use-after-free in frame selection
      + CVE-2017-5432: Use-after-free in text input selection
      + CVE-2017-5434: Use-after-free during focus handling
      + CVE-2017-5459: Buffer overflow in WebGL
      + CVE-2017-5461: Out-of-bounds write in Base64 encoding in NSS
      + CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
      + CVE-2017-5435: Use-after-free during transaction processing in the editor
      + CVE-2017-5433: Use-after-free in SMIL animation functions
        
 
The Geyser project is based on code from Prometheus2.0, which had been made available under the MIT License.