Пакет firefox-esr: Информация
Default inline alert: Версия в репозитории: 115.9.1-alt0.c10.1
Исходный пакет: firefox-esr
Версия: 52.1.1-alt1
Собран: 9 мая 2017 г. 15:59 в задании #182570
Категория: Сети/WWW
Сообщить об ошибке в пакетеДомашняя страница: http://www.mozilla.org/projects/firefox/
Лицензия: MPL/GPL/LGPL
О пакете: The Mozilla Firefox project is a redesign of Mozilla's browser
Описание:
The Mozilla Firefox project is a redesign of Mozilla's browser component, written using the XUL user interface language and designed to be cross-platform.
Список rpm-пакетов, предоставляемых данным srpm-пакетом:
firefox-esr (x86_64, i586)
firefox-esr-debuginfo (x86_64, i586)
firefox-esr (x86_64, i586)
firefox-esr-debuginfo (x86_64, i586)
Сопровождающий: Andrey Cherepanov
Последнее изменение
8 мая 2017 г. Andrey Cherepanov 52.1.1-alt1
- New ESR version (52.1.1) - Set plugin.load_flash_only setting to false to allow use all NPAPI plugins - Security fixes since 52.0: + CVE-2016-10196: Vulnerabilities in Libevent library + CVE-2017-5031: Use after free in ANGLE + CVE-2017-5428: integer overflow in createImageBitmap() + CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR + CVE-2017-5430: Memory safety bugs fixed in Firefox 53 and Firefox ESR + CVE-2017-5435: Use-after-free during transaction processing in the + CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT + CVE-2017-5440: Use-after-free in txExecutionState destructor during + CVE-2017-5444: Buffer overflow while parsing + CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent + CVE-2017-5451: Addressbar spoofing with onblur event + CVE-2017-5454: Sandbox escape allowing file system read access through + CVE-2017-5455: Sandbox escape through internal feed reader APIs + CVE-2017-5456: Sandbox escape allowing local file system access + CVE-2017-5464: Memory corruption with accessibility and DOM + CVE-2017-5466: Origin confusion when reloading isolated data:text/html + CVE-2017-5467: Memory corruption when drawing Skia content
8 мая 2017 г. Andrey Cherepanov 52.0-alt1
- New release (52.0) based on legion@ build. - Built with internal icu. - Fixed: + CVE-2017-5400: asm.js JIT-spray bypass of ASLR and DEP + CVE-2017-5401: Memory Corruption when handling ErrorResult + CVE-2017-5402: Use-after-free working with events in FontFace objects + CVE-2017-5403: Use-after-free using addRange to add range to an incorrect root object + CVE-2017-5404: Use-after-free working with ranges in selections + CVE-2017-5406: Segmentation fault in Skia with canvas operations + CVE-2017-5407: Pixel and history stealing via floating-point timing side channel with SVG filters + CVE-2017-5410: Memory corruption during JavaScript garbage collection incremental sweeping + CVE-2017-5411: Use-after-free in Buffer Storage in libGLES + CVE-2017-5409: File deletion via callback parameter in Mozilla Windows Updater and Maintenance Service + CVE-2017-5408: Cross-origin reading of video captions in violation of CORS + CVE-2017-5412: Buffer overflow read in SVG filters + CVE-2017-5413: Segmentation fault during bidirectional operations + CVE-2017-5414: File picker can choose incorrect default directory + CVE-2017-5415: Addressbar spoofing through blob URL + CVE-2017-5416: Null dereference crash in HttpChannel + CVE-2017-5417: Addressbar spoofing by draging and dropping URLs + CVE-2017-5425: Overly permissive Gecko Media Plugin sandbox regular expression access + CVE-2017-5426: Gecko Media Plugin sandbox is not started if seccomp-bpf filter is running + CVE-2017-5427: Non-existent chrome.manifest file loaded during startup + CVE-2017-5418: Out of bounds read when parsing HTTP digest authorization responses + CVE-2017-5419: Repeated authentication prompts lead to DOS attack + CVE-2017-5420: Javascript: URLs can obfuscate addressbar location + CVE-2017-5405: FTP response codes can cause use of uninitialized values for ports + CVE-2017-5421: Print preview spoofing + CVE-2017-5422: DOS attack by using view-source: protocol repeatedly in one hyperlink + CVE-2017-5399: Memory safety bugs fixed in Firefox 52 + CVE-2017-5398: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8
20 апреля 2017 г. Andrey Cherepanov 45.9.0-alt1
- New ESR version - Security fixes: + CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, + CVE-2017-5462: DRBG flaw in NSS + CVE-2017-5445: Uninitialized values used while parsing + CVE-2017-5469: Potential Buffer overflow in flex-generated code + CVE-2017-5437: Vulnerabilities in Libevent library + CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor + CVE-2017-5465: Out-of-bounds read in ConvolvePixel + CVE-2017-5447: Out-of-bounds read during glyph processing + CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with + CVE-2017-5444: Buffer overflow while parsing application/http-index-format + CVE-2017-5443: Out-of-bounds write during BinHex decoding + CVE-2017-5464: Memory corruption with accessibility and DOM manipulation + CVE-2017-5442: Use-after-free during style changes + CVE-2017-5441: Use-after-free with selection during scroll events + CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT + CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing + CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing + CVE-2017-5460: Use-after-free in frame selection + CVE-2017-5432: Use-after-free in text input selection + CVE-2017-5434: Use-after-free during focus handling + CVE-2017-5459: Buffer overflow in WebGL + CVE-2017-5461: Out-of-bounds write in Base64 encoding in NSS + CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2 + CVE-2017-5435: Use-after-free during transaction processing in the editor + CVE-2017-5433: Use-after-free in SMIL animation functions