Репозитории ALT
Последнее обновление в Пт, 24 июля 2020, 16:33:50 +0000 | Пакетов: 18242
en ru
Исходные пакеты в ветвях
свернуть окно
  • 45.9.0-alt0.M80C.1
  • 45.9.0-alt0.M80P.1
  • 45.9.0-alt0.M70C.1
  • 45.5.0-alt0.M70P.1
  • 45.5.0-alt0.M70P.1
Группа :: Сети/WWW
Исходный пакет: firefox-gost
Текущая версия: 45.9.0-alt0.M80P.1
Собрано: почти 4 лет назад
Размер архива: 178,8 МБ
Отчёт repocop: skip
Gear:   http://git.altlinux.org/gears/f/firefox-gost.git
Архив:   http://ftp.altlinux.org/pub/distributions/archive/p8/index/src/f/firefox-gost
Домашняя страница:   http://www.mozilla.org/projects/firefox/

Лицензия: MPL/GPL/LGPL
О пакете: The Mozilla Firefox project is a redesign of Mozilla's browser (with GOST support)
Описание:

The Mozilla Firefox project is a redesign of Mozilla's browser
component, written using the XUL user interface language and designed to
be cross-platform.

This package supports GOST encryption by CryptoPro.
See https://www.cryptopro.ru/products/cpfox for details.

Список участников
(данной и/или предыдущих сборок пакета):

Список rpm-пакетов, предоставляемых данным srpm-пакетом:
  • firefox-gost
  • firefox-gost-debuginfo
Последние изменения (три последних записи журнала изменений):

2017-04-28 Андрей Черепанов 45.9.0-alt0.M80P.1

    - Backport new version to p8 branch
        

2017-04-21 Андрей Черепанов 45.9.0-alt1

    - New ESR version with GOST encryption support
        

2017-04-20 Андрей Черепанов 45.9.0-alt1

    - New ESR version
    - Security fixes:
      + CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9,
      + CVE-2017-5462: DRBG flaw in NSS
      + CVE-2017-5445: Uninitialized values used while parsing
      + CVE-2017-5469: Potential Buffer overflow in flex-generated code
      + CVE-2017-5437: Vulnerabilities in Libevent library
      + CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor
      + CVE-2017-5465: Out-of-bounds read in ConvolvePixel
      + CVE-2017-5447: Out-of-bounds read during glyph processing
      + CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with
      + CVE-2017-5444: Buffer overflow while parsing application/http-index-format
      + CVE-2017-5443: Out-of-bounds write during BinHex decoding
      + CVE-2017-5464: Memory corruption with accessibility and DOM manipulation
      + CVE-2017-5442: Use-after-free during style changes
      + CVE-2017-5441: Use-after-free with selection during scroll events
      + CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT
      + CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing
      + CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing
      + CVE-2017-5460: Use-after-free in frame selection
      + CVE-2017-5432: Use-after-free in text input selection
      + CVE-2017-5434: Use-after-free during focus handling
      + CVE-2017-5459: Buffer overflow in WebGL
      + CVE-2017-5461: Out-of-bounds write in Base64 encoding in NSS
      + CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2
      + CVE-2017-5435: Use-after-free during transaction processing in the editor
      + CVE-2017-5433: Use-after-free in SMIL animation functions
        
 
Проект Geyser основан на коде из проекта Prometheus 2.0, который был доступен по лицензии MIT