Пакет firefox-esr-wayland: Информация
Default inline alert: Версия в репозитории: 115.11.0-alt1
Бинарный пакет: firefox-esr-wayland
Версия: 91.5.0-alt1
Архитектура: aarch64
Собран: 12 января 2022 г. 14:38 в задании #293330
Исходный пакет: firefox-esr
Категория: Сети/WWW
Сообщить об ошибке в пакетеДомашняя страница: http://www.mozilla.org/projects/firefox/
Лицензия: MPL-2.0
О пакете: Firefox Wayland launcher.
Описание:
The firefox-wayland package contains launcher and desktop file to run Firefox natively on Wayland.
Сопровождающий: Andrey Cherepanov
Последнее изменение
11 января 2022 г. Andrey Cherepanov 91.5.0-alt1
- New ESR version. - Security fixes: + CVE-2022-22746 Calling into reportValidity could have lead to fullscreen window spoof + CVE-2022-22743 Browser window spoof using fullscreen mode + CVE-2022-22742 Out-of-bounds memory access when inserting text in edit mode + CVE-2022-22741 Browser window spoof using fullscreen mode + CVE-2022-22740 Use-after-free of ChannelEventQueue::mOwner + CVE-2022-22738 Heap-buffer-overflow in blendGaussianBlur + CVE-2022-22737 Race condition when playing audio files + CVE-2021-4140 Iframe sandbox bypass with XSLT + CVE-2022-22748 Spoofed origin on external protocol launch dialog + CVE-2022-22745 Leaking cross-origin URLs through securitypolicyviolation event + CVE-2022-22744 The 'Copy as curl' feature in DevTools did not fully escape website-controlled data, potentially leading to command injection + CVE-2022-22747 Crash when handling empty pkcs7 sequence + CVE-2022-22739 Missing throttling on external protocol launch dialog + CVE-2022-22751 Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5
17 декабря 2021 г. Andrey Cherepanov 91.4.1-alt1
- New ESR version.
6 декабря 2021 г. Andrey Cherepanov 91.4.0-alt1
- New ESR version. - Security fixes: + CVE-2021-43536 URL leakage when navigating while executing asynchronous function + CVE-2021-43537 Heap buffer overflow when using structured clone + CVE-2021-43538 Missing fullscreen and pointer lock notification when requesting both + CVE-2021-43539 GC rooting failure when calling wasm instance methods + CVE-2021-43541 External protocol handler parameters were unescaped + CVE-2021-43542 XMLHttpRequest error codes could have leaked the existence of an external protocol handler + CVE-2021-43543 Bypass of CSP sandbox directive when embedding + CVE-2021-43545 Denial of Service when using the Location API in a loop + CVE-2021-43546 Cursor spoofing could overlay user interface when native cursor is zoomed