Package firefox: Information
Default inline alert: Version in the repository: 68.0.1-alt0.M80P.1
Source package: firefox
Version: 53.0.2-alt0.M80P.1
Build time: May 10, 2017, 03:21 AM in the task #182593
Category: Networking/WWW
Report package bugHome page: http://www.mozilla.org/projects/firefox/
License: MPL/GPL/LGPL
Summary: The Mozilla Firefox project is a redesign of Mozilla's browser
Description:
The Mozilla Firefox project is a redesign of Mozilla's browser component, written using the XUL user interface language and designed to be cross-platform.
List of rpms provided by this srpm:
firefox (x86_64, i586)
firefox-debuginfo (x86_64, i586)
rpm-build-firefox (noarch)
firefox (x86_64, i586)
firefox-debuginfo (x86_64, i586)
rpm-build-firefox (noarch)
Maintainer: Alexey Gladkov
Last changed
May 9, 2017 Andrey Cherepanov 53.0.2-alt0.M80P.1
- Backport new version to p8 branch
May 7, 2017 Alexey Gladkov 53.0.2-alt1
- New release (53.0.2). - Fixed: + CVE-2017-5031: Use after free in ANGLE
May 1, 2017 Alexey Gladkov 53.0-alt1
- New release (53.0). - Built with internal hunspell. - Fixed: + CVE-2017-5433: Use-after-free in SMIL animation functions + CVE-2017-5435: Use-after-free during transaction processing in the editor + CVE-2017-5436: Out-of-bounds write with malicious font in Graphite 2 + CVE-2017-5461: Out-of-bounds write in Base64 encoding in NSS + CVE-2017-5459: Buffer overflow in WebGL + CVE-2017-5466: Origin confusion when reloading isolated data:text/html URL + CVE-2017-5434: Use-after-free during focus handling + CVE-2017-5432: Use-after-free in text input selection + CVE-2017-5460: Use-after-free in frame selection + CVE-2017-5438: Use-after-free in nsAutoPtr during XSLT processing + CVE-2017-5439: Use-after-free in nsTArray Length() during XSLT processing + CVE-2017-5440: Use-after-free in txExecutionState destructor during XSLT processing + CVE-2017-5441: Use-after-free with selection during scroll events + CVE-2017-5442: Use-after-free during style changes + CVE-2017-5464: Memory corruption with accessibility and DOM manipulation + CVE-2017-5443: Out-of-bounds write during BinHex decoding + CVE-2017-5444: Buffer overflow while parsing application/http-index-format content + CVE-2017-5446: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data + CVE-2017-5447: Out-of-bounds read during glyph processing + CVE-2017-5465: Out-of-bounds read in ConvolvePixel + CVE-2017-5448: Out-of-bounds write in ClearKeyDecryptor + CVE-2016-10196: Vulnerabilities in Libevent library + CVE-2017-5454: Sandbox escape allowing file system read access through file picker + CVE-2017-5455: Sandbox escape through internal feed reader APIs + CVE-2017-5456: Sandbox escape allowing local file system access + CVE-2017-5469: Potential Buffer overflow in flex-generated code + CVE-2017-5445: Uninitialized values used while parsing application/http-index-format content + CVE-2017-5449: Crash during bidirectional unicode manipulation with animation + CVE-2017-5450: Addressbar spoofing using javascript: URI on Firefox for Android + CVE-2017-5451: Addressbar spoofing with onblur event + CVE-2017-5462: DRBG flaw in NSS + CVE-2017-5463: Addressbar spoofing through reader view on Firefox for Android + CVE-2017-5467: Memory corruption when drawing Skia content + CVE-2017-5452: Addressbar spoofing during scrolling with editable content on Firefox for Android + CVE-2017-5453: HTML injection into RSS Reader feed preview page through TITLE element + CVE-2017-5458: Drag and drop of javascript: URLs can allow for self-XSS + CVE-2017-5468: Incorrect ownership model for Private Browsing information + CVE-2017-5430: Memory safety bugs fixed in Firefox 53 and Firefox ESR 52.1 + CVE-2017-5429: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1