Package firefox-config-privacy: Information

  • Default inline alert: A new version of the package has been build

    Task #: #348263
    Build time: May 22, 2024, 02:14 PM
    New version: 126.0-alt2
Binary package: firefox-config-privacy
Version: 125.0.3-alt1
Architecture: noarch
Build time:  May 3, 2024, 01:25 PM in the task #347212
Source package: firefox
Report package bug
License: MPL-2.0
Summary: Firefox configuration with the paranoid privacy settings
Description: 
Settings disable:
* obsolete ssl protocols;
* safebrowsing, trackingprotection and other requests to third-party services;
* telemetry;
* webrtc;
* the social features;
* dns and network predictors/prefetch;
* and some more...

Most likely you don't need to use this package.

Maintainer: Ajrat Makhmutov


Last changed


April 30, 2024 Ajrat Makhmutov 125.0.3-alt1
- New version (125.0.3).
April 23, 2024 Ajrat Makhmutov 125.0.2-alt1
- New version (125.0.2).
April 17, 2024 Ajrat Makhmutov 125.0.1-alt1
- New version (125.0.1).
- Update description (closes: 49990).
- Enable VAAPI.
- Security fixes:
  + CVE-2024-3852: GetBoundName in the JIT returned the wrong object
  + CVE-2024-3853: Use-after-free if garbage collection runs during realm initialization
  + CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement
  + CVE-2024-3855: Incorrect JIT optimization of MSubstr leads to out-of-bounds reads
  + CVE-2024-3856: Use-after-free in WASM garbage collection
  + CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during garbage collection
  + CVE-2024-3858: Corrupt pointer dereference in js::CheckTracedThing<js::Shape>
  + CVE-2024-3859: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer
  + CVE-2024-3860: Crash when tracing empty shape lists
  + CVE-2024-3861: Potential use-after-free due to AlignedBuffer self-move
  + CVE-2024-3862: Potential use of uninitialized memory in MarkStack assignment operator on self-assignment
  + CVE-2024-3863: Download Protections were bypassed by .xrm-ms files on Windows
  + CVE-2024-3302: Denial of Service using HTTP/2 CONTINUATION frames
  + CVE-2024-3864: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
  + CVE-2024-3865: Memory safety bugs fixed in Firefox 125