https://www.mozilla.org/en-US/firefox/136.0/releasenotes/ MFSA 2025-14 (bsc#1237683) * CVE-2025-1930 (bmo#1902309) AudioIPC StreamData could trigger a use-after-free in the Browser process * CVE-2025-1939 (bmo#1928334) Tapjacking in Android Custom Tabs using transition animations * CVE-2025-1931 (bmo#1944126) Use-after-free in WebTransportChild * CVE-2025-1932 (bmo#1944313) Inconsistent comparator in XSLT sorting led to out-of-bounds access * CVE-2025-1933 (bmo#1946004) JIT corruption of WASM i32 return values on 64-bit CPUs * CVE-2025-1940 (bmo#1908488) Android Intent confirmation prompt tapjacking using Select options * CVE-2024-9956 (bmo#1922357) Passkey phishing within Bluetooth range * CVE-2025-1934 (bmo#1942881) Unexpected GC during RegExp bailout processing * CVE-2025-1941 (bmo#1944665) Lock screen setting bypass in Firefox Focus for Android * CVE-2025-1942 (bmo#1947139) Disclosure of uninitialized memory when .toUpperCase() causes string to get longer * CVE-2025-1935 (bmo#1866661) Clickjacking the registerProtocolHandler info-bar * CVE-2025-1936 (bmo#1940027) Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=1203
4 lines
134 B
Plaintext
4 lines
134 B
Plaintext
version https://git-lfs.github.com/spec/v1
|
|
oid sha256:492b2c9a3b6d215e38ce490624e8b2b9473419accdeaddb24ba00bc6adc3cc60
|
|
size 582165112
|