https://www.mozilla.org/en-US/firefox/127.0/releasenotes MFSA 2024-25 (bsc#1226027) * CVE-2024-5687 (bmo#1889066) An incorrect principal could have been used when opening new tabs * CVE-2024-5688 (bmo#1895086) Use-after-free in JavaScript object transplant * CVE-2024-5689 (bmo#1389707) User confusion and possible phishing vector via Firefox Screenshots * CVE-2024-5690 (bmo#1883693) External protocol handlers leaked by timing attack * CVE-2024-5691 (bmo#1888695) Sandboxed iframes were able to bypass sandbox restrictions to open a new window * CVE-2024-5692 (bmo#1837514, bmo#1891234) Bypass of file name restrictions during saving * CVE-2024-5693 (bmo#1891319) Cross-Origin Image leak via Offscreen Canvas * CVE-2024-5694 (bmo#1895055) Use-after-free in JavaScript Strings * CVE-2024-5695 (bmo#1895579) Memory Corruption using allocation using out-of-memory conditions * CVE-2024-5696 (bmo#1896555) Memory Corruption in Text Fragments * CVE-2024-5697 (bmo#1414937) Website was able to detect when Firefox was taking a screenshot of them * CVE-2024-5698 (bmo#1828259) Data-list could have overlaid address bar * CVE-2024-5699 (bmo#1891349) OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=1155
11 lines
342 B
Plaintext
11 lines
342 B
Plaintext
PRODUCT="firefox"
|
|
CHANNEL="release"
|
|
VERSION="127.0"
|
|
VERSION_SUFFIX=""
|
|
PREV_VERSION="126.0.1"
|
|
PREV_VERSION_SUFFIX=""
|
|
#SKIP_LOCALES="" # Uncomment to skip l10n and compare-locales-generation
|
|
RELEASE_REPO="https://hg.mozilla.org/releases/mozilla-release"
|
|
RELEASE_TAG="cfd3e02d8411b3a938cda7242dcf044cf03c03d1"
|
|
RELEASE_TIMESTAMP="20240606181944"
|