6837c44c30
- Firefox Extended Support Release 140.8.0 ESR * Fixed: Various security fixes. - Mozilla Firefox ESR 140.8 https://www.mozilla.org/security/advisories/mfsa2026-15 MFSA 2026-15 (boo#1258568) * CVE-2026-2757 (bmo#2001637) Incorrect boundary conditions in the WebRTC: Audio/Video component * CVE-2026-2758 (bmo#2009608) Use-after-free in the JavaScript: GC component * CVE-2026-2759 (bmo#2010933) Incorrect boundary conditions in the Graphics: ImageLib component * CVE-2026-2760 (bmo#2011062) Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component * CVE-2026-2761 (bmo#2011063) Sandbox escape in the Graphics: WebRender component * CVE-2026-2762 (bmo#2011649) Integer overflow in the JavaScript: Standard Library component * CVE-2026-2763 (bmo#2012018) Use-after-free in the JavaScript Engine component * CVE-2026-2764 (bmo#2012608) JIT miscompilation, use-after-free in the JavaScript Engine: JIT component * CVE-2026-2765 (bmo#2013562) Use-after-free in the JavaScript Engine component * CVE-2026-2766 (bmo#2013583) Use-after-free in the JavaScript Engine: JIT component * CVE-2026-2767 (bmo#2013741) Use-after-free in the JavaScript: WebAssembly component * CVE-2026-2768 (bmo#2014101) Sandbox escape in the Storage: IndexedDB component * CVE-2026-2769 (bmo#2014550) Use-after-free in the Storage: IndexedDB component * CVE-2026-2770 (bmo#2014585) Use-after-free in the DOM: Bindings (WebIDL) component * CVE-2026-2771 (bmo#2014593) Undefined behavior in the DOM: Core & HTML component * CVE-2026-2772 (bmo#2014827) Use-after-free in the Audio/Video: Playback component * CVE-2026-2773 (bmo#2014832) Incorrect boundary conditions in the Web Audio component * CVE-2026-2774 (bmo#2014883) Integer overflow in the Audio/Video component * CVE-2026-2775 (bmo#2015199) Mitigation bypass in the DOM: HTML Parser component * CVE-2026-2776 (bmo#2015266) Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software * CVE-2026-2777 (bmo#2015305) Privilege escalation in the Messaging System component * CVE-2026-2778 (bmo#2016358) Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component * CVE-2026-2779 (bmo#1164141) Incorrect boundary conditions in the Networking: JAR component * CVE-2026-2780 (bmo#2007829) Privilege escalation in the Netmonitor component * CVE-2026-2781 (bmo#2009552) Integer overflow in the Libraries component in NSS * CVE-2026-2782 (bmo#2010743) Privilege escalation in the Netmonitor component * CVE-2026-2783 (bmo#2010943) Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component * CVE-2026-2784 (bmo#2012984) Mitigation bypass in the DOM: Security component * CVE-2026-2785 (bmo#2013549) Invalid pointer in the JavaScript Engine component * CVE-2026-2786 (bmo#2013612) Use-after-free in the JavaScript Engine component * CVE-2026-2787 (bmo#2014560) Use-after-free in the DOM: Window and Location component * CVE-2026-2788 (bmo#2014824) Incorrect boundary conditions in the Audio/Video: GMP component * CVE-2026-2789 (bmo#2015179) Use-after-free in the Graphics: ImageLib component * CVE-2026-2790 (bmo#2008426) Same-origin policy bypass in the Networking: JAR component * CVE-2026-2791 (bmo#2015220) Mitigation bypass in the Networking: Cache component * CVE-2026-2792 (bmo#2008912, bmo#2010050, bmo#2010275, bmo#2012331) Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 * CVE-2026-2793 (bmo#2015196, bmo#2016423, bmo#2016498) Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148
Manfred Hollstein2026-02-24 14:10:02 +00:00
aaafca3081
Accepting request 1333385 from mozilla:Factory
Ana Guerrero2026-02-17 15:46:04 +00:00
a25d485d43
Accepting request 1286404 from mozilla:Factory
Ana Guerrero2025-06-18 13:56:28 +00:00
d7058e2640
- Use these tools/versions unconditionally, package won't build on Tumbleweed with new gcc15 otherwise: gcc14, gcc14-c++, cargo1.84, rust1.84
Manfred Hollstein2025-06-17 15:00:34 +00:00
f8d5bea9e0
Accepting request 1284035 from mozilla:Factory
Ana Guerrero2025-06-10 07:07:19 +00:00
1c13fa0621
- Add MozillaFirefox.changes.txt as a hard link to firefox-esr.changes - Rename firefox-esr.changes into firefox-esr.changes.txt in order to trick source_validator because of the two possible package names "firefox-esr" vs. "MozillaFirefox" (in Leap).
Manfred Hollstein2024-12-11 17:12:36 +00:00
b1909b4103
- Add MozillaFirefox.changes.txt as a hard link to firefox-esr.changes - Rename firefox-esr.changes into firefox-esr.changes.txt in order to trick source_validator because of the two possible package names "firefox-esr" vs. "MozillaFirefox" (in Leap).
Manfred Hollstein2024-12-11 17:05:12 +00:00
3e73d8ba59
- Mozilla Firefox 68.3.0esr MFSA 2019-37 * CVE-2019-17008 (bmo#1546331) Use-after-free in worker destruction * CVE-2019-13722 (bmo#1580156) Stack corruption due to incorrect number of arguments in WebRTC code * CVE-2019-11745 (bmo#1586176) Out of bounds write in NSS when encrypting with a block cipher * CVE-2019-17009 (bmo#1510494) Updater temporary files accessible to unprivileged processes * CVE-2019-17010 (bmo#1581084) Use-after-free when performing device orientation checks * CVE-2019-17005 (bmo#1584170) Buffer overflow in plain text serializer * CVE-2019-17011 (bmo#1591334) Use-after-free when retrieving a document in antitracking * CVE-2019-17012 (bmo#1449736, bmo#1533957, bmo#1560667, bmo#1567209, bmo#1580288, bmo#1585760, bmo#1592502) Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 * Various updates to improve performance and stability - updated create-tar.sh to cover buildid and origin repo information -> removed obsolete source-stamp.txt - changed locale building procedure * removed obsolete compare-locales.tar.xz
Wolfgang Rosenauer
2019-12-06 23:06:28 +00:00
b2ef5f2a32
- added mozilla-bmo1504834-part4.patch mozilla-bmo849632.patch to fix broken tab-titles on big endian machines - reactivate webRTC for all architectures
Wolfgang Rosenauer
2019-11-19 09:21:36 +00:00
30a662b56b
- Ensure %{ff_esr_name} get tested as a string; also, don't compare against an empty string.
Wolfgang Rosenauer
2019-11-17 06:21:11 +00:00
efae808adf
- Use more portable syntax to check if macro ff_esr_name is defined.
Wolfgang Rosenauer
2019-11-15 07:54:34 +00:00
eba34db196
Accepting request 748737 from home:alarrosa:branches:mozilla:Factory
Wolfgang Rosenauer
2019-11-15 07:52:45 +00:00