Mozilla Firefox Web Browser
Mozilla Firefox is a standalone web browser, designed for standards
compliance and performance. Its functionality can be enhanced via a
plethora of extensions.
- Developed at mozilla:Factory
- Sources inherited from project openSUSE:Factory
-
14
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP5:FactoryCandidates/MozillaFirefox && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
MozillaFirefox-rpmlintrc | 0000000029 29 Bytes | |
MozillaFirefox.changes | 0000289286 283 KB | |
MozillaFirefox.desktop | 0000000482 482 Bytes | |
MozillaFirefox.spec | 0000023846 23.3 KB | |
_constraints | 0000000847 847 Bytes | |
compare-locales.tar.xz | 0000028536 27.9 KB | |
create-tar.sh | 0000008625 8.42 KB | |
firefox-68.1.0esr.source.tar.xz | 0312155752 298 MB | |
firefox-68.1.0esr.source.tar.xz.asc | 0000000833 833 Bytes | |
firefox-add-kde.js-in-order-to-survive-PGO-build.p |
0000001056 1.03 KB | |
firefox-appdata.xml | 0000002171 2.12 KB | |
firefox-branded-icons.patch | 0000001877 1.83 KB | |
firefox-kde.patch | 0000085127 83.1 KB | |
firefox-mimeinfo.xml | 0000000292 292 Bytes | |
firefox.1 | 0000003244 3.17 KB | |
firefox.js | 0000000181 181 Bytes | |
google-api-key | 0000000040 40 Bytes | |
kde.js | 0000000049 49 Bytes | |
l10n-68.1.0esr.tar.xz | 0049123892 46.8 MB | |
mozilla-aarch64-startup-crash.patch | 0000000791 791 Bytes | |
mozilla-api-key | 0000000033 33 Bytes | |
mozilla-bmo1005535.patch | 0000000934 934 Bytes | |
mozilla-bmo1463035.patch | 0000002514 2.46 KB | |
mozilla-bmo1568145.patch | 0000001078 1.05 KB | |
mozilla-cubeb-noreturn.patch | 0000000592 592 Bytes | |
mozilla-disable-wasm-emulate-arm-unaligned-fp-acce |
0000000420 420 Bytes | |
mozilla-fix-aarch64-libopus.patch | 0000000842 842 Bytes | |
mozilla-get-app-id | 0000001123 1.1 KB | |
mozilla-kde.patch | 0000083519 81.6 KB | |
mozilla-nongnome-proxies.patch | 0000001442 1.41 KB | |
mozilla-ntlm-full-path.patch | 0000001159 1.13 KB | |
mozilla-openaes-decl.patch | 0000000906 906 Bytes | |
mozilla-ppc-altivec_static_inline.patch | 0000000821 821 Bytes | |
mozilla-reduce-rust-debuginfo.patch | 0000001498 1.46 KB | |
mozilla-s390-bigendian.patch | 0000000753 753 Bytes | |
mozilla-s390-context.patch | 0000001297 1.27 KB | |
mozilla.keyring | 0000021058 20.6 KB | |
mozilla.sh.in | 0000004387 4.28 KB | |
source-stamp.txt | 0000000095 95 Bytes | |
spellcheck.js | 0000000060 60 Bytes | |
tar_stamps | 0000000261 261 Bytes |
Revision 294 (latest revision is 437)
Dominique Leuenberger (dimstar_suse)
accepted
request 728229
from
Wolfgang Rosenauer (wrosenauer)
(revision 294)
Due to release timing and vacation time as well as security considerations Tumbleweed is getting 68.1esr as intermediate before switching back to regular and release 69. - Mozilla Firefox 68.1.0 MFSA 2019-26 * CVE-2019-11751 (bmo#1572838; Windows only) Malicious code execution through command line parameters * CVE-2019-11746 (bmo#1564449) Use-after-free while manipulating video * CVE-2019-11744 (bmo#1562033) XSS by breaking out of title and textarea elements using innerHTML * CVE-2019-11742 (bmo#1559715) Same-origin policy violation with SVG filters and canvas to steal cross-origin images * CVE-2019-11736 (bmo#1551913, bmo#1552206; Windows only)) File manipulation and privilege escalation in Mozilla Maintenance Service * CVE-2019-11753 (bmo#1574980; Windows only) Privilege escalation with Mozilla Maintenance Service in custom Firefox installation location * CVE-2019-11752 (bmo#1501152) Use-after-free while extracting a key value in IndexedDB * CVE-2019-9812 (bmo#1538008, bmo#1538015) Sandbox escape through Firefox Sync * CVE-2019-11743 (bmo#1560495) Cross-origin access to unload event attributes * CVE-2019-11748 (bmo#1564588) Persistence of WebRTC permissions in a third party context * CVE-2019-11749 (bmo#1565374) Camera information available without prompting using getUserMedia * CVE-2019-11750 (bmo#1568397) Type confusion in Spidermonkey * CVE-2019-11738 (bmo#1452037) Content security policy bypass through hash-based sources in directives
Comments 1
There is a bug with this package, specific to OpenSUSE Wayland sessions. Please see https://bugzilla.opensuse.org/show_bug.cgi?id=1215137, Which refers to https://bugzilla.mozilla.org/show_bug.cgi?id=1851505 and https://bugzilla.mozilla.org/show_bug.cgi?id=1851503
Thanks for any help with this.