Mozilla Firefox Web Browser
Mozilla Firefox is a standalone web browser, designed for standards
compliance and performance. Its functionality can be enhanced via a
plethora of extensions.
- Developed at mozilla:Factory
- Sources inherited from project openSUSE:Factory
-
13
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP5:FactoryCandidates/MozillaFirefox && cd $_
- Create Badge
Refresh
Refresh
Source Files
Revision 354 (latest revision is 440)
Dominique Leuenberger (dimstar_suse)
accepted
request 945699
from
Wolfgang Rosenauer (wrosenauer)
(revision 354)
- Mozilla Firefox 96.0 * https://www.mozilla.org/en-US/firefox/96.0/releasenotes MFSA 2022-01 (bsc#1194547) * CVE-2022-22746 (bmo#1735071) Calling into reportValidity could have lead to fullscreen window spoof * CVE-2022-22743 (bmo#1739220) Browser window spoof using fullscreen mode * CVE-2022-22742 (bmo#1739923) Out-of-bounds memory access when inserting text in edit mode * CVE-2022-22741 (bmo#1740389) Browser window spoof using fullscreen mode * CVE-2022-22740 (bmo#1742334) Use-after-free of ChannelEventQueue::mOwner * CVE-2022-22738 (bmo#1742382) Heap-buffer-overflow in blendGaussianBlur * CVE-2022-22737 (bmo#1745874) Race condition when playing audio files * CVE-2021-4140 (bmo#1746720) Iframe sandbox bypass with XSLT * CVE-2022-22750 (bmo#1566608) IPC passing of resource handles could have lead to sandbox bypass * CVE-2022-22749 (bmo#1705094) Lack of URL restrictions when scanning QR codes * CVE-2022-22748 (bmo#1705211) Spoofed origin on external protocol launch dialog * CVE-2022-22745 (bmo#1735856) Leaking cross-origin URLs through securitypolicyviolation event
Comments 1
There is a bug with this package, specific to OpenSUSE Wayland sessions. Please see https://bugzilla.opensuse.org/show_bug.cgi?id=1215137, Which refers to https://bugzilla.mozilla.org/show_bug.cgi?id=1851505 and https://bugzilla.mozilla.org/show_bug.cgi?id=1851503
Thanks for any help with this.