Path to this page:
./
www/firefox128,
Web browser with support for extensions (version 128ESR)
Branch: CURRENT,
Version: 128.6.0,
Package name: firefox128-128.6.0,
Maintainer: ryoonMozilla Firefox is a free, open-source and cross-platform web browser
for Windows, Linux, MacOS X and many other operating systems.
It is fast and easy to use, and offers many advantages over other web
browsers, such as tabbed browsing and the ability to block pop-up
windows.
Firefox also offers excellent bookmark and history management, and it
can be extended by developers using industry standards such as XML,
CSS, JavaScript, C++, etc. Many extensions are available.
Note: Due to upstream's trademark policies, this package identifies as
"Nightly" rather than "Firefox" by default.
This package provides Firefox 128 Extended Support Release.
Package options: sunaudio, webrtc
Master sites: (Expand)
Filesize: 550057.73 KB
Version history: (Expand)
- (2025-01-07) Updated to version: firefox128-128.6.0
- (2024-12-31) Updated to version: firefox128-128.5.2
- (2024-12-27) Updated to version: firefox128-128.5.0nb1
- (2024-11-26) Updated to version: firefox128-128.5.0
- (2024-11-17) Updated to version: firefox128-128.4.0nb4
- (2024-11-15) Updated to version: firefox128-128.4.0nb3
CVS history: (Expand)
2025-01-07 18:26:43 by Benny Siegert | Files touched by this commit (4) | |
Log message:
firefox128, firefox128-l10n: update to 128.6.0
Security Vulnerabilities fixed in Firefox ESR 128.6
#CVE-2025-0237: WebChannel APIs susceptible to confused deputy attack
Impact: moderate
The WebChannel API, which is used to transport various information across
processes, did not check the sending principal but rather accepted the
principal being sent. This could have led to privilege escalation attacks.
#CVE-2025-0238: Use-after-free when breaking lines in text
Impact: moderate
Assuming a controlled failed memory allocation, an attacker could have
caused a use-after-free, leading to a potentially exploitable crash.
#CVE-2025-0239: Alt-Svc ALPN validation failure when redirected
Impact: moderate
When using Alt-Svc, ALPN did not properly validate certificates when the
original server is redirecting to an insecure site.
#CVE-2025-0240: Compartment mismatch when parsing JavaScript JSON module
Impact: moderate
Parsing a JavaScript module as JSON could under some circumstances cause
cross-compartment access, which may result in a use-after-free.
#CVE-2025-0241: Memory corruption when using JavaScript Text Segmentation
Impact: moderate
When segmenting specially crafted text, segmentation would corrupt memory
leading to a potentially exploitable crash.
#CVE-2025-0242: Memory safety bugs fixed in Firefox 134, Thunderbird 134,
Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird
128.6
Impact: high
Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18,
Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these
bugs showed evidence of memory corruption and we presume that with enough
effort some of these could have been exploited to run arbitrary code.
#CVE-2025-0243: Memory safety bugs fixed in Firefox 134, Thunderbird 134,
Firefox ESR 128.6, and Thunderbird 128.6
Impact: moderate
Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5,
and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption
and we presume that with enough effort some of these could have been exploited
to run arbitrary code.
|
2024-12-31 05:30:51 by Ryo ONODERA | Files touched by this commit (2) |
Log message:
www/firefox128: Update to 128.5.2
Changelog:
128.5.2:
Fixed
* Fixed a crash experienced by Windows users with Qihoo 360 Total Security
Antivirus software installed (bug 1934258)
128.5.1:
Fixed
* Fixed an issue that prevented some websites from loading when using SSL
Inspection. (bug 1933747)
|
2024-12-27 09:21:09 by Thomas Klausner | Files touched by this commit (1055) |
Log message:
*: recursive bump for pango requiring fontconfig 2.15
|
2024-11-26 19:41:50 by Benny Siegert | Files touched by this commit (3) | |
Log message:
firefox128: update to 128.5.0
Security Vulnerabilities fixed in Firefox ESR 128.5
#CVE-2024-11691: Memory corruption in Apple GPU drivers
Impact: high
An attacker could have caused memory corruption due to a flaw in Apple's GPU
driver; this can be avoided by working around the flaw.
Note: This issue only affected macOS operating systems. Other operating systems
are unaffected.
#CVE-2024-11692: Select list elements could be shown over another site
Impact: moderate
An attacker could cause a select dropdown to be shown over another tab; this
could have led to user confusion and possible spoofing attacks.
#CVE-2024-11693: Download Protections were bypassed by .library-ms files on
Windows
Impact: moderate
The executable file warning was not presented when downloading .library-ms
files.
Note: This issue only affected Windows operating systems. Other operating
systems are unaffected.
#CVE-2024-11694: CSP Bypass and XSS Exposure via Web Compatibility Shims
Impact: moderate
Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP
frame-src bypass and DOM-based XSS through the Google SafeFrame shim in the Web
Compatibility extension. This issue could have exposed users to malicious
frames masquerading as legitimate content.
#CVE-2024-11695: URL Bar Spoofing via Manipulated Punycode and Whitespace
Characters
Impact: moderate
A crafted URL containing Arabic script and whitespace characters could have
hidden the true origin of the page, resulting in a potential spoofing attack.
#CVE-2024-11696: Unhandled Exception in Add-on Signature Verification
Impact: moderate
The application failed to account for exceptions thrown by the
loadManifestFromFile method during add-on signature verification. This flaw,
triggered by an invalid or unsupported extension manifest, could have caused
runtime errors that disrupted the signature validation process. As a result,
the enforcement of signature validation for unrelated add-ons may have been
bypassed. Signature validation in this context is used to ensure that
third-party applications on the user's computer have not tampered with the
user's extensions, limiting the impact of this issue.
#CVE-2024-11697: Improper Keypress Handling in Executable File Confirmation
Dialog
Impact: low
When handling keypress events, an attacker may have been able to trick a user
into bypassing the "Open Executable File?" confirmation dialog. This \
could have
led to malicious code execution.
#CVE-2024-11698: Fullscreen Lock-Up When Modal Dialog Interrupts Transition on
macOS
Impact: low
A flaw in handling fullscreen transitions may have inadvertently caused the
application to become stuck in fullscreen mode when a modal dialog was opened
during the transition. This issue left users unable to exit fullscreen mode
using standard actions like pressing "Esc" or accessing right-click menus,
resulting in a disrupted browsing experience until the browser is restarted.
This bug only affects the application when running on macOS. Other operating
systems are unaffected.
#CVE-2024-11699: Memory safety bugs fixed in Firefox 133, Firefox ESR 128.5,
and Thunderbird 128.5
Impact: high
Memory safety bugs present in Firefox 132, Firefox ESR 128.4, and Thunderbird
128.4. Some of these bugs showed evidence of memory corruption and we presume
that with enough effort some of these could have been exploited to run
arbitrary code.
|
2024-11-17 08:17:06 by Thomas Klausner | Files touched by this commit (944) |
Log message:
*: recursive bump for default-on option of at-spi2-core
|
2024-11-14 23:22:33 by Thomas Klausner | Files touched by this commit (2429) |
Log message:
*: recursive bump for icu 76 shlib major version bump
|
2024-11-01 13:55:19 by Thomas Klausner | Files touched by this commit (2426) |
Log message:
*: revbump for icu downgrade
|
2024-11-01 01:54:33 by Thomas Klausner | Files touched by this commit (2427) |
Log message:
*: recursive bump for icu 76.1 shlib bump
|