Commit Graph

75 Commits

Author SHA1 Message Date
Stig Palmquist
728b984d57
firefox-bin: 81.0.2 -> 82.0 2020-10-25 01:22:03 +02:00
taku0
68a9d42e0d firefox-bin: 81.0 -> 81.0.2 2020-10-13 22:17:10 +09:00
taku0
3ad81fd022 firefox-bin: 80.0.1 -> 81.0 2020-09-22 13:49:18 +09:00
Stig Palmquist
197799c263
firefox-bin: 80.0 -> 80.0.1 2020-09-04 12:38:23 +02:00
Atemu
b12ca077c0
firefox-bin: 79.0 -> 80.0 (#96279) 2020-08-29 21:17:20 +02:00
taku0
2409432f74 firefox-bin: 78.0.2 -> 79.0 2020-07-30 19:39:16 +09:00
adisbladis
29c38efa84
firefox-bin: 78.0.1 -> 78.0.2 2020-07-14 22:03:14 +02:00
ajs124
48a2ea4d39
firefox-bin: 77.0.1 -> 78.0.1 (PR #92043) 2020-07-05 16:25:58 +02:00
ajs124
1bc740008b
firefox-bin: 76.0 -> 77.0.1 (security)
PR #89438.
2020-06-12 21:10:11 +02:00
Andreas Rammhold
5040192913
firefox-bin: 75.0 -> 76.0
Discussion: https://github.com/NixOS/nixpkgs/pull/86788
2020-05-06 11:41:38 +02:00
Andreas Rammhold
bab82e78b2
firefox-bin: 74.0.1 -> 75.0 2020-04-07 13:27:27 +02:00
Andreas Rammhold
87abb48dc2
firefox-bin: 74.0 -> 74.0.1 2020-04-03 22:11:37 +02:00
Daniel Frank
8899c72990
firefox-bin: 73.0 -> 74.0 (from PR #82257) 2020-03-12 10:43:56 +01:00
Andreas Rammhold
11920736e8 firefox-bin: 72.0.3 -> 73.0 2020-02-11 01:19:26 +01:00
taku0
7187891a17 firefox-bin: 72.0.1 -> 72.0.2 2020-01-21 19:55:44 +09:00
Daniel Frank
0271b2c9a0 firefox-bin: 72.0 -> 72.0.1 [security] CVE-2019-17026 2020-01-09 15:02:34 +01:00
Andreas Rammhold
1064ac96b9 firefix-bin: 71.0 -> 72.0 2020-01-08 14:48:30 +01:00
Andreas Rammhold
ba1acd2f0c
firefox-bin: 70.0.1 -> 71.0 2019-12-03 12:10:06 +01:00
taku0
14282e91ef firefox-bin: 70.0 -> 70.0.1 2019-10-31 21:25:37 +09:00
taku0
dc6ea54007 firefox-bin: 69.0.2 -> 70.0 2019-10-22 13:49:56 +09:00
taku0
d274d95cef firefox-bin: 69.0.1 -> 69.0.2 2019-10-05 18:43:58 +09:00
taku0
ae20db1f21 firefox-bin: 69.0 -> 69.0.1 2019-09-19 21:43:32 +09:00
Andreas Rammhold
91c7f8b99f
firefox-bin: 68.0.2 -> 69.0 2019-09-03 08:49:00 +02:00
Andreas Rammhold
17843aa025
firefox-bin: 68.0.1 -> 68.0.2 2019-08-16 23:08:08 +02:00
taku0
835027f601 firefox-bin: 68.0 -> 68.0.1 2019-07-24 16:15:47 +09:00
taku0
ac31e53b01 firefox-bin: 67.0.4 -> 68.0 2019-07-10 23:24:53 +09:00
Alyssa Ross
658d00efc9
firefox-bin: 67.0.3 -> 67.0.4
CVE-2019-11708
2019-06-20 19:22:00 +00:00
Alyssa Ross
994a67da86
firefox-bin: 67.0.2 -> 67.0.3
CVE-2019-11707
2019-06-18 19:42:49 +00:00
Will Dietz
762f89d157
firefox: 67.0.1 -> 67.0.2 2019-06-11 23:45:56 -05:00
Andreas Rammhold
d134af3aba
firefox-bin: 67.0 -> 67.0.1 2019-06-08 17:54:58 +02:00
Andreas Rammhold
140096b91f
firefox-bin: 66.0.5 -> 67.0 2019-05-21 07:51:28 +02:00
Andreas Rammhold
f7b51927c3 firefox-bin: 66.0.4 -> 66.0.5 2019-05-08 11:39:39 +02:00
taku0
ad042f186f firefox-bin: 66.0.3 -> 66.0.4 2019-05-06 13:31:28 +09:00
taku0
7b49c78dad firefox-bin: 66.0.2 -> 66.0.3 2019-04-13 10:37:34 +09:00
Andreas Rammhold
6977980927
firefox-bin: 66.0.1 -> 66.0.2 2019-03-29 10:36:47 +01:00
Andreas Rammhold
bf0715aeb8
firefox-bin: 66.0 -> 66.0.1 2019-03-23 01:44:26 +01:00
Andreas Rammhold
a1cd934ba3
firefox-bin: 65.0.2 -> 66.0 2019-03-18 17:18:46 +01:00
taku0
03bbab8540 firefox-bin: 65.0 -> 65.0.2 2019-03-01 22:50:56 +09:00
Andreas Rammhold
58c657bf6d
firefox-bin: 64.0.2 -> 65.0 2019-01-29 21:52:31 +01:00
taku0
244f1ce1a7 firefox-bin: 64.0 -> 64.0.2 2019-01-10 20:04:21 +09:00
Andreas Rammhold
536d0cc3a7
firefox-bin: 63.0.3 -> 64.0
See #51863.
2018-12-12 00:26:03 +01:00
taku0
fa138b55a6 firefox-bin: 63.0.1 -> 63.0.3 2018-11-16 03:12:13 +09:00
Michael Raskin
213407d471 firefox-bin: 63.0 -> 63.0.1 2018-11-08 20:23:33 +03:00
Andreas Rammhold
5137c04770
firefox-bin: 62.0.3 -> 63.0 2018-10-23 10:15:48 +02:00
Andreas Rammhold
64d02660cb
firefox-bin: 62.0.2 -> 62.0.3 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:35:54 +02:00
taku0
5b79f81a39 firefox-bin: 61.0.2 -> 62.0.2 2018-09-22 03:12:20 +09:00
taku0
12723b105c firefox-bin: 61.0.2 -> 62.0 2018-09-04 21:13:35 +09:00
taku0
106c654af3 firefox-bin: 61.0.1 -> 61.0.2 2018-08-09 03:12:15 +09:00
taku0
ea94258886
firefox-bin: 61.0 -> 61.0.1 2018-07-06 20:30:51 +02:00
Vladimír Čunát
2f4001f41a
Merge #42729: firefox-61 and related updates (security)
(cherry picked from commit 8ad921dc94)
Fast-forwarded to get to master sooner.
2018-06-29 20:58:13 +02:00