1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-01-22 14:45:27 +00:00
Commit graph

124 commits

Author SHA1 Message Date
Andreas Rammhold 94d9400b4d
firefox-esr-60: 60.5.2esr -> 60.6.0.esr 2019-03-18 17:27:29 +01:00
Andreas Rammhold dafe9c3cb0
firefox: 65.0.2 -> 66.0 2019-03-18 17:18:44 +01:00
Jan Tojnar a92a1ae908
firefox-esr-52: remove updateScript
This is dead package so let’s remove the updateScript which does not evaluate anyway.
2019-03-17 17:39:20 +01:00
taku0 692a763f60 firefox-esr: 60.5.1esr -> 60.5.2esr 2019-03-01 22:57:53 +09:00
taku0 d59a40c3b0 firefox: 65.0.1 -> 65.0.2 2019-03-01 22:53:35 +09:00
Joachim F e9d97c223e
Merge pull request #55738 from oxij/pkgs/tor-browser-update
firefoxPackages.tor-browser: 8.0.5 -> 8.0.6
2019-02-14 19:00:57 +00:00
Andreas Rammhold 826611bef9 firefox: add andir (myself) as maintainer
I have been working on this for some time now so it probably makes
sense...
2019-02-14 11:28:34 +01:00
Andreas Rammhold 2f4c7f3f92 firefox-esr-60: 60.5.0esr -> 60.5.1esr
Release notes: https://www.mozilla.org/en-US/firefox/60.5.1/releasenotes/
2019-02-14 11:28:34 +01:00
Andreas Rammhold aa2acd0123 firefox: 65.0 -> 65.0.1
Release notes: https://www.mozilla.org/en-US/firefox/65.0.1/releasenotes/
2019-02-14 11:28:34 +01:00
SLNOS 9e65251afe firefoxPackages.tor-browser: 8.0.5 -> 8.0.6 2019-02-13 23:00:48 +00:00
Jan Malakhovski 26f6fabcfe firefoxPackages: move nixpkgsPatches into common.nix 2019-01-31 17:02:52 +00:00
Jan Malakhovski e11586f69f firefoxPackages.tor-browser: fix meta 2019-01-31 17:02:52 +00:00
Jan Malakhovski afd0929f6c firefoxPackages: add a comments explaining the purpose of older versions 2019-01-31 17:02:52 +00:00
SLNOS 86a0112d59 firefoxPackages.tor-browser: 8.0.4 -> 8.0.5 2019-01-31 17:02:51 +00:00
SLNOS 7d9812e158 firefoxPackages.tor-browser: 8.0.3 -> 8.0.4 2019-01-31 17:02:51 +00:00
SLNOS ff6cc1ac0e firefoxPackages.icecat: init at 60.3.0, 52.6.0
It works, but this state is far from ideal: GNU guys update generated source
tarballs very infrequently. Ideally, src needs to be generated by running
makeicecat over firefox src. Will do later.
2019-01-31 17:02:45 +00:00
Andreas Rammhold 10024f2ad1
firefoxPackages.firefox-esr-60: 60.4.0esr -> 60.5.0esr 2019-01-30 01:25:51 +01:00
Andreas Rammhold cb7f7364a4 firefox: 64.0.2 -> 65.0
There have been some more changes to the source tree which broke the
buildconfig patch. This commit adds another patch that can be used for
the future versions. Once all the flavors are based off a new(ish)
firefox release we can remove the old patch.
2019-01-29 20:30:42 +01:00
taku0 08f779a9c3 firefox: 64.0 -> 64.0.2 2019-01-10 20:16:21 +09:00
Andreas Rammhold ccd160023c
firefox: 63.0.3 -> 64.0
See #51863.
2018-12-12 11:27:23 +01:00
Andreas Rammhold d16d0b3762
firefox-esr-60: 60.3.0esr -> 60.4.0esr
See #51863.
2018-12-12 00:25:57 +01:00
taku0 917309fa62 firefox: 63.0.1 -> 63.0.3 2018-11-16 23:14:14 +09:00
taku0 4bb9af228e common-updater, firefox: fix updater for firefox 2018-11-16 23:04:54 +09:00
Andreas Rammhold 66e16843b3
firefox: apply patch for newer rust-cbindgen
rust-cbindgen did apply some breaking changes which requires the added
patch in order to compile until a firefox version with the fix gets
released. Firefox 63.0.3 is supposed to carry the required patches. This
should only be required for a short term.
2018-11-14 20:51:19 +01:00
Michael Raskin 108de151f8 firefox: 63.0 -> 63.0.1; firefox-esr: 60.2.2esr -> 60.3.0esr 2018-11-08 20:23:33 +03:00
Andreas Rammhold c8d45086d1
firefox-esr-60: drop skia patch on aarch64 2018-11-07 16:47:24 +01:00
Matthew Harm Bekkema 9973a266ab firefox-esr-60: 60.2.2 -> 60.3.0 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12392: Crash with nested event loops
  When manipulating user events in nested loops while opening a document
  through script, it is possible to trigger a potentially exploitable
  crash due to poor event handling.

- CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript
  A potential vulnerability was found in 32-bit builds where an integer
  overflow during the conversion of scripts to an internal UTF-16
  representation could result in allocating a buffer too small for the
  conversion. This leads to a possible out-of-bounds write.
  Note: 64-bit builds are not vulnerable to this issue.

- CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting
  By rewriting the Host request headers using the webRequest API, a
  WebExtension can bypass domain restrictions through domain fronting.
  This would allow access to domains that share a host that are
  otherwise restricted.

- CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts
  A vulnerability where a WebExtension can run content scripts in
  disallowed contexts following navigation or other events. This allows
  for potential privilege escalation by the WebExtension on sites where
  content scripts should not be run.

- CVE-2018-12397: Missing warning prompt when WebExtension requests local file access
  A WebExtension can request access to local files without the warning
  prompt stating that the extension will "Access your data for all
  websites" being displayed to the user. This allows extensions to run
  content scripts in local pages without permission warnings when a
  local file is opened.

- CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3
  Mozilla developers and community members Daniel Veditz and Philipp
  reported memory safety bugs present in Firefox ESR 60.2. Some of these
  bugs showed evidence of memory corruption and we presume that with
  enough effort that some of these could be exploited to run arbitrary
  code.

- CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3
  Mozilla developers and community members Christian Holler, Bob Owen,
  Boris Zbarsky, Calixte Denizet, Jason Kratzer, Jed Davis, Taegeon Lee,
  Philipp, Ronald Crane, Raul Gurzau, Gary Kwong, Tyson Smith, Raymond
  Forbes, and Bogdan Tara reported memory safety bugs present in Firefox
  62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory
  corruption and we presume that with enough effort that some of these
  could be exploited to run arbitrary code.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-27/
2018-11-03 22:51:36 +11:00
Joachim F 3272b9a2e9
Merge pull request #49173 from oxij/pkgs/update-tor-browser-again
firefoxPackages.tor-browser: 8.0.2 -> 8.0.3
2018-10-29 09:54:17 +00:00
SLNOS 87d0fe0049 firefoxPackages.tor-browser: 8.0.2 -> 8.0.3 2018-10-26 18:02:05 +00:00
Andreas Rammhold 277da59e47
firefox: 62.0.3 -> 63.0 2018-10-23 10:15:46 +02:00
SLNOS 0e3df42d64 firefoxPackages.tor-browser-8-0: apply a fix from bugzilla 2018-10-21 19:18:28 +00:00
SLNOS bd7c0c8a6c firefoxPackages.tor-browser: 7.5.6 -> 8.0.2
Mostly usable now.
2018-10-19 16:46:55 +00:00
SLNOS b21b9bbd6c firefoxPackages: indent 2018-10-19 16:46:41 +00:00
SLNOS 5ec27f3033 firefoxPackages: cleanup
Misc cleanups, but mainly this:

Before:
- `version` could mean either Firefox or TorBrowser version,
- `configureFlags` was hacky.

Now:
- `ffversion` is Firefox version, `tbversion` is TorBrowser version,
- `configureFlags` is much less hacky.
2018-10-19 16:46:28 +00:00
Andreas Rammhold 246d2848ff
firefox-esr-60: 60.2.1 -> 60.2.2 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:51:13 +02:00
Andreas Rammhold e7785f1148
firefox: 62.0.2 -> 62.0.3 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:51:13 +02:00
taku0 e5778a9991 firefox-esr: 60.2.0esr -> 60.2.1esr 2018-09-24 09:13:03 +09:00
taku0 da9823672f firefox: 61.0.2 -> 62.0.2 2018-09-22 03:13:50 +09:00
taku0 0a3f07077b firefox-esr: 60.1.0esr -> 60.2.0esr, mark 52.9.0esr insecure 2018-09-07 08:14:48 +09:00
taku0 26cbfe1035 firefox: 61.0.2 -> 62.0 2018-09-04 21:16:46 +09:00
Vladimír Čunát ded9a4b1aa
Merge branch 'staging-next' into staging
Commits from master, conflict resolutions, etc.
2018-08-13 20:57:50 +02:00
Matthew Bauer 0edb441a0e firefox: build on darwin
Fixes #30285
2018-08-11 22:54:48 -05:00
Vladimír Čunát 838d63eced
Merge #44885: firefox*: 61.0.1 -> 61.0.2 2018-08-11 19:47:02 +02:00
taku0 743677310a firefox: 61.0.1 -> 61.0.2 2018-08-09 03:13:10 +09:00
Matthew Bauer c6d55e92bb firefoxPackages: add licenses
tor-browser is bsd3
firefox is mpl20
2018-08-06 10:15:59 -04:00
volth 52f53c69ce pkgs/*: remove unreferenced function arguments 2018-07-21 02:48:04 +00:00
taku0 09918a6570
firefox: 61.0 -> 61.0.1 2018-07-06 20:30:51 +02:00
SLNOS 3b7d8d83e8 tor-browser: 52.8.1esr-7.5-1 -> 52.9.0esr-7.5-2 2018-07-02 02:39:36 +00:00
Vladimír Čunát 2f4001f41a
Merge #42729: firefox-61 and related updates (security)
(cherry picked from commit 8ad921dc94)
Fast-forwarded to get to master sooner.
2018-06-29 20:58:13 +02:00
Orivej Desh 7f3de60758 Merge branch 'master' into staging
* master: (161 commits)
  pcsclite: clean up after #41790
  tor: 0.3.3.6 -> 0.3.3.7
  opae: init at 1.0.0
  tinc: 1.0.33 -> 10.0.34
  tinc_pre: 1.1pre15 -> 1.1pre16
  sit: 0.3.2 -> 0.4.0 (#41863)
  platforms/raspberrypi: enable kernelAutoModules
  libupnp: 1.6.21 -> 1.8.3 (#41684)
  androidStudioPackages.{dev,canary}: 3.2.0.16 -> 3.2.0.17
  tdesktop: 1.3.0 -> 1.3.7
  gns3Packages.{server,gui}{Stable,Preview}: 2.1.6 -> 2.1.7
  aws-sam-cli: init at 0.3.0 (#41877)
  nixos/nat: optional networking.nat.externalInterface (#41864)
  linux: 4.17 -> 4.17.1
  linux: 4.16.14 -> 4.16.15
  linux: 4.14.48 -> 4.14.49
  nixos/unbound: add restart (#41885)
  maintainers/create-azure.sh: remove hydra.nixos.org as binary cache (#41883)
  gshogi: init at 0.5.1 (#41840)
  neovim: add missing libiconv
  ...
2018-06-12 20:41:41 +00:00