xulrunner
No description set
- Sources inherited from project openSUSE:Leap:42.1
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Leap:42.1:Ports/xulrunner && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_constraints | 0000000208 208 Bytes | |
baselibs.conf | 0000000056 56 Bytes | |
compare-locales.tar.xz | 0000028416 27.8 KB | |
create-tar.sh | 0000001764 1.72 KB | |
find-external-requires.sh | 0000000275 275 Bytes | |
l10n-38.3.0.tar.xz | 0042103044 40.2 MB | |
mozilla-add-glibcxx_use_cxx11_abi.patch | 0000001221 1.19 KB | |
mozilla-arm-disable-edsp.patch | 0000000815 815 Bytes | |
mozilla-arm64-libjpeg-turbo.patch | 0000000984 984 Bytes | |
mozilla-bmo1005535.patch | 0000005381 5.25 KB | |
mozilla-icu-strncat.patch | 0000001351 1.32 KB | |
mozilla-idldir.patch | 0000000961 961 Bytes | |
mozilla-language.patch | 0000001714 1.67 KB | |
mozilla-nongnome-proxies.patch | 0000001779 1.74 KB | |
mozilla-ntlm-full-path.patch | 0000000897 897 Bytes | |
mozilla-pkgconfig.patch | 0000002954 2.88 KB | |
mozilla-prefer_plugin_pref.patch | 0000001979 1.93 KB | |
mozilla-preferences.patch | 0000001648 1.61 KB | |
mozilla-repo.patch | 0000001545 1.51 KB | |
mozilla-shared-nss-db.patch | 0000004717 4.61 KB | |
mozilla-skia-be-le.patch | 0000001964 1.92 KB | |
source-stamp.txt | 0000000067 67 Bytes | |
spellcheck.js | 0000000060 60 Bytes | |
toolkit-download-folder.patch | 0000002511 2.45 KB | |
xulrunner-38.3.0-source.tar.xz | 0155497288 148 MB | |
xulrunner-openSUSE-prefs.js | 0000000133 133 Bytes | |
xulrunner-rpmlintrc | 0000000029 29 Bytes | |
xulrunner.changes | 0000033414 32.6 KB | |
xulrunner.spec | 0000019045 18.6 KB |
Latest Revision
Stephan Kulow (coolo)
accepted
request 333415
from
Wolfgang Rosenauer (wrosenauer)
(revision 3)
same SR exists for Factory. Due to its security nature I didn't want to wait until Factory acceptance - update to xulrunner 38.3.0 (bnc#947003) * MFSA 2015-96/CVE-2015-4500 Miscellaneous memory safety hazards * MFSA 2015-100/CVE-2015-4505 (bmo#1177861) (Windows only) Arbitrary file manipulation by local user through Mozilla updater * MFSA 2015-101/CVE-2015-4506 (bmo#1192226) Buffer overflow in libvpx while parsing vp9 format video * MFSA 2015-105/CVE-2015-4511 (bmo#1200148) Buffer overflow while decoding WebM video * MFSA 2015-106/CVE-2015-4509 (bmo#1198435) Use-after-free while manipulating HTML media content * MFSA 2015-110/CVE-2015-4519 (bmo#1189814) Dragging and dropping images exposes final URL after redirects * MFSA 2015-111/CVE-2015-4520 (bmo#1200856, bmo#1200869) Errors in the handling of CORS preflight request headers * MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522/ CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177/ CVE-2015-7180 Vulnerabilities found through code inspection * MFSA 2015-113/CVE-2015-7178/CVE-2015-7179 (bmo#1189860, bmo#1190526) (Windows only) Memory safety errors in libGLES in the ANGLE graphics library
Comments 0