<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>49990</bug_id>
          
          <creation_ts>2024-04-11 13:33:24 +0300</creation_ts>
          <short_desc>Описание пакета устарело</short_desc>
          <delta_ts>2024-04-23 15:57:16 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>firefox</component>
          <version>unstable</version>
          <rep_platform>x86_64</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P5</priority>
          <bug_severity>enhancement</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Sergey V Turchin">zerg</reporter>
          <assigned_to name="Ajrat Makhmutov">ajratma</assigned_to>
          <cc>ajratma</cc>
    
    <cc>legion</cc>
    
    <cc>rauty</cc>
    
    <cc>sbolshakov</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>244544</commentid>
    <comment_count>0</comment_count>
    <who name="Sergey V Turchin">zerg</who>
    <bug_when>2024-04-11 13:33:24 +0300</bug_when>
    <thetext>Обновить бы, а то уже давно не XUL.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>244624</commentid>
    <comment_count>1</comment_count>
    <who name="Ajrat Makhmutov">ajratma</who>
    <bug_when>2024-04-12 11:52:12 +0300</bug_when>
    <thetext>Ок, изменю его на: &quot;Mozilla Firefox is a free open-source browser whose development is overseen by the Mozilla Corporation&quot;. Взял с https://developer.mozilla.org/en-US/docs/Glossary/Mozilla_Firefox.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>244626</commentid>
    <comment_count>2</comment_count>
    <who name="Sergey V Turchin">zerg</who>
    <bug_when>2024-04-12 12:04:46 +0300</bug_when>
    <thetext>Предлагаю из Fedora, как более нейтральное:
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>244627</commentid>
    <comment_count>3</comment_count>
    <who name="Ajrat Makhmutov">ajratma</who>
    <bug_when>2024-04-12 12:16:54 +0300</bug_when>
    <thetext>Ок.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>245240</commentid>
    <comment_count>4</comment_count>
    <who name="Repository Robot">repository-robot</who>
    <bug_when>2024-04-23 15:57:16 +0300</bug_when>
    <thetext>firefox-125.0.1-alt1 -&gt; sisyphus:

 Wed Apr 17 2024 Ajrat Makhmutov &lt;rauty@altlinux&gt; 125.0.1-alt1
 - New version (125.0.1).
 - Update description (closes: 49990).
 - Enable VAAPI.
 - Security fixes:
   + CVE-2024-3852: GetBoundName in the JIT returned the wrong object
   + CVE-2024-3853: Use-after-free if garbage collection runs during realm initialization
   + CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement
   + CVE-2024-3855: Incorrect JIT optimization of MSubstr leads to out-of-bounds reads
   + CVE-2024-3856: Use-after-free in WASM garbage collection
   + CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during garbage collection
   + CVE-2024-3858: Corrupt pointer dereference in js::CheckTracedThing&lt;js::Shape&gt;
   + CVE-2024-3859: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer
   + CVE-2024-3860: Crash when tracing empty shape lists
   + CVE-2024-3861: Potential use-after-free due to AlignedBuffer self-move
   + CVE-2024-3862: Potential use of uninitialized memory in MarkStack assignment operator on self-assignment
   + CVE-2024-3863: Download Protections were bypassed by .xrm-ms files on Windows
   + CVE-2024-3302: Denial of Service using HTTP/2 CONTINUATION frames
   + CVE-2024-3864: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
   + CVE-2024-3865: Memory safety bugs fixed in Firefox 125</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>