# HG changeset patch # User Wolfgang Rosenauer # Date 1422180738 -3600 # Node ID 3caf8b25f1460bb178c3271254cc14c60868bf1c # Parent 5551f1ff7e1d7c5832c883fde9fa1172592a9951# Parent 677ef48cf29b3291c66cd3a7b2e8c9fa8a65076f merge from ff35 diff -r 677ef48cf29b -r 3caf8b25f146 MozillaFirefox/MozillaFirefox.changes --- a/MozillaFirefox/MozillaFirefox.changes Sat Jan 10 19:39:02 2015 +0100 +++ b/MozillaFirefox/MozillaFirefox.changes Sun Jan 25 11:12:18 2015 +0100 @@ -2,6 +2,30 @@ Sat Jan 10 18:36:37 UTC 2015 - wr@rosenauer.org - update to Firefox 35.0 (bnc#910669) + notable features: + * Firefox Hello with new rooms-based conversations model + * Implemented HTTP Public Key Pinning Extension (for enhanced + authentication of encrypted connections) + security fixes: + * MFSA 2015-01/CVE-2014-8634/CVE-2014-8635 + Miscellaneous memory safety hazards + * MFSA 2015-02/CVE-2014-8637 (bmo#1094536) + Uninitialized memory use during bitmap rendering + * MFSA 2015-03/CVE-2014-8638 (bmo#1080987) + sendBeacon requests lack an Origin header + * MFSA 2015-04/CVE-2014-8639 (bmo#1095859) + Cookie injection through Proxy Authenticate responses + * MFSA 2015-05/CVE-2014-8640 (bmo#1100409) + Read of uninitialized memory in Web Audio + * MFSA 2015-06/CVE-2014-8641 (bmo#1108455) + Read-after-free in WebRTC + * MFSA 2015-07/CVE-2014-8643 (bmo#1114170) (Windows-only) + Gecko Media Plugin sandbox escape + * MFSA 2015-08/CVE-2014-8642 (bmo#1079658) + Delegated OCSP responder certificates failure with + id-pkix-ocsp-nocheck extension + * MFSA 2015-09/CVE-2014-8636 (bmo#987794) + XrayWrapper bypass through DOM objects - rebased patches - dropped explicit support for everything older than 12.3 (including SLES11)