about summary refs log tree commit diff
path: root/pkgs/applications/networking/browsers
Commit message (Collapse)AuthorAge
...
* | | | firefoxPackages.firefox-esr-60: removeFlorian Klink2020-02-09
| | | | | | | | | | | | | | | | | | | | | | | | There's not really a reason to ship an unsupported ESR variant of firefox, and if one really needs it, it's also possible to just checkout an older version of nixpkgs.
* | | | firefoxPackages.*: use config.allowAliasesFlorian Klink2020-02-09
| | | |
* | | | Merge pull request #79587 from r-ryantm/auto-update/palemoonRyan Mulligan2020-02-09
|\ \ \ \ | | | | | | | | | | palemoon: 28.8.1 -> 28.8.2.1
| * | | | palemoon: 28.8.1 -> 28.8.2.1R. RyanTM2020-02-09
| | |/ / | |/| |
* | | | opera: 66.0.3515.36 -> 66.0.3515.72R. RyanTM2020-02-09
| | | |
* | | | conkeror: pin to firefox-esr-52 (#72090)PanAeon2020-02-09
|/ / /
* | | Merge pull request #79242 from primeos/chromiumMichael Weiss2020-02-07
|\ \ \ | | | | | | | | chromium: 79.0.3945.130 -> 80.0.3987.87
| * | | chromium: 79.0.3945.130 -> 80.0.3987.87Michael Weiss2020-02-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html This update includes 56 security fixes. CVEs: CVE-2020-6381 CVE-2020-6382 CVE-2019-18197 CVE-2019-19926 CVE-2020-6385 CVE-2019-19880 CVE-2019-19925 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2019-19923 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417
* | | | next: 1.3.4 -> 1.4.0Bruno Bigras2020-02-05
| |/ / |/| |
* | | qutebrowser: 1.9.0 -> 1.10.0 (#79172)Michele Guerini Rocco2020-02-04
| | |
* | | Merge pull request #77426 from lheckemann/remove-otterFlorian Klink2020-02-02
|\ \ \ | | | | | | | | otter-browser: remove
| * | | otter-browser: removeLinus Heckemann2020-02-02
| | | | | | | | | | | | | | | | I have no interest in maintaining this anymore and it has no other maintainers.
* | | | ephemeral: 6.1.1 -> 6.2.0kjuvi2020-01-31
| |/ / |/| |
* | | chromium: Add myself (@primeos) as provisional maintainerMichael Weiss2020-01-28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | I don't really have the hardware resources nor time to do this properly, but I'll try to keep a watch on Chromium (updates, PRs, and issues) until we've found a new team [0]. Testing will be performed on a best effort basis (no guarantees :o). I've also briefly documented the current maintainer roles/responsibilities and added `meta.longDescription`. [0]: https://github.com/NixOS/nixpkgs/issues/78450
* | | chromium: 79.0.3945.117 -> 79.0.3945.130Michael Weiss2020-01-26
| | | | | | | | | | | | | | | | | | | | | | | | https://chromereleases.googleblog.com/2020/01/stable-channel-update-for-desktop_16.html This update includes 11 security fixes. CVEs: CVE-2020-6378 CVE-2020-6379 CVE-2020-6380 CVE-2020-0601
* | | Merge pull request #78237 from r-ryantm/auto-update/operaMarek Mahut2020-01-26
|\ \ \ | | | | | | | | opera: 65.0.3467.48 -> 66.0.3515.36
| * | | opera: 65.0.3467.48 -> 66.0.3515.36R. RyanTM2020-01-22
| | | |
* | | | Merge pull request #77299 from ivan/chromium-79.0.3945.117Michael Weiss2020-01-25
|\ \ \ \ | | | | | | | | | | chromium: 79.0.3945.88 -> 79.0.3945.117
| * | | | chromium: 79.0.3945.88 -> 79.0.3945.117Ivan Kozik2020-01-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CVE-TBD: Use after free in audio https://chromereleases.googleblog.com/2020/01/stable-channel-update-for-desktop.html
* | | | | Merge pull request #78248 from r-ryantm/auto-update/palemoonRyan Mulligan2020-01-22
|\ \ \ \ \ | | | | | | | | | | | | palemoon: 28.8.0 -> 28.8.1
| * | | | | palemoon: 28.8.0 -> 28.8.1R. RyanTM2020-01-22
| | |/ / / | |/| | |
* | | | | firefox-esr: 68.4.1esr -> 68.4.2esrtaku02020-01-21
| | | | |
* | | | | firefox: 72.0.1 -> 72.0.2taku02020-01-21
| | | | |
* | | | | firefox-bin: 72.0.1 -> 72.0.2taku02020-01-21
| | | | |
* | | | | treewide: Remove myself from maintainers on some packages (#78027)Ivan Kozik2020-01-19
| | | | |
* | | | | captive-browser: runs on all platformsFrancesco Zanini2020-01-19
| | | | |
* | | | | vivaldi: 2.10.1745.26-1 -> 2.10.1745.27-1Tim Steinbach2020-01-18
|/ / / /
* | | | flashplayer: 32.0.0.303 -> 32.0.0.314taku02020-01-14
| | | |
* | | | vivaldi: 2.10.1745.23-1 -> 2.10.1745.26-1Tim Steinbach2020-01-10
| | | |
* | | | Merge pull request #77245 from turboMaCk/google-talk-plugin-sha1-to-sha256Mario Rodas2020-01-10
|\ \ \ \ | | | | | | | | | | google_talk_plugin: sha1 -> sha256
| * | | | google_talk_plugin: sha1 -> sha256Marek Fajkus2020-01-07
| |/ / / | | | | | | | | | | | | related https://github.com/NixOS/nixpkgs/issues/77238
* | | | firefoxPackages.icecat: mark as insecureFlorian Klink2020-01-10
| | | | | | | | | | | | | | | | It's based on 60.3.0, whose support ended around October 2019.
* | | | Merge pull request #77458 from emilazy/tor-browser-bundle-bin-9.0.4Graham Christensen2020-01-10
|\ \ \ \ | | | | | | | | | | tor-browser-bundle-bin: 9.0.3 -> 9.0.4
| * | | | tor-browser-bundle-bin: 9.0.3 -> 9.0.4Emily2020-01-10
| | |/ / | |/| |
* | | | firefox-beta-bin: 72.0b3 -> 73.0b3adisbladis2020-01-10
| | | |
* | | | firefox-devedition-bin: 72.0b11 -> 73.0b3adisbladis2020-01-10
| | | |
* | | | firefoxPackages.tor-browser*, tor-browser-bundle: removeFlorian Klink2020-01-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | These are all based on firefox versions with known vulnerabilities exploited in the wild. We seriously shouldn't ship this in nixpkgs, especially not for sensitive applications as the Tor Browser. `tor-browser-bundle` is just a wrapper around `firefoxPackages.tor-browser`, so let's remove it too. `tor-browser-bundle-bin` is the much safer bet, which is individually downloaded from `dist.torproject.org` and just `patchelf`-ed locally to work on NixOS. Co-Authored-By: Alyssa Ross <hi@alyssa.is> Co-Authored-By: Andreas Rammhold <andreas@rammhold.de> Co-Authored-By: Graham Christensen <graham@grahamc.com>
* | | | firefox-esr-60: mark as vulnerableVladimír Čunát2020-01-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | The last release was in September, so it's surely "vulnerable" now. https://www.mozilla.org/en-US/firefox/60.9.0/releasenotes/ This is the same appproach we've taken for esr-52.
* | | | Merge pull request #77425 from emmanuelrosa/qutebrowser-1.9Florian Klink2020-01-10
|\ \ \ \ | |/ / / |/| | | qutebrowser: 1.8.3 -> 1.9.0
| * | | qutebrowser: 1.8.3 -> 1.9.0Emmanuel Rosa2020-01-10
| | | | | | | | | | | | | | | | Closes #77360
* | | | Merge pull request #77340 from dtzWill/update/tor-browser-bundle-bin-9.0.3Joachim F2020-01-09
|\ \ \ \ | | | | | | | | | | tor-browser-bundle-bin: 9.0.2 -> 9.0.3
| * | | | tor-browser-bundle-bin: 9.0.2 -> 9.0.3Will Dietz2020-01-08
| | | | | | | | | | | | | | | | | | | | https://blog.torproject.org/new-release-tor-browser-903
* | | | | firefox-bin: 72.0 -> 72.0.1 [security] CVE-2019-17026Daniel Frank2020-01-09
| |/ / / |/| | |
* | | | firefox: fix build of >=72 on aarch64Andreas Rammhold2020-01-08
| | | |
* | | | firefox-esr-68: 68.4.0esr -> 68.4.1esrAndreas Rammhold2020-01-08
| | | |
* | | | firefox: 72.0 -> 72.0.1Andreas Rammhold2020-01-08
|/ / /
* | | firefox: 71.0 -> 72.0Andreas Rammhold2020-01-08
| | |
* | | firefox-esr-68: 68.3.0esr -> 68.4.0esrAndreas Rammhold2020-01-08
| | |
* | | firefox-devedition-bin: 72.0b11 -> 73.0b2Andreas Rammhold2020-01-08
| | |
* | | firefox-beta-bin: 72.0b4 -> 73.0b2Andreas Rammhold2020-01-08
| | |