privacy.resistFingerprinting: Fix calculation of spoofed ESR version for ESR >= 68.0
Categories
(Core :: DOM: Security, defect, P2)
Tracking
()
People
(Reporter: cpeterson, Assigned: cpeterson)
References
(Blocks 1 open bug)
Details
(Whiteboard: [domsecurity-active][fp-triaged])
Attachments
(2 files)
Assignee | ||
Comment 1•7 years ago
|
||
Assignee | ||
Comment 2•7 years ago
|
||
Assignee | ||
Comment 3•7 years ago
|
||
Assignee | ||
Comment 4•7 years ago
|
||
Updated•7 years ago
|
Assignee | ||
Comment 5•7 years ago
|
||
Comment 6•7 years ago
|
||
Comment 7•7 years ago
|
||
Assignee | ||
Comment 8•7 years ago
|
||
Assignee | ||
Comment 9•7 years ago
|
||
Comment 10•7 years ago
|
||
(In reply to Chris Peterson [:cpeterson] from comment #9)
67 Nightly starts on 2019-01-28.
Can you land the patches now?
Assignee | ||
Comment 11•7 years ago
|
||
Tom, do you mind re-reviewing my ESR version spoofing changes here?
You r+'d my changes based in December, but I had to fix some merge conflicts (from your "Spoof OS in HTTP User-Agent header" bug 1509829) when rebasing.
I also wanted to confirm whether Firefox 67 is the correct release cycle to land these changes.
Comment 12•7 years ago
|
||
I also wanted to confirm whether Firefox 67 is the correct release cycle to land these changes.
ESR/Tor Browser are not affected. We were over-thinking it earlier. 67 is the minimum version to add this code, because if you don't change it now, you'll have to backport to 67 beta, as 67 without changes will report 67, and not the desired 60. In hindsight, we could have landed this patch months ago as the changes only affect 67+.
Comment 13•7 years ago
|
||
67 is the minimum version
I think I need some coffee. 67 is the last chance (or maximum) version
Comment 15•7 years ago
|
||
Comment 16•7 years ago
|
||
bugherder |
https://hg.mozilla.org/mozilla-central/rev/8202aff2027a
https://hg.mozilla.org/mozilla-central/rev/58207eeb2afa
Description
•