With 116.0.2-1, and probably with earlier versions too, I get
kernel: memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=538 'librewolf'. Can I assume it is already reported in the appropriate places, or should I report that? If so, where to? Isn't it a Firefox source code issue? The kernel message was already discussed a lot. For example, at Kernel.org Bugzilla, lkml, and lxc issue.
Search Criteria
Package Details: librewolf-bin 1:150.0.3_1-1
Package Actions
| Git Clone URL: | https://aur.archlinux.org/librewolf-bin.git (read-only, click to copy) |
|---|---|
| Package Base: | librewolf-bin |
| Description: | Community-maintained fork of Firefox, focused on privacy, security and freedom. |
| Upstream URL: | https://librewolf.net/ |
| Keywords: | browser web |
| Licenses: | MPL-2.0 |
| Conflicts: | librewolf |
| Provides: | librewolf |
| Submitter: | lsf |
| Maintainer: | lsf |
| Last Packager: | lsf |
| Votes: | 626 |
| Popularity: | 23.77 |
| First Submitted: | 2019-06-16 13:12 (UTC) |
| Last Updated: | 2026-05-13 07:44 (UTC) |
Dependencies (39)
- alsa-lib
- at-spi2-core (at-spi2-core-gitAUR)
- bash (bash-gitAUR, bash-devel-gitAUR)
- cairo (cairo-gitAUR)
- dbus (dbus-gitAUR, dbus-selinuxAUR, dbus-nosystemd-gitAUR)
- ffmpeg (ffmpeg-nvcodec-11-1-gitAUR, ffmpeg-ffplayoutAUR, ffmpeg-cudaAUR, ffmpeg-decklinkAUR, ffmpeg-amd-fullAUR, ffmpeg-amd-full-gitAUR, librempeg-gitAUR, ffmpeg-whisper-gitAUR, ffmpeg-gitAUR, ffmpeg-full-gitAUR, ffmpeg-fullAUR, ffmpeg-full-llvmAUR, ffmpeg-libfdk_aacAUR, ffmpeg-obsAUR, ffmpeg-headlessAUR, ffmpeg-whisperAUR, ffmpeg-cuda-fullAUR)
- fontconfig (fontconfig-gitAUR, fontconfig-ubuntuAUR)
- freetype2 (freetype2-qdoled-aw3225qfAUR, freetype2-qdoledAUR, freetype2-qdoled-gen3AUR, freetype2-woledAUR, freetype2-gitAUR, freetype2-macosAUR)
- gcc-libs (gcc-libs-gitAUR, gccrs-libs-gitAUR, gcc-libs-snapshotAUR)
- gdk-pixbuf2 (gdk-pixbuf2-gitAUR, gdk-pixbuf2-noglycinAUR)
- glib2 (glib2-gitAUR, glib2-patched-thumbnailerAUR)
- glibc (glibc-gitAUR, glibc-eacAUR, glibc-git-native-pgoAUR)
- gtk3 (gtk3-no_deadkeys_underlineAUR, gtk3-classicAUR, gtk3-patched-filechooser-icon-viewAUR, gtk3-classic-xfceAUR)
- hicolor-icon-theme (hicolor-icon-theme-gitAUR)
- libpulse (pulseaudio-dummyAUR, libpulse-gitAUR)
- libx11 (libx11-gitAUR)
- libxcb (libxcb-gitAUR)
- libxcomposite
- libxcursor
- libxdamage
- Show 19 more dependencies...
Required by (39)
- edge-frfox (requires librewolf) (optional)
- ff2mpv-go-git (requires librewolf) (optional)
- ff2mpv-rust (requires librewolf) (optional)
- firefox-gnome-theme (requires librewolf) (optional)
- librewolf-comment-out-cfg-hook (requires librewolf)
- librewolf-extension-bitwarden-bin (requires librewolf)
- librewolf-extension-bitwarden-git (requires librewolf) (optional)
- librewolf-extension-dark-background-light-text (requires librewolf)
- librewolf-extension-darkreader (requires librewolf)
- librewolf-extension-darkreader-bin (requires librewolf)
- librewolf-extension-duckduckgo-privacy-essentials (requires librewolf)
- librewolf-extension-foxyproxy (requires librewolf)
- librewolf-extension-gnome-shell-integration (requires librewolf)
- librewolf-extension-greasemonkey (requires librewolf)
- librewolf-extension-kagisearch-bin (requires librewolf)
- librewolf-extension-localcdn-bin (requires librewolf)
- librewolf-extension-plasma-integration (requires librewolf)
- librewolf-extension-plasma-integration-bin (requires librewolf)
- librewolf-extension-protonpass-bin (requires librewolf)
- librewolf-extension-proxy-toggle-bin (requires librewolf)
- Show 19 more...
Sources (7)
- default192x192.png
- git+https://codeberg.org/librewolf/source.git#tag=150.0.3-1
- https://codeberg.org/api/packages/librewolf/generic/librewolf/150.0.3-1/librewolf-150.0.3-1-linux-arm64-package.tar.xz
- https://codeberg.org/api/packages/librewolf/generic/librewolf/150.0.3-1/librewolf-150.0.3-1-linux-arm64-package.tar.xz.sig
- https://codeberg.org/api/packages/librewolf/generic/librewolf/150.0.3-1/librewolf-150.0.3-1-linux-x86_64-package.tar.xz
- https://codeberg.org/api/packages/librewolf/generic/librewolf/150.0.3-1/librewolf-150.0.3-1-linux-x86_64-package.tar.xz.sig
- librewolf.desktop
Latest Comments
« First ‹ Previous 1 .. 10 11 12 13 14 15 16 17 18 19 20 .. 29 Next › Last »
ron2138 commented on 2023-08-11 11:13 (UTC) (edited on 2023-08-11 11:14 (UTC) by ron2138)
eNV25 commented on 2023-08-09 12:51 (UTC) (edited on 2023-08-09 12:51 (UTC) by eNV25)
To fix icon issues in KDE Plasma Wayland, add the following symlink. The desktop file name needs to match the app-id Wayland property.
ln -srvf "$pkgdir/usr/share/applications/librewolf.desktop" "$pkgdir/usr/share/applications/LibreWolf.desktop"
IpswichTriptych commented on 2023-08-03 00:58 (UTC) (edited on 2023-08-10 20:52 (UTC) by IpswichTriptych)
rebuild-detector is complaining about librewolf-bin as of 2023-08-02. The reason is:
ldd /usr/lib/librewolf/gmp-clearkey/0.1/libclearkey.so
libmozsqlite3.so => not found
yakoi commented on 2023-07-26 14:55 (UTC)
Hi, I installed librewolf-bin and the resulting /usr/lib/librewolf/librewolf.cfg file does not contain the defaultPref to load the librewolf.overrides.cfg file. I checked in the sources of the librewolf package and this is what I found and copied into my librewolf.cfg file to make the overrides work :
/** [CATEGORY] OVERRIDES
* allow settings to be overriden with a file placed in the right location
* https://librewolf.net/docs/settings/#where-do-i-find-my-librewolfoverridescfg
*/
let profile_directory;
if (profile_directory = getenv('USERPROFILE') || getenv('HOME')) {
defaultPref('autoadmin.global_config_url', `file://${profile_directory}/.librewolf/librewolf.overrides.cfg`);
}
This should be included in the default librewolf.cfg file that comes with package librewolf-bin.
Thanks.
heapifyman commented on 2023-06-19 22:00 (UTC)
It appears that the latest version 114.0.1-2 broke support for FIDO2 / webauthn?
There's an upstream issue in firefox: https://bugzilla.mozilla.org/show_bug.cgi?id=1836722
As a workaround one can set security.webauthn.ctap2 to false in about:config.
A fix seems to be planned for firefox 116
heapifyman commented on 2023-06-12 10:48 (UTC) (edited on 2023-06-12 10:49 (UTC) by heapifyman)
It appears that the latest version 114.0.1-2 broke support for FIDO2 / webauthn?
All my FIDO2 USB tokens used as 2nd factor are failing on multiple pages (gitlab, nextcloud, etc.). The same tokens work fine when used in Brave browser.
Is there any new setting that needs to be adjusted to re-enable FIDO2 / webauthn support?
heapifyman commented on 2023-05-02 08:32 (UTC)
I am getting
ERROR: Integrity checks (sha256) differ in size from the source array.
when trying to update to version 112.0.2-1.
It seems that there is a 'SKIP' missing in both sha256sums_x86_64 and sha256sums_aarch64?
Connabl commented on 2023-04-20 22:54 (UTC) (edited on 2023-04-20 22:55 (UTC) by Connabl)
The file in question for @Spitap's fix below is:
/home/yourusername/.local/share/applications/librewolf.desktop
Thanks @Spitap!
Spitap commented on 2023-04-20 20:02 (UTC)
Hi, as @HurricanePootis said, the desktop file seems a bit broken since 112.0. As suggested on librewolf's Reddit, changing StartupWMClass=LibreWolf to StartupWMClass=librewolf-default fixes the problem.
Pinned Comments
lsf commented on 2021-11-10 12:14 (UTC) (edited on 2026-05-07 09:38 (UTC) by lsf)
https://wiki.archlinux.org/title/Arch_User_Repository#Acquire_a_PGP_public_key_if_needed
gpg --keyserver hkp://keyserver.ubuntu.com --search-keys 031F7104E932F7BD7416E7F6D2845E1305D6E801/edit: starting with 112.0-1, the binaries are signed with the maintainers shared key, so
gpg --keyserver hkp://keyserver.ubuntu.com --search-keys 662E3CDD6FE329002D0CA5BB40339DD82B12EF16should do the trick instead. I've also signed the key with the previously used key, so you have at least some guarantee that it's not a malicious attack :)/edit: (2026-05-07): The upstream signing sub-key was rotated, and the
.tar.xztarballs will now be signed with a new subkey. The main key id (0x662E3CDD6FE329002D0CA5BB40339DD82B12EF16) remains unchanged though, so should you get an error during signature verification about a missing (sub)key, all that's required would be to refresh the key(s) viagpg --refresh-keys 662E3CDD6FE329002D0CA5BB40339DD82B12EF16.