Closed
Bug 294781
Opened 20 years ago
Closed 20 years ago
annoyance: no access for non-latest update of firefox
Categories
(addons.mozilla.org Graveyard :: Public Pages, defect)
addons.mozilla.org Graveyard
Public Pages
Tracking
(Not tracked)
RESOLVED
DUPLICATE
of bug 294144
People
(Reporter: jaap, Assigned: Bugzilla-alanjstrBugs)
References
()
Details
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.7) Gecko/20050421 Firefox/1.0.3 (Debian package 1.0.3-2) Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.7) Gecko/20050421 Firefox/1.0.3 (Debian package 1.0.3-2) When accessing the extensions and themes page with an "old" (1.0.3) version of firefox, you are redirected to a page to download the newest version and _not_ given the ability to circumvent this. I understand the reason for redirecting people to this page for security reasons. However, I think there are good cases where one should be able to ignore this and continue to the requested page (with a warning of security implications). For example when one doesn't have administrator/root privileges to install an updated version or (my case) when one would like to wait with updating (for a week or so) on the Linux Distribution specific package to be released. I think this override option could at least be available for a few weeks after the release of a new version. I find it annoying that mozilla.org decides for me what I have to do and not give a decent option to "shoot myself in the foot" if I explicitly decide to. Reproducible: Always
Updated•20 years ago
|
Status: UNCONFIRMED → NEW
Ever confirmed: true
Comment 1•20 years ago
|
||
The nature of the security bug behind the redirect means that getting any content from a whitelisted site is a security risk. Leaving a way for a user to get hacked because they "think" they know what they're doing isn't really palatable/responsible. I'm certain that if you're not administering your own PC, the administrator would quite prefer that you didn't go to a site that was linked with a serious security exploit (by virtue of being whitelisted by default).
Assignee: mozilla.webmaster → Bugzilla-alanjstrBugs
Component: webmaster@mozilla.org → Web Site
Product: mozilla.org → Update
QA Contact: danielwang → mozilla.update
Version: other → unspecified
This is on purpose. *** This bug has been marked as a duplicate of 294144 ***
Status: NEW → RESOLVED
Closed: 20 years ago
Resolution: --- → DUPLICATE
Updated•9 years ago
|
Product: addons.mozilla.org → addons.mozilla.org Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•