# HG changeset patch # User Wolfgang Rosenauer # Date 1486886242 -3600 # Node ID ff9e20146e8b99d7a4252078a59132e799bb6cd5 # Parent 096e59808e913deed463eee9eac38e8085df25ac# Parent f63a4ac0fe061feeda14104dea0b6b39a44f6a83 merge from firefox51 remove obsolete xulrunner from tree diff -r 096e59808e91 -r ff9e20146e8b MozillaFirefox/MozillaFirefox.changes --- a/MozillaFirefox/MozillaFirefox.changes Sat Jan 21 12:37:55 2017 +0100 +++ b/MozillaFirefox/MozillaFirefox.changes Sun Feb 12 08:57:22 2017 +0100 @@ -1,7 +1,14 @@ ------------------------------------------------------------------- +Fri Jan 27 20:25:59 UTC 2017 - astieger@suse.com + +- Mozilla Firefox 51.0.1: + - Multiprocess incompatibility did not correctly register with + some add-ons (bmo#1333423) + +------------------------------------------------------------------- Fri Jan 20 13:57:56 UTC 2017 - wr@rosenauer.org -- update to Firefox 51.0b14 +- update to Firefox 51.0 * requires NSPR >= 4.13.1, NSS >= 3.28.1 * Added support for FLAC (Free Lossless Audio Codec) playback * Added support for WebGL 2 @@ -13,9 +20,65 @@ * View passwords from the prompt before saving them * Remove Belarusian (be) locale * Use Skia for content rendering (Linux) -- switch Firefox to Gtk3 for Tumbleweed and Leap >= 43 + * MFSA 2017-01 + CVE-2017-5375: Excessive JIT code allocation allows bypass of + ASLR and DEP (bmo#1325200, boo#1021814) + CVE-2017-5376: Use-after-free in XSL (bmo#1311687, boo#1021817) + CVE-2017-5377: Memory corruption with transforms to create + gradients in Skia (bmo#1306883, boo#1021826) + CVE-2017-5378: Pointer and frame data leakage of Javascript objects + (bmo#1312001, bmo#1330769, boo#1021818) + CVE-2017-5379: Use-after-free in Web Animations + (bmo#1309198,boo#1021827) + CVE-2017-5380: Potential use-after-free during DOM manipulations + (bmo#1322107, boo#1021819) + CVE-2017-5390: Insecure communication methods in Developer Tools + JSON viewer (bmo#1297361, boo#1021820) + CVE-2017-5389: WebExtensions can install additional add-ons via + modified host requests (bmo#1308688, boo#1021828) + CVE-2017-5396: Use-after-free with Media Decoder + (bmo#1329403, boo#1021821) + CVE-2017-5381: Certificate Viewer exporting can be used to navigate + and save to arbitrary filesystem locations + (bmo#1017616, boo#1021830) + CVE-2017-5382: Feed preview can expose privileged content errors + and exceptions (bmo#1295322, boo#1021831) + CVE-2017-5383: Location bar spoofing with unicode characters + (bmo#1323338, bmo#1324716, boo#1021822) + CVE-2017-5384: Information disclosure via Proxy Auto-Config (PAC) + (bmo#1255474, boo#1021832) + CVE-2017-5385: Data sent in multipart channels ignores referrer-policy + response headers (bmo#1295945, boo#1021833) + CVE-2017-5386: WebExtensions can use data: protocol to affect other + extensions (bmo#1319070, boo#1021823) + CVE-2017-5394: Android location bar spoofing using fullscreen and + JavaScript events (bmo#1222798) + CVE-2017-5391: Content about: pages can load privileged about: pages + (bmo#1309310, boo#1021835) + CVE-2017-5392: Weak references using multiple threads on weak proxy + objects lead to unsafe memory usage (bmo#1293709) + (Android only) + CVE-2017-5393: Remove addons.mozilla.org CDN from whitelist for + mozAddonManager (bmo#1309282, boo#1021837) + CVE-2017-5395: Android location bar spoofing during scrolling + (bmo#1293463) (Android only) + CVE-2017-5387: Disclosure of local file existence through TRACK + tag error messages (bmo#1295023, boo#1021839) + CVE-2017-5388: WebRTC can be used to generate a large amount of + UDP traffic for DDOS attacks + (bmo#1281482, boo#1021840) + CVE-2017-5374: Memory safety bugs fixed in Firefox 51 (boo#1021841) + CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and + Firefox ESR 45.7 (boo#1021824) +- switch Firefox to Gtk3 for Tumbleweed - removed obsolete patches * mozilla-flex_buffer_overrun.patch +- updated RPM locale support tag +- improve recognition of LANGUAGE env variable (boo#1017174) +- add upstream patch to fix PPC64LE (bmo#1319389) + (mozilla-skia-ppc-endianess.patch) +- fix build without skia (big endian archs) (bmo#1319374) + (mozilla-disable-skia-be.patch) ------------------------------------------------------------------- Mon Dec 12 21:18:41 UTC 2016 - wr@rosenauer.org diff -r 096e59808e91 -r ff9e20146e8b MozillaFirefox/MozillaFirefox.spec --- a/MozillaFirefox/MozillaFirefox.spec Sat Jan 21 12:37:55 2017 +0100 +++ b/MozillaFirefox/MozillaFirefox.spec Sun Feb 12 08:57:22 2017 +0100 @@ -18,10 +18,10 @@ # changed with every update -%define major 50 +%define major 51 %define mainver %major.99 %define update_channel beta -%define releasedate 20170117000000 +%define releasedate 20170111000000 # PIE, full relro (x86_64 for now) %define build_hardened 1 @@ -36,7 +36,7 @@ %define pkgname firefox-dev-edition %define appname Firefox Developer Edition %endif -%if 0%{?suse_version} > 1315 +%if 0%{?suse_version} > 1320 %define firefox_use_gtk3 1 %endif %define progdir %{_prefix}/%_lib/%{progname} @@ -78,7 +78,7 @@ BuildRequires: libproxy-devel BuildRequires: makeinfo BuildRequires: mozilla-nspr-devel >= 4.13.1 -BuildRequires: mozilla-nss-devel >= 3.28.1 +BuildRequires: mozilla-nss-devel >= 3.28.2 BuildRequires: nss-shared-helper-devel BuildRequires: python-devel BuildRequires: startup-notification-devel @@ -150,6 +150,8 @@ Patch13: mozilla-check_return.patch Patch14: mozilla-skia-overflow.patch Patch17: mozilla-binutils-visibility.patch +Patch18: mozilla-skia-ppc-endianess.patch +Patch19: mozilla-disable-skia-be.patch # Firefox/browser Patch101: firefox-kde.patch Patch102: firefox-no-default-ualocale.patch @@ -205,7 +207,7 @@ %package translations-other Summary: Extra translations for %{appname} Group: System/Localization -Provides: locale(%{name}:ach;af;an;as;ast;az;be;bg;bn_BD;bn_IN;br;bs;cak;cy;dsb;en_ZA;eo;es_MX;et;eu;fa;ff;fy_NL;ga_IE;gd;gl;gn;gu_IN;he;hi_IN;hr;hsb;hy_AM;id;is;kk;km;kn;lij;lt;lv;mai;mk;ml;mr;ms;nn_NO;or;pa_IN;rm;ro;si;sk;sl;son;sq;sr;ta;te;th;tr;uk;uz;vi;xh) +Provides: locale(%{name}:ach;af;an;as;ast;az;bg;bn_BD;bn_IN;br;bs;cak;cy;dsb;en_ZA;eo;es_MX;et;eu;fa;ff;fy_NL;ga_IE;gd;gl;gn;gu_IN;he;hi_IN;hr;hsb;hy_AM;id;is;ka;kab;kk;km;kn;lij;lt;lv;mai;mk;ml;mr;ms;nn_NO;or;pa_IN;rm;ro;si;sk;sl;son;sq;sr;ta;te;th;tr;uk;uz;vi;xh) Requires: %{name} = %{version} Obsoletes: %{name}-translations < %{version}-%{release} @@ -264,6 +266,8 @@ %patch13 -p1 %patch14 -p1 %patch17 -p1 +%patch18 -p1 +%patch19 -p1 # Firefox %patch101 -p1 %patch102 -p1 @@ -398,9 +402,9 @@ %if %localize rm -f %{_tmppath}/translations.* touch %{_tmppath}/translations.{common,other} -for locale in $(awk '{ print $1; }' ../mozilla/browser/locales/shipped-locales); do +for locale in $(awk '{ print $1; }' %{SOURCE17}); do case $locale in - ja-JP-mac|en-US) + ja-JP-mac|en-US|'') ;; *) pushd $RPM_BUILD_DIR/compare-locales diff -r 096e59808e91 -r ff9e20146e8b MozillaFirefox/create-tar.sh --- a/MozillaFirefox/create-tar.sh Sat Jan 21 12:37:55 2017 +0100 +++ b/MozillaFirefox/create-tar.sh Sun Feb 12 08:57:22 2017 +0100 @@ -7,8 +7,8 @@ CHANNEL="beta" BRANCH="releases/mozilla-$CHANNEL" -RELEASE_TAG="FIREFOX_51_0b14_RELEASE" -VERSION="50.99" +RELEASE_TAG="FIREFOX_52_0b5_RELEASE" +VERSION="51.99" # mozilla if [ -d mozilla ]; then diff -r 096e59808e91 -r ff9e20146e8b MozillaFirefox/mozilla-disable-skia-be.patch --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/MozillaFirefox/mozilla-disable-skia-be.patch Sun Feb 12 08:57:22 2017 +0100 @@ -0,0 +1,1 @@ +../mozilla-disable-skia-be.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b MozillaFirefox/mozilla-skia-ppc-endianess.patch --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/MozillaFirefox/mozilla-skia-ppc-endianess.patch Sun Feb 12 08:57:22 2017 +0100 @@ -0,0 +1,1 @@ +../mozilla-skia-ppc-endianess.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b mozilla-disable-skia-be.patch --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/mozilla-disable-skia-be.patch Sun Feb 12 08:57:22 2017 +0100 @@ -0,0 +1,292 @@ + +# HG changeset patch +# User Lee Salzman +# Date 1484854371 18000 +# Node ID 42afdb8f7e6b3e8a465042f64c6c49782f231af4 +# Parent dfadd79c97458f898d542461033a61dd34d3a5f0 +Bug 1319374 - Wrap PaintCounter with ifdef USE_SKIA. r=mchang, a=jcristau + +diff --git a/gfx/2d/BorrowedContext.h b/gfx/2d/BorrowedContext.h +--- a/gfx/2d/BorrowedContext.h ++++ b/gfx/2d/BorrowedContext.h +@@ -190,18 +190,28 @@ public: + } + + ~BorrowedCGContext() { + MOZ_ASSERT(!cg); + } + + CGContextRef cg; + private: ++#ifdef USE_SKIA + static CGContextRef BorrowCGContextFromDrawTarget(DrawTarget *aDT); + static void ReturnCGContextToDrawTarget(DrawTarget *aDT, CGContextRef cg); ++#else ++ static CGContextRef BorrowCGContextFromDrawTarget(DrawTarget *aDT) { ++ MOZ_CRASH("Not supported without Skia"); ++ } ++ ++ static void ReturnCGContextToDrawTarget(DrawTarget *aDT, CGContextRef cg) { ++ MOZ_CRASH("not supported without Skia"); ++ } ++#endif + DrawTarget *mDT; + }; + #endif + + } // namespace gfx + } // namespace mozilla + + #endif // _MOZILLA_GFX_BORROWED_CONTEXT_H +diff --git a/gfx/layers/composite/LayerManagerComposite.cpp b/gfx/layers/composite/LayerManagerComposite.cpp +--- a/gfx/layers/composite/LayerManagerComposite.cpp ++++ b/gfx/layers/composite/LayerManagerComposite.cpp +@@ -7,17 +7,16 @@ + #include // for size_t + #include // for uint16_t, uint32_t + #include "CanvasLayerComposite.h" // for CanvasLayerComposite + #include "ColorLayerComposite.h" // for ColorLayerComposite + #include "Composer2D.h" // for Composer2D + #include "CompositableHost.h" // for CompositableHost + #include "ContainerLayerComposite.h" // for ContainerLayerComposite, etc + #include "FPSCounter.h" // for FPSState, FPSCounter +-#include "PaintCounter.h" // For PaintCounter + #include "FrameMetrics.h" // for FrameMetrics + #include "GeckoProfiler.h" // for profiler_set_frame_number, etc + #include "ImageLayerComposite.h" // for ImageLayerComposite + #include "Layers.h" // for Layer, ContainerLayer, etc + #include "LayerScope.h" // for LayerScope Tool + #include "protobuf/LayerScopePacket.pb.h" // for protobuf (LayerScope) + #include "PaintedLayerComposite.h" // for PaintedLayerComposite + #include "TiledContentHost.h" +@@ -68,16 +67,20 @@ + #include "nsScreenManagerGonk.h" + #include "nsWindow.h" + #endif + #include "GeckoProfiler.h" + #include "TextRenderer.h" // for TextRenderer + #include "mozilla/layers/CompositorBridgeParent.h" + #include "TreeTraversal.h" // for ForEachNode + ++#ifdef USE_SKIA ++#include "PaintCounter.h" // For PaintCounter ++#endif ++ + class gfxContext; + + namespace mozilla { + namespace layers { + + class ImageLayer; + + using namespace mozilla::gfx; +@@ -128,16 +131,20 @@ LayerManagerComposite::LayerManagerCompo + , mGeometryChanged(true) + , mLastFrameMissedHWC(false) + , mWindowOverlayChanged(false) + , mLastPaintTime(TimeDuration::Forever()) + , mRenderStartTime(TimeStamp::Now()) + { + mTextRenderer = new TextRenderer(aCompositor); + MOZ_ASSERT(aCompositor); ++ ++#ifdef USE_SKIA ++ mPaintCounter = nullptr; ++#endif + } + + LayerManagerComposite::~LayerManagerComposite() + { + Destroy(); + } + + +@@ -146,18 +153,21 @@ LayerManagerComposite::Destroy() + { + if (!mDestroyed) { + mCompositor->GetWidget()->CleanupWindowEffects(); + if (mRoot) { + RootLayer()->Destroy(); + } + mRoot = nullptr; + mClonedLayerTreeProperties = nullptr; ++ mDestroyed = true; ++ ++#ifdef USE_SKIA + mPaintCounter = nullptr; +- mDestroyed = true; ++#endif + } + } + + void + LayerManagerComposite::UpdateRenderBounds(const IntRect& aRect) + { + mRenderBounds = aRect; + } +@@ -559,48 +569,52 @@ LayerManagerComposite::RootLayer() const + #endif + + void + LayerManagerComposite::InvalidateDebugOverlay(nsIntRegion& aInvalidRegion, const IntRect& aBounds) + { + bool drawFps = gfxPrefs::LayersDrawFPS(); + bool drawFrameCounter = gfxPrefs::DrawFrameCounter(); + bool drawFrameColorBars = gfxPrefs::CompositorDrawColorBars(); +- bool drawPaintTimes = gfxPrefs::AlwaysPaint(); + + if (drawFps || drawFrameCounter) { + aInvalidRegion.Or(aInvalidRegion, nsIntRect(0, 0, 256, 256)); + } + if (drawFrameColorBars) { + aInvalidRegion.Or(aInvalidRegion, nsIntRect(0, 0, 10, aBounds.height)); + } ++ ++#ifdef USE_SKIA ++ bool drawPaintTimes = gfxPrefs::AlwaysPaint(); + if (drawPaintTimes) { + aInvalidRegion.Or(aInvalidRegion, nsIntRect(PaintCounter::GetPaintRect())); + } ++#endif + } + ++#ifdef USE_SKIA + void + LayerManagerComposite::DrawPaintTimes(Compositor* aCompositor) + { + if (!mPaintCounter) { + mPaintCounter = new PaintCounter(); + } + + TimeDuration compositeTime = TimeStamp::Now() - mRenderStartTime; + mPaintCounter->Draw(aCompositor, mLastPaintTime, compositeTime); + } ++#endif + + static uint16_t sFrameCount = 0; + void + LayerManagerComposite::RenderDebugOverlay(const IntRect& aBounds) + { + bool drawFps = gfxPrefs::LayersDrawFPS(); + bool drawFrameCounter = gfxPrefs::DrawFrameCounter(); + bool drawFrameColorBars = gfxPrefs::CompositorDrawColorBars(); +- bool drawPaintTimes = gfxPrefs::AlwaysPaint(); + + TimeStamp now = TimeStamp::Now(); + + if (drawFps) { + if (!mFPS) { + mFPS = MakeUnique(); + } + +@@ -731,19 +745,22 @@ LayerManagerComposite::RenderDebugOverla + } + #endif + + if (drawFrameColorBars || drawFrameCounter) { + // We intentionally overflow at 2^16. + sFrameCount++; + } + ++#ifdef USE_SKIA ++ bool drawPaintTimes = gfxPrefs::AlwaysPaint(); + if (drawPaintTimes) { + DrawPaintTimes(mCompositor); + } ++#endif + } + + RefPtr + LayerManagerComposite::PushGroupForLayerEffects() + { + // This is currently true, so just making sure that any new use of this + // method is flagged for investigation + MOZ_ASSERT(gfxPrefs::LayersEffectInvert() || +diff --git a/gfx/layers/composite/LayerManagerComposite.h b/gfx/layers/composite/LayerManagerComposite.h +--- a/gfx/layers/composite/LayerManagerComposite.h ++++ b/gfx/layers/composite/LayerManagerComposite.h +@@ -326,21 +326,16 @@ private: + * Render the current layer tree to the active target. + */ + void Render(const nsIntRegion& aInvalidRegion, const nsIntRegion& aOpaqueRegion); + #if defined(MOZ_WIDGET_ANDROID) || defined(MOZ_WIDGET_GONK) + void RenderToPresentationSurface(); + #endif + + /** +- * Render paint and composite times above the frame. +- */ +- void DrawPaintTimes(Compositor* aCompositor); +- +- /** + * We need to know our invalid region before we're ready to render. + */ + void InvalidateDebugOverlay(nsIntRegion& aInvalidRegion, const gfx::IntRect& aBounds); + + /** + * Render debug overlays such as the FPS/FrameCounter above the frame. + */ + void RenderDebugOverlay(const gfx::IntRect& aBounds); +@@ -386,19 +381,26 @@ private: + RefPtr mTextRenderer; + bool mGeometryChanged; + + // Testing property. If hardware composer is supported, this will return + // true if the last frame was deemed 'too complicated' to be rendered. + bool mLastFrameMissedHWC; + + bool mWindowOverlayChanged; +- RefPtr mPaintCounter; + TimeDuration mLastPaintTime; + TimeStamp mRenderStartTime; ++ ++#ifdef USE_SKIA ++ /** ++ * Render paint and composite times above the frame. ++ */ ++ void DrawPaintTimes(Compositor* aCompositor); ++ RefPtr mPaintCounter; ++#endif + }; + + /** + * Composite layers are for use with OMTC on the compositor thread only. There + * must be corresponding Basic layers on the content thread. For composite + * layers, the layer manager only maintains the layer tree, all rendering is + * done by a Compositor (see Compositor.h). As such, composite layers are + * platform-independent and can be used on any platform for which there is a +diff --git a/gfx/layers/moz.build b/gfx/layers/moz.build +--- a/gfx/layers/moz.build ++++ b/gfx/layers/moz.build +@@ -335,17 +335,16 @@ UNIFIED_SOURCES += [ + 'composite/CompositableHost.cpp', + 'composite/ContainerLayerComposite.cpp', + 'composite/ContentHost.cpp', + 'composite/FPSCounter.cpp', + 'composite/FrameUniformityData.cpp', + 'composite/ImageHost.cpp', + 'composite/ImageLayerComposite.cpp', + 'composite/LayerManagerComposite.cpp', +- 'composite/PaintCounter.cpp', + 'composite/PaintedLayerComposite.cpp', + 'composite/TextRenderer.cpp', + 'composite/TextureHost.cpp', + 'composite/TiledContentHost.cpp', + 'Compositor.cpp', + 'CopyableCanvasLayer.cpp', + 'Effects.cpp', + 'FrameMetrics.cpp', +@@ -480,8 +479,13 @@ MOCHITEST_CHROME_MANIFESTS += ['apz/test + + CXXFLAGS += CONFIG['MOZ_CAIRO_CFLAGS'] + CXXFLAGS += CONFIG['TK_CFLAGS'] + + LOCAL_INCLUDES += CONFIG['SKIA_INCLUDES'] + + if CONFIG['GNU_CXX']: + CXXFLAGS += ['-Wno-error=shadow'] ++ ++if CONFIG['MOZ_ENABLE_SKIA']: ++ UNIFIED_SOURCES += [ ++ 'composite/PaintCounter.cpp', ++ ] diff -r 096e59808e91 -r ff9e20146e8b mozilla-language.patch --- a/mozilla-language.patch Sat Jan 21 12:37:55 2017 +0100 +++ b/mozilla-language.patch Sun Feb 12 08:57:22 2017 +0100 @@ -1,7 +1,7 @@ # HG changeset patch # User Wolfgang Rosenauer # Parent 5a29924228527f8882c83cf62d470963ea1ce62e -# Parent bf7b3a5853467b34f13465102a19b9c7c2524bd4 +# Parent 4f39ed617c2f151a3a15903c7ae4471b66774e9e Bug 583793 - Firefox interface language set to LANG, ignores LANGUAGE diff --git a/intl/locale/nsLocaleService.cpp b/intl/locale/nsLocaleService.cpp @@ -25,7 +25,7 @@ for( i = 0; i < LocaleListLength; i++ ) { nsresult result; // setlocale( , "") evaluates LC_* and LANG -@@ -149,16 +150,21 @@ nsLocaleService::nsLocaleService(void) +@@ -149,16 +150,36 @@ nsLocaleService::nsLocaleService(void) } else { CopyASCIItoUTF16(lang, platformLocale); result = nsPosixLocale::GetXPLocale(lang, xpLocale); @@ -35,9 +35,24 @@ return; } + // LANGUAGE is overriding LC_MESSAGES ++ // it can be a colon separated list of preferred languages ++ // as we do not recognize here if a language is available ++ // we actually only consider the first entry unless GetXPLocale ++ // fails completely + if (i == LC_MESSAGES && language && *language) { -+ CopyASCIItoUTF16(language, platformLocale); -+ result = nsPosixLocale::GetXPLocale(language, xpLocale); ++#define LANGUAGE_SEP ":" ++ nsAutoString xpLocale_temp; ++ char* rawBuffer = (char*) language; ++ char* token = nsCRT::strtok(rawBuffer, LANGUAGE_SEP, &rawBuffer); ++ for (; token; ++ token = nsCRT::strtok(rawBuffer, LANGUAGE_SEP, &rawBuffer)) { ++ result = nsPosixLocale::GetXPLocale(token, xpLocale_temp); ++ if (NS_SUCCEEDED(result)) { ++ CopyASCIItoUTF16(token, platformLocale); ++ xpLocale = xpLocale_temp; ++ break; ++ } ++ } + } resultLocale->AddCategory(category, xpLocale); resultLocale->AddCategory(category_platform, platformLocale); diff -r 096e59808e91 -r ff9e20146e8b mozilla-skia-ppc-endianess.patch --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/mozilla-skia-ppc-endianess.patch Sun Feb 12 08:57:22 2017 +0100 @@ -0,0 +1,45 @@ + +# HG changeset patch +# User Mike Hommey +# Date 1479812942 -32400 +# Node ID a6d015fd1add5e16cf37f5868cd2734bafb709b4 +# Parent 319e03b9e8a22a8fba3756cb1afc8b9e7a6724c8 +Bug 1319389 - Generically set SK_CPU_[BL]ENDIAN based on __BYTE_ORDER__ when available. r?jrmuizel + + +diff --git a/gfx/skia/skia/include/core/SkPreConfig.h b/gfx/skia/skia/include/core/SkPreConfig.h +--- a/gfx/skia/skia/include/core/SkPreConfig.h ++++ b/gfx/skia/skia/include/core/SkPreConfig.h +@@ -67,25 +67,29 @@ + + #if !defined(SK_WARN_UNUSED_RESULT) + #define SK_WARN_UNUSED_RESULT __attribute__((warn_unused_result)) + #endif + + ////////////////////////////////////////////////////////////////////// + + #if !defined(SK_CPU_BENDIAN) && !defined(SK_CPU_LENDIAN) +- #if defined(__sparc) || defined(__sparc__) || \ ++ #if defined(__BYTE_ORDER__) && (__BYTE_ORDER__ == __ORDER_BIG_ENDIAN__) ++ #define SK_CPU_BENDIAN ++ #elif defined(__BYTE_ORDER__) && (__BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__) ++ #define SK_CPU_LENDIAN ++ #elif defined(__sparc) || defined(__sparc__) || \ + defined(_POWER) || defined(__powerpc__) || \ + defined(__ppc__) || defined(__hppa) || \ + defined(__PPC__) || defined(__PPC64__) || \ + defined(_MIPSEB) || defined(__ARMEB__) || \ + defined(__s390__) || \ + (defined(__sh__) && defined(__BIG_ENDIAN__)) || \ + (defined(__ia64) && defined(__BIG_ENDIAN__)) +- #define SK_CPU_BENDIAN ++ #define SK_CPU_BENDIAN + #else + #define SK_CPU_LENDIAN + #endif + #endif + + ////////////////////////////////////////////////////////////////////// + + #if defined(__i386) || defined(_M_IX86) || defined(__x86_64__) || defined(_M_X64) + diff -r 096e59808e91 -r ff9e20146e8b series --- a/series Sat Jan 21 12:37:55 2017 +0100 +++ b/series Sun Feb 12 08:57:22 2017 +0100 @@ -13,6 +13,8 @@ mozilla-skia-overflow.patch mozilla-binutils-visibility.patch mozilla-aarch64-startup-crash.patch +mozilla-skia-ppc-endianess.patch +mozilla-disable-skia-be.patch # Firefox patches firefox-kde.patch diff -r 096e59808e91 -r ff9e20146e8b xulrunner/_constraints --- a/xulrunner/_constraints Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,11 +0,0 @@ - - - - - 9 - - - 4500 - - - diff -r 096e59808e91 -r ff9e20146e8b xulrunner/baselibs.conf --- a/xulrunner/baselibs.conf Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,4 +0,0 @@ -xulrunner - +/usr/lib(64)?/xulrunner-.* - +/etc/gre.d/.* - diff -r 096e59808e91 -r ff9e20146e8b xulrunner/create-tar.sh --- a/xulrunner/create-tar.sh Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,62 +0,0 @@ -#!/bin/bash - -CHANNEL="esr38" -BRANCH="releases/mozilla-$CHANNEL" -RELEASE_TAG="FIREFOX_38_2_0esr_RELEASE" -VERSION="38.2.0" - -# mozilla -if [ -d mozilla ]; then - pushd mozilla - _repourl=$(hg paths) - case "$_repourl" in - *$BRANCH*) - echo "updating previous tree" - hg pull - popd - ;; - * ) - echo "removing obsolete tree" - popd - rm -rf mozilla - ;; - esac -fi -if [ ! -d mozilla ]; then - echo "cloning new $BRANCH..." - hg clone http://hg.mozilla.org/$BRANCH mozilla -fi -pushd mozilla -hg update --check -[ "$RELEASE_TAG" == "default" ] || hg update -r $RELEASE_TAG -# get repo and source stamp -echo -n "REV=" > ../source-stamp.txt -hg -R . parent --template="{node|short}\n" >> ../source-stamp.txt -echo -n "REPO=" >> ../source-stamp.txt -hg showconfig paths.default 2>/dev/null | head -n1 | sed -e "s/^ssh:/http:/" >> ../source-stamp.txt -popd -echo "creating archive..." -tar cJf xulrunner-$VERSION-source.tar.xz --exclude=.hgtags --exclude=.hgignore --exclude=.hg --exclude=CVS mozilla - -# l10n -echo "fetching locales..." -test ! -d l10n && mkdir l10n -for locale in $(awk '{ print $1; }' mozilla/browser/locales/shipped-locales); do - case $locale in - ja-JP-mac|en-US) - ;; - *) - echo "fetching $locale ..." - hg clone http://hg.mozilla.org/releases/l10n/mozilla-release/$locale l10n/$locale - [ "$RELEASE_TAG" == "default" ] || hg -R l10n/$locale up -C -r $RELEASE_TAG - ;; - esac -done -echo "creating l10n archive..." -tar cJf l10n-$VERSION.tar.xz --exclude=.hgtags --exclude=.hgignore --exclude=.hg l10n - -# compare-locales -echo "creating compare-locales" -hg clone http://hg.mozilla.org/build/compare-locales -tar cJf compare-locales.tar.xz --exclude=.hgtags --exclude=.hgignore --exclude=.hg compare-locales - diff -r 096e59808e91 -r ff9e20146e8b xulrunner/find-external-requires.sh --- a/xulrunner/find-external-requires.sh Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,9 +0,0 @@ -#!/bin/sh -# Finds requirements provided outside of the current file set - -filelist=$( sed "s/[]['\"*?{}]/\\\\\&/g" ) -provides=$( echo "$filelist" | /usr/lib/rpm/find-provides ) -echo "$filelist" \ - | /usr/lib/rpm/find-requires \ - | grep -F -v "$provides" \ - | sort -u diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-add-glibcxx_use_cxx11_abi.patch --- a/xulrunner/mozilla-add-glibcxx_use_cxx11_abi.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-add-glibcxx_use_cxx11_abi.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-arm-disable-edsp.patch --- a/xulrunner/mozilla-arm-disable-edsp.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-arm-disable-edsp.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-arm64-libjpeg-turbo.patch --- a/xulrunner/mozilla-arm64-libjpeg-turbo.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-arm64-libjpeg-turbo.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-bmo1005535.patch --- a/xulrunner/mozilla-bmo1005535.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-bmo1005535.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-icu-strncat.patch --- a/xulrunner/mozilla-icu-strncat.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-icu-strncat.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-idldir.patch --- a/xulrunner/mozilla-idldir.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-idldir.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-language.patch --- a/xulrunner/mozilla-language.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-language.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-nongnome-proxies.patch --- a/xulrunner/mozilla-nongnome-proxies.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-nongnome-proxies.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-ntlm-full-path.patch --- a/xulrunner/mozilla-ntlm-full-path.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-ntlm-full-path.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-pkgconfig.patch --- a/xulrunner/mozilla-pkgconfig.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-pkgconfig.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-prefer_plugin_pref.patch --- a/xulrunner/mozilla-prefer_plugin_pref.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-prefer_plugin_pref.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-preferences.patch --- a/xulrunner/mozilla-preferences.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-preferences.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-repo.patch --- a/xulrunner/mozilla-repo.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-repo.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-shared-nss-db.patch --- a/xulrunner/mozilla-shared-nss-db.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-shared-nss-db.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/mozilla-skia-be-le.patch --- a/xulrunner/mozilla-skia-be-le.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../mozilla-skia-be-le.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/spellcheck.js --- a/xulrunner/spellcheck.js Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -pref("spellchecker.dictionary_path", "/usr/share/myspell"); diff -r 096e59808e91 -r ff9e20146e8b xulrunner/toolkit-download-folder.patch --- a/xulrunner/toolkit-download-folder.patch Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -../toolkit-download-folder.patch \ No newline at end of file diff -r 096e59808e91 -r ff9e20146e8b xulrunner/xulrunner-openSUSE-prefs.js --- a/xulrunner/xulrunner-openSUSE-prefs.js Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,3 +0,0 @@ -// openSUSE overrides for default settings -pref("layout.word_select.stop_at_punctuation", false); -pref("intl.locale.matchOS", true); diff -r 096e59808e91 -r ff9e20146e8b xulrunner/xulrunner-rpmlintrc --- a/xulrunner/xulrunner-rpmlintrc Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,1 +0,0 @@ -addFilter("no-jar-manifest") diff -r 096e59808e91 -r ff9e20146e8b xulrunner/xulrunner.changes --- a/xulrunner/xulrunner.changes Sat Jan 21 12:37:55 2017 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,764 +0,0 @@ -------------------------------------------------------------------- -Mon Aug 10 16:40:17 UTC 2015 - wr@rosenauer.org - -- update to xulrunner 38.2.0esr (bnc#940806) - * MFSA 2015-79/CVE-2015-4473 - Miscellaneous memory safety hazards - * MFSA 2015-80/CVE-2015-4475 (bmo#1175396) - Out-of-bounds read with malformed MP3 file - * MFSA 2015-82/CVE-2015-4478 (bmo#1105914) - Redefinition of non-configurable JavaScript object properties - * MFSA 2015-83/CVE-2015-4479/CVE-2015-4480/CVE-2015-4493 - Overflow issues in libstagefright - * MFSA 2015-84/CVE-2015-4481 (bmo1171518) - Arbitrary file overwriting through Mozilla Maintenance Service - with hard links (only affected Windows) - * MFSA 2015-85/CVE-2015-4482 (bmo#1184500) - Out-of-bounds write with Updater and malicious MAR file - (does not affect openSUSE RPM packages which do not ship the - updater) - * MFSA 2015-87/CVE-2015-4484 (bmo#1171540) - Crash when using shared memory in JavaScript - * MFSA 2015-88/CVE-2015-4491 (bmo#1184009) - Heap overflow in gdk-pixbuf when scaling bitmap images - * MFSA 2015-89/CVE-2015-4485/CVE-2015-4486 (bmo#1177948, bmo#1178148) - Buffer overflows on Libvpx when decoding WebM video - * MFSA 2015-90/CVE-2015-4487/CVE-2015-4488/CVE-2015-4489 - Vulnerabilities found through code inspection - * MFSA 2015-92/CVE-2015-4492 (bmo#1185820) - Use-after-free in XMLHttpRequest with shared workers -- rebased all patches -- dropped obsolete patches: - * mozilla-sle11.patch - * mozilla-ppc.patch - * mozilla-nullptr-gcc45.patch - * mozilla-libproxy-compat.patch - * mozilla-fix-compilation-gcc5-bmo-1021171.patch - * mozilla-fix-compilation-gcc5-bmo-1153109.patch - * mozilla-aarch64-bmo-810631.patch -- added platform specific patches from Firefox package: - * mozilla-skia-be-le.patch - * mozilla-bmo1005535.patch - * mozilla-add-glibcxx_use_cxx11_abi.patch - * mozilla-arm64-libjpeg-turbo.patch - * mozilla-shared-nss-db.patch - -------------------------------------------------------------------- -Sat Jun 27 15:26:00 UTC 2015 - wr@rosenauer.org - -- update to 31.8.0 (bnc#935979) - * MFSA 2015-59/CVE-2015-2724 - Miscellaneous memory safety hazards - * MFSA 2015-61/CVE-2015-2728 (bmo#1142210) - Type confusion in Indexed Database Manager - * MFSA 2015-64/CVE-2015-2730 (bmo#1125025) - ECDSA signature validation fails to handle some signatures correctly - (this fix is shipped by NSS 3.19.1 externally) - * MFSA 2015-65/CVE-2015-2722/CVE-2015-2733 (bmo#1166924, bmo#1169867) - Use-after-free in workers while using XMLHttpRequest - * MFSA 2015-66/CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737 - CVE-2015-2738/CVE-2015-2739/CVE-2015-2740 - Vulnerabilities found through code inspection - * MFSA 2015-69/CVE-2015-2743 (bmo#1163109) - Privilege escalation in PDF.js - * MFSA 2015-70/CVE-2015-4000 (bmo#1138554) - NSS accepts export-length DHE keys with regular DHE cipher suites - (this fix is shipped by NSS 3.19.1 externally) - * MFSA 2015-71/CVE-2015-2721 (bmo#1086145) - NSS incorrectly permits skipping of ServerKeyExchange - (this fix is shipped by NSS 3.19.1 externally) -- requires NSS 3.19.2 - --------------------------------------------------------------------- -Sun Jun 21 09:39:51 UTC 2015 - antoine.belvire@laposte.net - -- Fix compilation with GCC5 (bmo#1153109, bmo#1021171) - * add mozilla-fix-compilation-gcc5-bmo-1153109.patch - * add mozilla-fix-compilation-gcc5-bmo-1021171.patch - -------------------------------------------------------------------- -Wed May 6 07:49:53 UTC 2015 - wr@rosenauer.org - -- update to 31.7.0 (bnc#930622) - * MFSA 2015-46/CVE-2015-2708 - Miscellaneous memory safety hazards - * MFSA 2015-47/VE-2015-0797 (bmo#1080995) - Buffer overflow parsing H.264 video with Linux Gstreamer - * MFSA 2015-48/CVE-2015-2710 (bmo#1149542) - Buffer overflow with SVG content and CSS - * MFSA 2015-51/CVE-2015-2713 (bmo#1153478) - Use-after-free during text processing with vertical text enabled - * MFSA 2015-54/CVE-2015-2716 (bmo#1140537) - Buffer overflow when parsing compressed XML - * MFSA 2015-57/CVE-2011-3079 (bmo#1087565) - Privilege escalation through IPC channel messages -- strip baselibs.conf to reflect the current set of packages - -------------------------------------------------------------------- -Mon Mar 30 07:56:19 UTC 2015 - wr@rosenauer.org - -- update to 31.6.0 (bnc#925368) - * MFSA 2015-30/CVE-2015-0815 - Miscellaneous memory safety hazards - * MFSA 2015-31/CVE-2015-0813 (bmo#1106596)) - Use-after-free when using the Fluendo MP3 GStreamer plugin - * MFSA 2015-33/CVE-2015-0816 (bmo#1144991) - resource:// documents can load privileged pages - * MFSA-2015-37/CVE-2015-0807 (bmo#1111834) - CORS requests should not follow 30x redirections after preflight - * MFSA-2015-40/CVE-2015-0801 (bmo#1146339) - Same-origin bypass through anchor navigation - -------------------------------------------------------------------- -Thu Feb 19 22:56:55 UTC 2015 - wr@rosenauer.org - -- update to 31.5.0 (bnc#917597) - * MFSA 2015-11/CVE-2015-0836 - Miscellaneous memory safety hazards - * MFSA 2015-12/CVE-2015-0833 (bmo#945192) - Invoking Mozilla updater will load locally stored DLL files - (Windows only) - * MFSA 2015-16/CVE-2015-0831 (bmo#1130514) - Use-after-free in IndexedDB - * MFSA 2015-19/CVE-2015-0827 (bmo#1117304) - Out-of-bounds read and write while rendering SVG content - * MFSA 2015-24/CVE-2015-0822 (bmo#1110557) - Reading of local files through manipulation of form autocomplete - -------------------------------------------------------------------- -Sat Jan 10 17:33:51 UTC 2015 - wr@rosenauer.org - -- update to 31.4.0 (bnc#910669) - * MFSA 2015-01/CVE-2014-8634/CVE-2014-8635 - Miscellaneous memory safety hazards - * MFSA 2015-03/CVE-2014-8638 (bmo#1080987) - sendBeacon requests lack an Origin header - * MFSA 2015-04/CVE-2014-8639 (bmo#1095859) - Cookie injection through Proxy Authenticate responses - * MFSA 2015-06/CVE-2014-8641 (bmo#1108455) - Read-after-free in WebRTC - -------------------------------------------------------------------- -Wed Dec 31 16:01:40 UTC 2014 - dimstar@opensuse.org - -- Do not require mozilla-js-32bit from xulrunner-32bit: since we - have shared_js currently set to 0, mozilla-js(-32bit) is not - being built. - -------------------------------------------------------------------- -Sun Nov 30 12:15:59 UTC 2014 - wr@rosenauer.org - -- update to 31.3.0 (bnc#908009) - * MFSA 2014-83/CVE-2014-1587 - Miscellaneous memory safety hazards - * MFSA 2014-85/CVE-2014-1590 (bmo#1087633) - XMLHttpRequest crashes with some input streams - * MFSA 2014-87/CVE-2014-1592 (bmo#1088635) - Use-after-free during HTML5 parsing - * MFSA 2014-88/CVE-2014-1593 (bmo#1085175) - Buffer overflow while parsing media content - * MFSA 2014-89/CVE-2014-1594 (bmo#1074280) - Bad casting from the BasicThebesLayer to BasicContainerLayer -- readded mozilla-pkgconfig.patch - -------------------------------------------------------------------- -Thu Nov 13 08:37:50 UTC 2014 - guillaume@opensuse.org - -- Fix %arm build (fix CFLAGS) -- Disable elf-hack for aarch64 - -------------------------------------------------------------------- -Sat Nov 1 13:08:20 UTC 2014 - wr@rosenauer.org - -- update to 31.2.0 -- synchronize patchset with firefox-esr -- removed add-plugins.sh in favor of using a pref to use myspell - -------------------------------------------------------------------- -Wed Sep 18 14:39:34 UTC 2013 - wr@rosenauer.org - -- update to 24.0 (bnc#840485) - * MFSA 2013-76/CVE-2013-1718/CVE-2013-1719 - Miscellaneous memory safety hazards - * MFSA 2013-77/CVE-2013-1720 (bmo#888820) - Improper state in HTML5 Tree Builder with templates - * MFSA 2013-78/CVE-2013-1721 (bmo#890277) - Integer overflow in ANGLE library - * MFSA 2013-79/CVE-2013-1722 (bmo#893308) - Use-after-free in Animation Manager during stylesheet cloning - * MFSA 2013-80/CVE-2013-1723 (bmo#891292) - NativeKey continues handling key messages after widget is destroyed - * MFSA 2013-81/CVE-2013-1724 (bmo#894137) - Use-after-free with select element - * MFSA 2013-82/CVE-2013-1725 (bmo#876762) - Calling scope for new Javascript objects can lead to memory corruption - * MFSA 2013-85/CVE-2013-1728 (bmo#883686) - Uninitialized data in IonMonkey - * MFSA 2013-88/CVE-2013-1730 (bmo#851353) - Compartment mismatch re-attaching XBL-backed nodes - * MFSA 2013-89/CVE-2013-1732 (bmo#883514) - Buffer overflow with multi-column, lists, and floats - * MFSA 2013-90/CVE-2013-1735/CVE-2013-1736 (bmo#898871, bmo#906301) - Memory corruption involving scrolling - * MFSA 2013-91/CVE-2013-1737 (bmo#907727) - User-defined properties on DOM proxies get the wrong "this" object - * MFSA 2013-92/CVE-2013-1738 (bmo#887334, bmo#882897) - GC hazard with default compartments and frame chain restoration -- require NSPR 4.10 and NSS 3.15.1 - -------------------------------------------------------------------- -Fri Aug 2 10:56:43 UTC 2013 - wr@rosenauer.org - -- update to 17.0.8esr (bnc#833389) - * MFSA 2013-63/CVE-2013-1701 - Miscellaneous memory safety hazards - * MFSA 2013-68/CVE-2013-1709 (bmo#838253) - Document URI misrepresentation and masquerading - * MFSA 2013-69/CVE-2013-1710 (bmo#871368) - CRMF requests allow for code execution and XSS attacks - * MFSA 2013-72/CVE-2013-1713 (bmo#887098) - Wrong principal used for validating URI for some Javascript - components - * MFSA 2013-73/CVE-2013-1714 (bmo#879787) - Same-origin bypass with web workers and XMLHttpRequest - * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397) - Local Java applets may read contents of local file system - -------------------------------------------------------------------- -Mon Jun 24 15:26:27 UTC 2013 - wr@rosenauer.org - -- update to 17.0.7esr (bnc#825935) - * MFSA 2013-49/CVE-2013-1682 - Miscellaneous memory safety hazards - * MFSA 2013-50/CVE-2013-1684/CVE-2013-1685/CVE-2013-1686 - Memory corruption found using Address Sanitizer - * MFSA 2013-51/CVE-2013-1687 (bmo#863933, bmo#866823) - Privileged content access and execution via XBL - * MFSA 2013-53/CVE-2013-1690 (bmo#857883) - Execution of unmapped memory through onreadystatechange event - * MFSA 2013-54/CVE-2013-1692 (bmo#866915) - Data in the body of XHR HEAD requests leads to CSRF attacks - * MFSA 2013-55/CVE-2013-1693 (bmo#711043) - SVG filters can lead to information disclosure - * MFSA 2013-56/CVE-2013-1694 (bmo#848535) - PreserveWrapper has inconsistent behavior - * MFSA 2013-59/CVE-2013-1697 (bmo#858101) - XrayWrappers can be bypassed to run user defined methods in a - privileged context - -------------------------------------------------------------------- -Tue Jun 4 16:24:51 UTC 2013 - dvaleev@suse.com - -- Fix build on powerpc (ppc-xpcshell.patch) - -------------------------------------------------------------------- -Fri May 10 17:27:23 UTC 2013 - wr@rosenauer.org - -- update to 17.0.6esr (bnc#819204) - * MFSA 2013-41/CVE-2013-0801/CVE-2013-1669 - Miscellaneous memory safety hazards - * MFSA 2013-42/CVE-2013-1670 (bmo#853709) - Privileged access for content level constructor - * MFSA 2013-46/CVE-2013-1674 (bmo#860971) - Use-after-free with video and onresize event - * MFSA 2013-47/CVE-2013-1675 (bmo#866825) - Uninitialized functions in DOMSVGZoomEvent - * MFSA 2013-48/CVE-2013-1676/CVE-2013-1677/CVE-2013-1678/ - CVE-2013-1679/CVE-2013-1680/CVE-2013-1681 - Memory corruption found using Address Sanitizer - -------------------------------------------------------------------- -Fri Mar 29 16:27:59 UTC 2013 - wr@rosenauer.org - -- update to 17.0.5esr (bnc#813026) - * requires NSPR 4.9.5 and NSS 3.14.3 - * MFSA 2013-30/CVE-2013-0788 - Miscellaneous memory safety hazards - * MFSA 2013-31/CVE-2013-0800 (bmo#825721) - Out-of-bounds write in Cairo library - * MFSA 2013-35/CVE-2013-0796 (bmo#827106) - WebGL crash with Mesa graphics driver on Linux - * MFSA 2013-36/CVE-2013-0795 (bmo#825697) - Bypass of SOW protections allows cloning of protected nodes - * MFSA 2013-37/CVE-2013-0794 (bmo#626775) - Bypass of tab-modal dialog origin disclosure - * MFSA 2013-38/CVE-2013-0793 (bmo#803870) - Cross-site scripting (XSS) using timed history navigations - -------------------------------------------------------------------- -Fri Mar 8 09:00:09 UTC 2013 - wr@rosenauer.org - -- update to 17.0.4esr (bnc#808243) - * MFSA 2013-29/CVE-2013-0787 (bmo#848644) - Use-after-free in HTML Editor - -------------------------------------------------------------------- -Sat Feb 16 17:38:21 UTC 2013 - wr@rosenauer.org - -- update to 17.0.3esr (bnc#804248) - * MFSA 2013-21/CVE-2013-0783 - Miscellaneous memory safety hazards - * MFSA 2013-24/CVE-2013-0773 (bmo#809652) - Web content bypass of COW and SOW security wrappers - * MFSA 2013-25/CVE-2013-0774 (bmo#827193) - Privacy leak in JavaScript Workers - * MFSA 2013-26/CVE-2013-0775 (bmo#831095) - Use-after-free in nsImageLoadingContent - * MFSA 2013-27/CVE-2013-0776 (bmo#796475) - Phishing on HTTPS connection through malicious proxy - * MFSA 2013-28/CVE-2013-0780/CVE-2013-0782 - Use-after-free, out of bounds read, and buffer overflow issues - found using Address Sanitizer - -------------------------------------------------------------------- -Sat Jan 5 14:46:06 UTC 2013 - wr@rosenauer.org - -- update to 17.0.2esr (bnc#796895) - * MFSA 2013-01/CVE-2013-0749/CVE-2013-0769/CVE-2013-0770 - Miscellaneous memory safety hazards - * MFSA 2013-02/CVE-2013-0760/CVE-2013-0762/CVE-2013-0766/CVE-2013-0767 - CVE-2013-0761/CVE-2013-0763/CVE-2013-0771/CVE-2012-5829 - Use-after-free and buffer overflow issues found using Address Sanitizer - * MFSA 2013-03/CVE-2013-0768 (bmo#815795) - Buffer Overflow in Canvas - * MFSA 2013-04/CVE-2012-0759 (bmo#802026) - URL spoofing in addressbar during page loads - * MFSA 2013-05/CVE-2013-0744 (bmo#814713) - Use-after-free when displaying table with many columns and column groups - * MFSA 2013-07/CVE-2013-0764 (bmo#804237) - Crash due to handling of SSL on threads - * MFSA 2013-08/CVE-2013-0745 (bmo#794158) - AutoWrapperChanger fails to keep objects alive during garbage collection - * MFSA 2013-09/CVE-2013-0746 (bmo#816842) - Compartment mismatch with quickstubs returned values - * MFSA 2013-10/CVE-2013-0747 (bmo#733305) - Event manipulation in plugin handler to bypass same-origin policy - * MFSA 2013-11/CVE-2013-0748 (bmo#806031) - Address space layout leaked in XBL objects - * MFSA 2013-12/CVE-2013-0750 (bmo#805121) - Buffer overflow in Javascript string concatenation - * MFSA 2013-13/CVE-2013-0752 (bmo#805024) - Memory corruption in XBL with XML bindings containing SVG - * MFSA 2013-14/CVE-2013-0757 (bmo#813901) - Chrome Object Wrapper (COW) bypass through changing prototype - * MFSA 2013-15/CVE-2013-0758 (bmo#813906) - Privilege escalation through plugin objects - * MFSA 2013-16/CVE-2013-0753 (bmo#814001) - Use-after-free in serializeToStream - * MFSA 2013-17/CVE-2013-0754 (bmo#814026) - Use-after-free in ListenerManager - * MFSA 2013-18/CVE-2013-0755 (bmo#814027) - Use-after-free in Vibrate - * MFSA 2013-19/CVE-2013-0756 (bmo#814029) - Use-after-free in Javascript Proxy objects -- requires NSS 3.14.1 (MFSA 2013-20, CVE-2013-0743) -- build on SLE11 - * mozilla-gcc43-enums.patch - * mozilla-gcc43-template_hacks.patch - * mozilla-gcc43-templates_instantiation.patch - -------------------------------------------------------------------- -Thu Nov 29 20:04:34 UTC 2012 - wr@rosenauer.org - -- update to 17.0.1 - * regression/compatibility fixes - -------------------------------------------------------------------- -Tue Nov 20 20:15:23 UTC 2012 - wr@rosenauer.org - -- update to 17.0 (bnc#790140) - * MFSA 2012-91/CVE-2012-5842/CVE-2012-5843 - Miscellaneous memory safety hazards - * MFSA 2012-92/CVE-2012-4202 (bmo#758200) - Buffer overflow while rendering GIF images - * MFSA 2012-93/CVE-2012-4201 (bmo#747607) - evalInSanbox location context incorrectly applied - * MFSA 2012-94/CVE-2012-5836 (bmo#792857) - Crash when combining SVG text on path with CSS - * MFSA 2012-95/CVE-2012-4203 (bmo#765628) - Javascript: URLs run in privileged context on New Tab page - * MFSA 2012-96/CVE-2012-4204 (bmo#778603) - Memory corruption in str_unescape - * MFSA 2012-97/CVE-2012-4205 (bmo#779821) - XMLHttpRequest inherits incorrect principal within sandbox - * MFSA 2012-99/CVE-2012-4208 (bmo#798264) - XrayWrappers exposes chrome-only properties when not in chrome - compartment - * MFSA 2012-100/CVE-2012-5841 (bmo#805807) - Improper security filtering for cross-origin wrappers - * MFSA 2012-101/CVE-2012-4207 (bmo#801681) - Improper character decoding in HZ-GB-2312 charset - * MFSA 2012-102/CVE-2012-5837 (bmo#800363) - Script entered into Developer Toolbar runs with chrome privileges - * MFSA 2012-103/CVE-2012-4209 (bmo#792405) - Frames can shadow top.location - * MFSA 2012-104/CVE-2012-4210 (bmo#796866) - CSS and HTML injection through Style Inspector - * MFSA 2012-105/CVE-2012-4214/CVE-2012-4215/CVE-2012-4216/ - CVE-2012-5829/CVE-2012-5839/CVE-2012-5840/CVE-2012-4212/ - CVE-2012-4213/CVE-2012-4217/CVE-2012-4218 - Use-after-free and buffer overflow issues found using Address - Sanitizer - * MFSA 2012-106/CVE-2012-5830/CVE-2012-5833/CVE-2012-5835/CVE-2012-5838 - Use-after-free, buffer overflow, and memory corruption issues - found using Address Sanitizer -- rebased patches -- disabled WebRTC since build is broken (bmo#776877) - -------------------------------------------------------------------- -Wed Oct 24 08:28:49 UTC 2012 - wr@rosenauer.org - -- update to 16.0.2 (bnc#786522) - * MFSA 2012-90/CVE-2012-4194/CVE-2012-4195/CVE-2012-4196 - (bmo#800666, bmo#793121, bmo#802557) - Fixes for Location object issues - -------------------------------------------------------------------- -Thu Oct 11 01:50:19 UTC 2012 - wr@rosenauer.org - -- update to 16.0.1 (bnc#783533) - * MFSA 2012-88/CVE-2012-4191 (bmo#798045) - Miscellaneous memory safety hazards - * MFSA 2012-89/CVE-2012-4192/CVE-2012-4193 (bmo#799952, bmo#720619) - defaultValue security checks not applied - -------------------------------------------------------------------- -Sun Oct 7 21:41:01 UTC 2012 - wr@rosenauer.org - -- update to 16.0 (bnc#783533) - * MFSA 2012-74/CVE-2012-3982/CVE-2012-3983 - Miscellaneous memory safety hazards - * MFSA 2012-75/CVE-2012-3984 (bmo#575294) - select element persistance allows for attacks - * MFSA 2012-76/CVE-2012-3985 (bmo#655649) - Continued access to initial origin after setting document.domain - * MFSA 2012-77/CVE-2012-3986 (bmo#775868) - Some DOMWindowUtils methods bypass security checks - * MFSA 2012-79/CVE-2012-3988 (bmo#725770) - DOS and crash with full screen and history navigation - * MFSA 2012-80/CVE-2012-3989 (bmo#783867) - Crash with invalid cast when using instanceof operator - * MFSA 2012-81/CVE-2012-3991 (bmo#783260) - GetProperty function can bypass security checks - * MFSA 2012-82/CVE-2012-3994 (bmo#765527) - top object and location property accessible by plugins - * MFSA 2012-83/CVE-2012-3993/CVE-2012-4184 (bmo#768101, bmo#780370) - Chrome Object Wrapper (COW) does not disallow acces to privileged - functions or properties - * MFSA 2012-84/CVE-2012-3992 (bmo#775009) - Spoofing and script injection through location.hash - * MFSA 2012-85/CVE-2012-3995/CVE-2012-4179/CVE-2012-4180/ - CVE-2012-4181/CVE-2012-4182/CVE-2012-4183 - Use-after-free, buffer overflow, and out of bounds read issues - found using Address Sanitizer - * MFSA 2012-86/CVE-2012-4185/CVE-2012-4186/CVE-2012-4187/ - CVE-2012-4188 - Heap memory corruption issues found using Address Sanitizer - * MFSA 2012-87/CVE-2012-3990 (bmo#787704) - Use-after-free in the IME State Manager -- requires NSPR 4.9.2 -- removed upstreamed mozilla-crashreporter-restart-args.patch -- updated translations-other with new languages - -------------------------------------------------------------------- -Sun Aug 26 13:48:04 UTC 2012 - wr@rosenauer.org - -- update to 15.0 (bnc#777588) - * MFSA 2012-57/CVE-2012-1970 - Miscellaneous memory safety hazards - * MFSA 2012-58/CVE-2012-1972/CVE-2012-1973/CVE-2012-1974/CVE-2012-1975 - CVE-2012-1976/CVE-2012-3956/CVE-2012-3957/CVE-2012-3958/CVE-2012-3959 - CVE-2012-3960/CVE-2012-3961/CVE-2012-3962/CVE-2012-3963/CVE-2012-3964 - Use-after-free issues found using Address Sanitizer - * MFSA 2012-59/CVE-2012-1956 (bmo#756719) - Location object can be shadowed using Object.defineProperty - * MFSA 2012-60/CVE-2012-3965 (bmo#769108) - Escalation of privilege through about:newtab - * MFSA 2012-61/CVE-2012-3966 (bmo#775794, bmo#775793) - Memory corruption with bitmap format images with negative height - * MFSA 2012-62/CVE-2012-3967/CVE-2012-3968 - WebGL use-after-free and memory corruption - * MFSA 2012-63/CVE-2012-3969/CVE-2012-3970 - SVG buffer overflow and use-after-free issues - * MFSA 2012-64/CVE-2012-3971 - Graphite 2 memory corruption - * MFSA 2012-65/CVE-2012-3972 (bmo#746855) - Out-of-bounds read in format-number in XSLT - * MFSA 2012-66/CVE-2012-3973 (bmo#757128) - HTTPMonitor extension allows for remote debugging without explicit - activation - * MFSA 2012-68/CVE-2012-3975 (bmo#770684) - DOMParser loads linked resources in extensions when parsing - text/html - * MFSA 2012-69/CVE-2012-3976 (bmo#768568) - Incorrect site SSL certificate data display - * MFSA 2012-70/CVE-2012-3978 (bmo#770429) - Location object security checks bypassed by chrome code - * MFSA 2012-72/CVE-2012-3980 (bmo#771859) - Web console eval capable of executing chrome-privileged code -- fix HTML5 video crash with GStreamer enabled (bmo#761030) -- fixed filelist - -------------------------------------------------------------------- -Fri Aug 17 13:09:49 UTC 2012 - dmueller@suse.com - -- fix build on ARM: - * disable crashreporter, it does not build - * reduce debuginfo during built to avoid running out of memory - -------------------------------------------------------------------- -Sat Jul 14 19:33:44 UTC 2012 - wr@rosenauer.org - -- update to 14.0.1 (bnc#771583) - * MFSA 2012-42/CVE-2012-1949/CVE-2012-1948 - Miscellaneous memory safety hazards - * MFSA 2012-43/CVE-2012-1950 - Incorrect URL displayed in addressbar through drag and drop - * MFSA 2012-44/CVE-2012-1951/CVE-2012-1954/CVE-2012-1953/CVE-2012-1952 - Gecko memory corruption - * MFSA 2012-45/CVE-2012-1955 (bmo#757376) - Spoofing issue with location - * MFSA 2012-46/CVE-2012-1966 (bmo#734076) - XSS through data: URLs - * MFSA 2012-47/CVE-2012-1957 (bmo#750096) - Improper filtering of javascript in HTML feed-view - * MFSA 2012-48/CVE-2012-1958 (bmo#750820) - use-after-free in nsGlobalWindow::PageHidden - * MFSA 2012-49/CVE-2012-1959 (bmo#754044, bmo#737559) - Same-compartment Security Wrappers can be bypassed - * MFSA 2012-50/CVE-2012-1960 (bmo#761014) - Out of bounds read in QCMS - * MFSA 2012-51/CVE-2012-1961 (bmo#761655) - X-Frame-Options header ignored when duplicated - * MFSA 2012-52/CVE-2012-1962 (bmo#764296) - JSDependentString::undepend string conversion results in memory - corruption - * MFSA 2012-53/CVE-2012-1963 (bmo#767778) - Content Security Policy 1.0 implementation errors cause data - leakage - * MFSA 2012-55/CVE-2012-1965 (bmo#758990) - feed: URLs with an innerURI inherit security context of page - * MFSA 2012-56/CVE-2012-1967 (bmo#758344) - Code execution through javascript: URLs -- license change from tri license to MPL-2.0 -- require NSS 3.13.5 -- PPC fixes: - * reenabled mozilla-yarr-pcre.patch to fix build for PPC - * add patches for bmo#750620 and bmo#746112 - * fix xpcshell segfault on ppc -- build plugin-container on every arch - -------------------------------------------------------------------- -Fri Jun 15 12:40:23 UTC 2012 - wr@rosenauer.org - -- update to 13.0.1 - * bugfix release - -------------------------------------------------------------------- -Sat Jun 2 09:16:34 UTC 2012 - wr@rosenauer.org - -- update to 13.0 (bnc#765204) - * MFSA 2012-34/CVE-2012-1938/CVE-2012-1937/CVE-2011-3101 - Miscellaneous memory safety hazards - * MFSA 2012-36/CVE-2012-1944 (bmo#751422) - Content Security Policy inline-script bypass - * MFSA 2012-37/CVE-2012-1945 (bmo#670514) - Information disclosure though Windows file shares and shortcut - files - * MFSA 2012-38/CVE-2012-1946 (bmo#750109) - Use-after-free while replacing/inserting a node in a document - * MFSA 2012-40/CVE-2012-1947/CVE-2012-1940/CVE-2012-1941 - Buffer overflow and use-after-free issues found using Address - Sanitizer -- require NSS 3.13.4 - * MFSA 2012-39/CVE-2012-0441 (bmo#715073) -- reenabled crashreporter for Factory/12.2 - (fixed in mozilla-gcc47.patch) - -------------------------------------------------------------------- -Sat Apr 21 10:03:42 UTC 2012 - wr@rosenauer.org - -- update to 12.0 (bnc#758408) - * rebased patches - * MFSA 2012-20/CVE-2012-0467/CVE-2012-0468 - Miscellaneous memory safety hazards - * MFSA 2012-22/CVE-2012-0469 (bmo#738985) - use-after-free in IDBKeyRange - * MFSA 2012-23/CVE-2012-0470 (bmo#734288) - Invalid frees causes heap corruption in gfxImageSurface - * MFSA 2012-24/CVE-2012-0471 (bmo#715319) - Potential XSS via multibyte content processing errors - * MFSA 2012-25/CVE-2012-0472 (bmo#744480) - Potential memory corruption during font rendering using cairo-dwrite - * MFSA 2012-26/CVE-2012-0473 (bmo#743475) - WebGL.drawElements may read illegal video memory due to - FindMaxUshortElement error - * MFSA 2012-27/CVE-2012-0474 (bmo#687745, bmo#737307) - Page load short-circuit can lead to XSS - * MFSA 2012-28/CVE-2012-0475 (bmo#694576) - Ambiguous IPv6 in Origin headers may bypass webserver access - restrictions - * MFSA 2012-29/CVE-2012-0477 (bmo#718573) - Potential XSS through ISO-2022-KR/ISO-2022-CN decoding issues - * MFSA 2012-30/CVE-2012-0478 (bmo#727547) - Crash with WebGL content using textImage2D - * MFSA 2012-31/CVE-2011-3062 (bmo#739925) - Off-by-one error in OpenType Sanitizer - * MFSA 2012-32/CVE-2011-1187 (bmo#624621) - HTTP Redirections and remote content can be read by javascript errors - * MFSA 2012-33/CVE-2012-0479 (bmo#714631) - Potential site identity spoofing when loading RSS and Atom feeds -- added mozilla-libnotify.patch to allow fallback from libnotify - to xul based events if no notification-daemon is running -- gcc 4.7 fixes - * mozilla-gcc47.patch - * disabled crashreporter temporarily for Factory - -------------------------------------------------------------------- -Fri Mar 9 21:49:05 UTC 2012 - wr@rosenauer.org - -- update to version 11.0 (bnc#750044) - * MFSA 2012-13/CVE-2012-0455 (bmo#704354) - XSS with Drag and Drop and Javascript: URL - * MFSA 2012-14/CVE-2012-0456/CVE-2012-0457 (bmo#711653, #720103) - SVG issues found with Address Sanitizer - * MFSA 2012-15/CVE-2012-0451 (bmo#717511) - XSS with multiple Content Security Policy headers - * MFSA 2012-16/CVE-2012-0458 - Escalation of privilege with Javascript: URL as home page - * MFSA 2012-17/CVE-2012-0459 (bmo#723446) - Crash when accessing keyframe cssText after dynamic modification - * MFSA 2012-18/CVE-2012-0460 (bmo#727303) - window.fullScreen writeable by untrusted content - * MFSA 2012-19/CVE-2012-0461/CVE-2012-0462/CVE-2012-0464/ - CVE-2012-0463 - Miscellaneous memory safety hazards -- fix build on ARM -- disable jemalloc on s390(x) - -------------------------------------------------------------------- -Thu Feb 16 08:51:42 UTC 2012 - wr@rosenauer.org - -- update to version 10.0.2 (bnc#747328) - * CVE-2011-3026 (bmo#727401) - libpng: integer overflow leading to heap-buffer overflow - -------------------------------------------------------------------- -Thu Feb 9 10:20:49 UTC 2012 - wr@rosenauer.org - -- update to version 10.0.1 (bnc#746616) - * MFSA 2012-10/CVE-2012-0452 (bmo#724284) - use after free in nsXBLDocumentInfo::ReadPrototypeBindings - -------------------------------------------------------------------- -Tue Feb 7 10:40:58 UTC 2012 - dvaleev@suse.com - -- Use YARR interpreter instead of PCRE on platforms where YARR JIT - is not supported, since PCRE doesnt build (bmo#691898) -- fix ppc64 build (bmo#703534) - -------------------------------------------------------------------- -Mon Jan 30 09:43:21 UTC 2012 - wr@rosenauer.org - -- update to version 10.0 (bnc#744275) - * MFSA 2012-01/CVE-2012-0442/CVE-2012-0443 - Miscellaneous memory safety hazards - * MFSA 2012-03/CVE-2012-0445 (bmo#701071) -