6c4371a726
- Update to version 128.13.0: + CVE-2025-8027: JavaScript engine only wrote partial return value to stack + CVE-2025-8028: Large branch table could lead to truncated instruction + CVE-2025-8029: javascript: URLs executed on object and embed tags + CVE-2025-8030: Potential user-assisted code execution in “Copy as cURL” command + CVE-2025-8031: Incorrect URL stripping in CSP reports + CVE-2025-8032: XSLT documents could bypass CSP + CVE-2025-8033: Incorrect JavaScript state machine for generators + CVE-2025-8034: Memory safety bugs fixed in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141 + CVE-2025-8035: Memory safety bugs fixed in Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141
Bjørn Lie2025-07-25 11:52:19 +00:00
999805c065
Accepting request 1290730 from GNOME:Factory
Ana Guerrero2025-07-06 15:04:20 +00:00
32f2364d95
- Update to version 128.12.0: + CVE-2025-6424: Use-after-free in FontFaceSet + CVE-2025-6425: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID + CVE-2025-6426: No warning when opening executable terminal files on macOS + CVE-2025-6429: Incorrect parsing of URLs could have allowed embedding of youtube.com + CVE-2025-6430: Content-Disposition header ignored when a file is included in an embed or object tag - Changes from version 128.11.0: + CVE-2025-5283: Double-free in libvpx encoder + CVE-2025-5263: Error handling for script execution was incorrectly isolated from web content + CVE-2025-5264: Potential local code execution in “Copy as cURL” command + CVE-2025-5265: Potential local code execution in “Copy as cURL” command + CVE-2025-5266: Script element events leaked cross-origin resource status + CVE-2025-5267: Clickjacking vulnerability could have led to leaking saved payment card details + CVE-2025-5268: Memory safety bugs fixed in Firefox 139, Thunderbird 139, Firefox ESR 128.11, and Thunderbird 128.11 + CVE-2025-5269: Memory safety bug fixed in Firefox ESR 128.11 and Thunderbird 128.11
Bjørn Lie2025-07-04 19:00:59 +00:00
a5a2db979a
Sync from SUSE:SLFO:Main mozjs128 revision 7a0de0607b56b7013e084201e6c2b7ae
Adrian Schröter2025-02-20 09:55:50 +01:00
9db829524e
Accepting request 1244830 from GNOME:Factory
Ana Guerrero2025-02-11 20:21:22 +00:00
3d7a27a43d
- Update to version 128.7.0: + Various security fixes: CVE-2025-1009, CVE-2025-1010, CVE-2025-1011, CVE-2025-1012, CVE-2024-11704, CVE-2025-1013, CVE-2025-1014, CVE-2025-1016, CVE-2025-1017. - Changes from version 128.6.0: + Various security fixes: CVE-2025-0237, CVE-2025-0238, CVE-2025-0239, CVE-2025-0240, CVE-2025-0241, CVE-2025-0242, CVE-2025-0243.
Bjørn Lie2025-02-10 17:23:08 +00:00
b30031f867
Accepting request 1231636 from GNOME:Factory
Ana Guerrero2024-12-18 19:08:43 +00:00
500bcb0b5a
Add mozjs115-CVE-2024-11498.patch: Backporting bf4781a2 from upstream, Check height limit in modular trees. Also rewrite the implementation to use iterative checking instead of recursive checking of tree property values, to ensure stack usage is low. Before, it was possible for appropriately-crafted files to use a significant amount of stack. (CVE-2024-11498, bsc#1233786) Add mozjs115-CVE-2024-11403.patch: Backporting 9cc451b9 from upstream, Port the Huffman lookup table size fix from brunsli. (CVE-2024-11403, bsc#1233766)
Dominique Leuenberger2024-12-17 08:03:21 +00:00
cc8c4869bc
Accepting request 1231258 from GNOME:Factory
Ana Guerrero2024-12-16 18:09:22 +00:00
58e0c564f1
Accepting request 1231247 from home:qzhao:branches:GNOME:Factory
Bjørn Lie2024-12-15 18:17:34 +00:00
6db4aa5227
Accepting request 1227992 from GNOME:Factory
Ana Guerrero2024-12-04 14:26:26 +00:00
be3dc18cb1
- Update to version 128.3.1: * CVE-2024-9680: Use-after-free in Animation timeline - Changes from version 128.3.0: * CVE-2024-9392: Compromised content process can bypass site isolation * CVE-2024-9393: Cross-origin access to PDF contents through multipart responses * CVE-2024-9394: Cross-origin access to JSON contents through multipart responses * CVE-2024-8900: Clipboard write permission bypass * CVE-2024-9396: Potential memory corruption may occur when cloning certain objects * CVE-2024-9397: Potential directory upload bypass via clickjacking * CVE-2024-9398: External protocol handlers could be enumerated via popups * CVE-2024-9399: Specially crafted WebTransport requests could lead to denial of service * CVE-2024-9400: Potential memory corruption during JIT compilation * CVE-2024-9401: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 * CVE-2024-9402: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3
Dominique Leuenberger2024-10-11 13:42:17 +00:00
3dde0dbb73
Accepting request 1205195 from GNOME:Factory
Ana Guerrero2024-10-02 19:34:48 +00:00
97bf19a483
Accepting request 1203624 from GNOME:Factory
Ana Guerrero2024-09-25 19:57:29 +00:00
411ff4013e
- Update to version 128.2.0: + CVE-2024-8385: WASM type confusion involving ArrayTypes + CVE-2024-8381: Type confusion when looking up a property name in a "with" block + CVE-2024-8382: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran + CVE-2024-8383: Firefox did not ask before openings news: links in an external application + CVE-2024-8384: Garbage collection could mis-color cross-compartment objects in OOM conditions + CVE-2024-8386: SelectElements could be shown over another site if popups are allowed + CVE-2024-8387: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 - Drop 0001-Skip-failing-tests-on-ppc64-and-s390x.patch: Fixed upstream.
Bjørn Lie2024-09-25 15:31:59 +00:00
02d356f0a3
Accepting request 1198684 from GNOME:Factory
Ana Guerrero2024-09-05 13:46:49 +00:00