forked from pool/MozillaFirefox
a9628fa6ae
* https://www.mozilla.org/en-US/firefox/74.0/releasenotes/ MFSA 2020-08 (bsc#1166238) * CVE-2020-6805 (bmo#1610880) Use-after-free when removing data about origins * CVE-2020-6806 (bmo#1612308) BodyStream::OnInputStreamReady was missing protections against state confusion * CVE-2020-6807 (bmo#1614971) Use-after-free in cubeb during stream destruction * CVE-2020-6808 (bmo#1247968) URL Spoofing via javascript: URL * CVE-2020-6809 (bmo#1420296) Web Extensions with the all-urls permission could access local files * CVE-2020-6810 (bmo#1432856) Focusing a popup while in fullscreen could have obscured the fullscreen notification * CVE-2020-6811 (bmo#1607742) Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection * CVE-2019-20503 (bmo#1613765) Out of bounds reads in sctp_load_addresses_from_init * CVE-2020-6812 (bmo#1616661) The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission * CVE-2020-6813 (bmo#1605814) @import statements in CSS could bypass the Content Security Policy nonce feature * CVE-2020-6814 (bmo#1592078,bmo#1604847,bmo#1608256,bmo#1612636, OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=809
119 lines
3.8 KiB
Diff
119 lines
3.8 KiB
Diff
|
|
# HG changeset patch
|
|
# User Mike Hommey <mh+mozilla@glandium.org>
|
|
# Date 1526871862 -32400
|
|
# Node ID 94f21505ff13cd089f7129cd24927cf8b31a0f43
|
|
# Parent 71b9d492b739602dbfe713fd4de3205e9d485f18
|
|
Bug 1463035 - Remove MOZ_SIGNAL_TRAMPOLINE. r?darchons
|
|
|
|
For some reason, GNU as is not happy with the assembly generated after
|
|
bug 1238661 anymore on Debian armel.
|
|
|
|
OTOH, as mentioned in bug 1238661 comment 4, we actually don't need this
|
|
workaround anymore, so let's just kill it.
|
|
|
|
diff --git a/mfbt/moz.build b/mfbt/moz.build
|
|
--- a/mfbt/moz.build
|
|
+++ b/mfbt/moz.build
|
|
@@ -131,20 +131,16 @@ EXPORTS["double-conversion"] = [
|
|
LOCAL_INCLUDES += [
|
|
'/mfbt/double-conversion',
|
|
]
|
|
|
|
if CONFIG['OS_ARCH'] == 'WINNT':
|
|
EXPORTS.mozilla += [
|
|
'WindowsVersion.h',
|
|
]
|
|
-elif CONFIG['OS_ARCH'] == 'Linux':
|
|
- EXPORTS.mozilla += [
|
|
- 'LinuxSignal.h',
|
|
- ]
|
|
|
|
UNIFIED_SOURCES += [
|
|
'Assertions.cpp',
|
|
'ChaosMode.cpp',
|
|
'double-conversion/double-conversion/bignum-dtoa.cc',
|
|
'double-conversion/double-conversion/bignum.cc',
|
|
'double-conversion/double-conversion/cached-powers.cc',
|
|
'double-conversion/double-conversion/double-to-string.cc',
|
|
diff --git a/mozglue/baseprofiler/core/platform-linux-android.cpp b/mozglue/baseprofiler/core/platform-linux-android.cpp
|
|
--- a/mozglue/baseprofiler/core/platform-linux-android.cpp
|
|
+++ b/mozglue/baseprofiler/core/platform-linux-android.cpp
|
|
@@ -55,17 +55,16 @@
|
|
#ifdef __GLIBC__
|
|
# include <execinfo.h> // backtrace, backtrace_symbols
|
|
#endif // def __GLIBC__
|
|
#include <strings.h> // index
|
|
#include <errno.h>
|
|
#include <stdarg.h>
|
|
|
|
#include "prenv.h"
|
|
-#include "mozilla/LinuxSignal.h"
|
|
#include "mozilla/PodOperations.h"
|
|
#include "mozilla/DebugOnly.h"
|
|
|
|
#include <string.h>
|
|
#include <list>
|
|
|
|
using namespace mozilla;
|
|
|
|
@@ -266,17 +265,17 @@ Sampler::Sampler(PSLockRef aLock)
|
|
|
|
// NOTE: We don't initialize LUL here, instead initializing it in
|
|
// SamplerThread's constructor. This is because with the
|
|
// profiler_suspend_and_sample_thread entry point, we want to be able to
|
|
// sample without waiting for LUL to be initialized.
|
|
|
|
// Request profiling signals.
|
|
struct sigaction sa;
|
|
- sa.sa_sigaction = MOZ_SIGNAL_TRAMPOLINE(SigprofHandler);
|
|
+ sa.sa_sigaction = SigprofHandler;
|
|
sigemptyset(&sa.sa_mask);
|
|
sa.sa_flags = SA_RESTART | SA_SIGINFO;
|
|
if (sigaction(SIGPROF, &sa, &mOldSigprofHandler) != 0) {
|
|
MOZ_CRASH("Error installing SIGPROF handler in the profiler");
|
|
}
|
|
}
|
|
|
|
void Sampler::Disable(PSLockRef aLock) {
|
|
diff --git a/tools/profiler/core/platform-linux-android.cpp b/tools/profiler/core/platform-linux-android.cpp
|
|
--- a/tools/profiler/core/platform-linux-android.cpp
|
|
+++ b/tools/profiler/core/platform-linux-android.cpp
|
|
@@ -55,17 +55,16 @@
|
|
#ifdef __GLIBC__
|
|
# include <execinfo.h> // backtrace, backtrace_symbols
|
|
#endif // def __GLIBC__
|
|
#include <strings.h> // index
|
|
#include <errno.h>
|
|
#include <stdarg.h>
|
|
|
|
#include "prenv.h"
|
|
-#include "mozilla/LinuxSignal.h"
|
|
#include "mozilla/PodOperations.h"
|
|
#include "mozilla/DebugOnly.h"
|
|
|
|
#include <string.h>
|
|
#include <list>
|
|
|
|
using namespace mozilla;
|
|
|
|
@@ -257,17 +256,17 @@ Sampler::Sampler(PSLockRef aLock)
|
|
|
|
// NOTE: We don't initialize LUL here, instead initializing it in
|
|
// SamplerThread's constructor. This is because with the
|
|
// profiler_suspend_and_sample_thread entry point, we want to be able to
|
|
// sample without waiting for LUL to be initialized.
|
|
|
|
// Request profiling signals.
|
|
struct sigaction sa;
|
|
- sa.sa_sigaction = MOZ_SIGNAL_TRAMPOLINE(SigprofHandler);
|
|
+ sa.sa_sigaction = SigprofHandler;
|
|
sigemptyset(&sa.sa_mask);
|
|
sa.sa_flags = SA_RESTART | SA_SIGINFO;
|
|
if (sigaction(SIGPROF, &sa, &mOldSigprofHandler) != 0) {
|
|
MOZ_CRASH("Error installing SIGPROF handler in the profiler");
|
|
}
|
|
}
|
|
|
|
void Sampler::Disable(PSLockRef aLock) {
|