forked from pool/MozillaFirefox
https://www.mozilla.org/en-US/firefox/131.0/releasenotes/ MFSA 2024-46 (bsc#1230979) * CVE-2024-9391 (bmo#1892407) Prevent users from exiting full-screen mode in Firefox Focus for Android * CVE-2024-9392 (bmo#1899154, bmo#1905843) Compromised content process can bypass site isolation * CVE-2024-9393 (bmo#1918301) Cross-origin access to PDF contents through multipart responses * CVE-2024-9394 (bmo#1918874) Cross-origin access to JSON contents through multipart responses * CVE-2024-9395 (bmo#1906024) Specially crafted filename could be used to obscure download type * CVE-2024-9396 (bmo#1912471) Potential memory corruption may occur when cloning certain objects * CVE-2024-9397 (bmo#1916659) Potential directory upload bypass via clickjacking * CVE-2024-9398 (bmo#1881037) External protocol handlers could be enumerated via popups * CVE-2024-9399 (bmo#1907726) Specially crafted WebTransport requests could lead to denial of service * CVE-2024-9400 (bmo#1915249) Potential memory corruption during JIT compilation * CVE-2024-9401 (bmo#1872744, bmo#1897792, bmo#1911317, bmo#1916476) Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 * CVE-2024-9402 (bmo#1872744, bmo#1897792, bmo#1911317, bmo#1913445, bmo#1914106, bmo#1914475, bmo#1914963, bmo#1915008, bmo#1916476) OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=1178
30 lines
1.1 KiB
Diff
30 lines
1.1 KiB
Diff
# HG changeset patch
|
|
# User M. Sirringhaus <msirringhaus@suse.de>
|
|
# Date 1645518286 -3600
|
|
# Tue Feb 22 09:24:46 2022 +0100
|
|
# Node ID 81832d035e101471dcf52dd91de287268add7a91
|
|
# Parent 66f7ce16eb4965108687280e5443edd610631efb
|
|
imported patch svg-rendering.patch
|
|
|
|
diff --git a/image/imgFrame.cpp b/image/imgFrame.cpp
|
|
--- a/image/imgFrame.cpp
|
|
+++ b/image/imgFrame.cpp
|
|
@@ -372,6 +372,17 @@ nsresult imgFrame::InitWithDrawable(gfxD
|
|
return NS_ERROR_OUT_OF_MEMORY;
|
|
}
|
|
|
|
+#if MOZ_BIG_ENDIAN()
|
|
+ if (aBackend == gfx::BackendType::SKIA && canUseDataSurface) {
|
|
+ // SKIA is lying about what format it returns on big endian
|
|
+ for (int ii=0; ii < mRawSurface->GetSize().Height()*mRawSurface->Stride() / 4; ++ii) {
|
|
+ uint32_t *vals = (uint32_t*)(mRawSurface->GetData());
|
|
+ uint32_t val = ((vals[ii] << 8) & 0xFF00FF00 ) | ((vals[ii] >> 8) & 0xFF00FF );
|
|
+ vals[ii] = (val << 16) | (val >> 16);
|
|
+ }
|
|
+ }
|
|
+#endif
|
|
+
|
|
if (!canUseDataSurface) {
|
|
// We used an offscreen surface, which is an "optimized" surface from
|
|
// imgFrame's perspective.
|