head 1.3; access; symbols pkgsrc-2020Q1:1.2.0.8 pkgsrc-2020Q1-base:1.2 pkgsrc-2019Q4:1.2.0.10 pkgsrc-2019Q4-base:1.2 pkgsrc-2019Q3:1.2.0.6 pkgsrc-2019Q3-base:1.2 pkgsrc-2019Q2:1.2.0.4 pkgsrc-2019Q2-base:1.2 pkgsrc-2019Q1:1.2.0.2 pkgsrc-2019Q1-base:1.2 pkgsrc-2018Q4:1.1.0.6 pkgsrc-2018Q4-base:1.1 pkgsrc-2018Q3:1.1.0.4 pkgsrc-2018Q3-base:1.1 pkgsrc-2018Q2:1.1.0.2 pkgsrc-2018Q2-base:1.1; locks; strict; comment @// @; 1.3 date 2020.06.07.10.34.43; author nia; state dead; branches; next 1.2; commitid aCtCVv72vCKuqhbC; 1.2 date 2019.02.26.11.23.53; author ryoon; state Exp; branches; next 1.1; commitid BMTleQsTSXM2IgdB; 1.1 date 2018.06.28.14.04.10; author ryoon; state Exp; branches; next ; commitid FLpZD0GqQ3Vkp3IA; desc @@ 1.3 log @www: Remove firefox60 - EOL @ text @$NetBSD: patch-js_src_gc_Memory.cpp,v 1.2 2019/02/26 11:23:53 ryoon Exp $ --- js/src/gc/Memory.cpp.orig 2019-02-13 14:19:38.000000000 +0000 +++ js/src/gc/Memory.cpp @@@@ -419,6 +419,7 @@@@ static inline void* MapMemoryAt(void* de off_t offset = 0) { #if defined(__ia64__) || defined(__aarch64__) || \ + (defined(__sun) && defined(__x86_64__)) || \ (defined(__sparc__) && defined(__arch64__) && \ (defined(__NetBSD__) || defined(__linux__))) MOZ_ASSERT((0xffff800000000000ULL & (uintptr_t(desired) + length - 1)) == 0); @@@@ -468,7 +469,8 @@@@ static inline void* MapMemory(size_t len } return region; #elif defined(__aarch64__) || \ - (defined(__sparc__) && defined(__arch64__) && defined(__linux__)) + (defined(__sparc__) && defined(__arch64__) && defined(__linux__)) || \ + (defined(__sun) && defined(__x86_64__)) /* * There might be similar virtual address issue on arm64 which depends on * hardware and kernel configurations. But the work around is slightly @ 1.2 log @Update to 60.5.2 Changelog: 60.5.2 Fixed a frequent crash when reading various Reuters news articles (bug 1505844) 60.5.1 #CVE-2018-18356: Use-after-free in Skia #CVE-2019-5785: Integer overflow in Skia #CVE-2018-18335: Buffer overflow in Skia with accelerated Canvas 2D 60.5.0 #CVE-2018-18500: Use-after-free parsing HTML5 stream #CVE-2018-18505: Privilege escalation through IPC channel messages #CVE-2018-18501: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 @ text @d1 1 a1 1 $NetBSD: patch-js_src_gc_Memory.cpp,v 1.1 2018/12/16 08:12:16 ryoon Exp $ @ 1.1 log @www/firefox60: import firefox60-60.1.0 Mozilla Firefox is a free, open-source and cross-platform web browser for Windows, Linux, MacOS X and many other operating systems. It is fast and easy to use, and offers many advantages over other web browsers, such as tabbed browsing and the ability to block pop-up windows. Firefox also offers excellent bookmark and history management, and it can be extended by developers using industry standards such as XML, CSS, JavaScript, C++, etc. Many extensions are available. This package provides Firefox 60 ESR. Securty fixes: #CVE-2018-12359: Buffer overflow using computed size of canvas element #CVE-2018-12360: Use-after-free when using focus() #CVE-2018-12361: Integer overflow in SwizzleData #CVE-2018-12362: Integer overflow in SSSE3 scaler #CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture #CVE-2018-12363: Use-after-free when appending DOM nodes #CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins #CVE-2018-12365: Compromised IPC child process can list local filenames #CVE-2018-12371: Integer overflow in Skia library during edge builder allocation #CVE-2018-12366: Invalid data handling during QCMS transformations #CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming #CVE-2018-12368: No warning when opening executable SettingContent-ms files #CVE-2018-12369: WebExtension security permission checks bypassed by embedded experiments #CVE-2018-5187: Memory safety bugs fixed in Firefox 60 and Firefox ESR 60.1 #CVE-2018-5188: Memory safety bugs fixed in Firefox 60, Firefox ESR 60.1, and Firefox ESR 52.9 @ text @d1 1 a1 1 $NetBSD: patch-js_src_gc_Memory.cpp,v 1.4 2018/06/26 09:37:10 jperkin Exp $ d3 1 a3 3 Support SunOS/x86_64. --- js/src/gc/Memory.cpp.orig 2018-06-05 19:47:29.000000000 +0000 d5 2 a6 2 @@@@ -504,6 +504,7 @@@@ MapMemoryAt(void* desired, size_t length { d8 1 a8 1 #if defined(__ia64__) || defined(__aarch64__) || \ d10 13 a22 12 (defined(__sparc__) && defined(__arch64__) && (defined(__NetBSD__) || defined(__linux__))) MOZ_ASSERT((0xffff800000000000ULL & (uintptr_t(desired) + length - 1)) == 0); #endif @@@@ -554,7 +555,7 @@@@ MapMemory(size_t length, int prot = PROT return nullptr; } return region; -#elif defined(__aarch64__) || (defined(__sparc__) && defined(__arch64__) && defined(__linux__)) +#elif defined(__aarch64__) || (defined(__sparc__) && defined(__arch64__) && defined(__linux__)) || (defined(__sun) && defined(__x86_64__)) /* * There might be similar virtual address issue on arm64 which depends on * hardware and kernel configurations. But the work around is slightly @