diff options
author | Efraim Flashner <efraim@flashner.co.il> | 2016-04-10 08:40:31 +0300 |
---|---|---|
committer | Efraim Flashner <efraim@flashner.co.il> | 2016-04-10 08:40:42 +0300 |
commit | 58e87f66ceb619c44d486361ebf0f608abe63f5d (patch) | |
tree | ae6fa4b87dceef143d8e21f151e576467db4b144 /gnu/packages/patches/icecat-CVE-2016-1954.patch | |
parent | 9c45c51992bbb499c5f03cd1c9285937e8b2a00f (diff) | |
download | guix-patches-58e87f66ceb619c44d486361ebf0f608abe63f5d.tar guix-patches-58e87f66ceb619c44d486361ebf0f608abe63f5d.tar.gz |
gnu: icecat: Update to 38.7.1-gnu1.
* gnu/packages/gnuzilla.scm (icecat): Update to 38.7.1-gnu1.
[sources]: Remove numerous patches.
* gnu/packages/patches/icecat-CVE-2015-4477.patch,
gnu/packages/patches/icecat-CVE-2015-7207.patch,
gnu/packages/patches/icecat-CVE-2016-1952-pt01.patch,
gnu/packages/patches/icecat-CVE-2016-1952-pt02.patch,
gnu/packages/patches/icecat-CVE-2016-1952-pt03.patch,
gnu/packages/patches/icecat-CVE-2016-1952-pt04.patch,
gnu/packages/patches/icecat-CVE-2016-1952-pt05.patch,
gnu/packages/patches/icecat-CVE-2016-1952-pt06.patch,
gnu/packages/patches/icecat-CVE-2016-1954.patch,
gnu/packages/patches/icecat-CVE-2016-1960.patch,
gnu/packages/patches/icecat-CVE-2016-1961.patch,
gnu/packages/patches/icecat-CVE-2016-1962.patch,
gnu/packages/patches/icecat-CVE-2016-1964.patch,
gnu/packages/patches/icecat-CVE-2016-1965.patch,
gnu/packages/patches/icecat-CVE-2016-1966.patch,
gnu/packages/patches/icecat-CVE-2016-1974.patch,
gnu/packages/patches/icecat-icecatbug-1248851.patch,
gnu/packages/patches/icecat-update-graphite2.patch,
gnu/packages/patches/icecat-update-graphite2-pt2.patch: Remove files.
* gnu-system.am (dist_patch_DATA): Remove them.
Diffstat (limited to 'gnu/packages/patches/icecat-CVE-2016-1954.patch')
-rw-r--r-- | gnu/packages/patches/icecat-CVE-2016-1954.patch | 32 |
1 files changed, 0 insertions, 32 deletions
diff --git a/gnu/packages/patches/icecat-CVE-2016-1954.patch b/gnu/packages/patches/icecat-CVE-2016-1954.patch deleted file mode 100644 index bbb4b3217c..0000000000 --- a/gnu/packages/patches/icecat-CVE-2016-1954.patch +++ /dev/null @@ -1,32 +0,0 @@ -Copied from upstream: -https://hg.mozilla.org/releases/mozilla-esr38/raw-rev/a5c4c18849b4 - -# HG changeset patch -# User Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> -# Date 1456157874 28800 -# Node ID a5c4c18849b486ef8693e20421b69239a2cbe574 -# Parent e93aeb25e2a44df8d22f5a065b4410620e2c8730 -Bug 1243178: CSP - Skip sending reports for non http schemes (r=dveditz) a=ritu - -diff --git a/dom/security/nsCSPContext.cpp b/dom/security/nsCSPContext.cpp ---- a/dom/security/nsCSPContext.cpp -+++ b/dom/security/nsCSPContext.cpp -@@ -798,16 +798,17 @@ nsCSPContext::SendReports(nsISupports* a - (NS_SUCCEEDED(reportURI->SchemeIs("https", &isHttpScheme)) && isHttpScheme); - - if (!isHttpScheme) { - const char16_t* params[] = { reportURIs[r].get() }; - CSP_LogLocalizedStr(NS_LITERAL_STRING("reportURInotHttpsOrHttp2").get(), - params, ArrayLength(params), - aSourceFile, aScriptSample, aLineNum, 0, - nsIScriptError::errorFlag, "CSP", mInnerWindowID); -+ continue; - } - - // make sure this is an anonymous request (no cookies) so in case the - // policy URI is injected, it can't be abused for CSRF. - nsLoadFlags flags; - rv = reportChannel->GetLoadFlags(&flags); - NS_ENSURE_SUCCESS(rv, rv); - flags |= nsIRequest::LOAD_ANONYMOUS; - |