Changelog: Based on xulrunner 41.0 Security fixes: 2015-114 Information disclosure via the High Resolution Time API 2015-113 Memory safety errors in libGLES in the ANGLE graphics library 2015-112 Vulnerabilities found through code inspection 2015-111 Errors in the handling of CORS preflight request headers 2015-110 Dragging and dropping images exposes final URL after redirects 2015-109 JavaScript immutable property enforcement can be bypassed 2015-108 Scripted proxies can access inner window 2015-107 Out-of-bounds read during 2D canvas display on Linux 16-bit color depth systems 2015-106 Use-after-free while manipulating HTML media content 2015-105 Buffer overflow while decoding WebM video 2015-104 Use-after-free with shared workers and IndexedDB 2015-103 URL spoofing in reader mode 2015-102 Crash when using debugger with SavedStacks in JavaScript 2015-101 Buffer overflow in libvpx while parsing vp9 format video 2015-100 Arbitrary file manipulation by local user through Mozilla updater 2015-99 Site attribute spoofing on Android by pasting URL with unknown scheme 2015-98 Out of bounds read in QCMS library with ICC V4 profile attributes 2015-97 Memory leak in mozTCPSocket to servers 2015-96 Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
24 lines
735 B
C
24 lines
735 B
C
$NetBSD: patch-mozilla_storage_SQLiteMutex.h,v 1.1 2015/10/02 22:49:36 ryoon Exp $
|
|
|
|
--- mozilla/storage/SQLiteMutex.h.orig 2015-09-25 07:34:55.000000000 +0000
|
|
+++ mozilla/storage/SQLiteMutex.h
|
|
@@ -107,15 +107,19 @@ public:
|
|
void assertCurrentThreadOwns()
|
|
{
|
|
NS_ASSERTION(mMutex, "No mutex associated with this wrapper!");
|
|
+#if 0
|
|
NS_ASSERTION(sqlite3_mutex_held(mMutex),
|
|
"Mutex is not held, but we expect it to be!");
|
|
+#endif
|
|
}
|
|
|
|
void assertNotCurrentThreadOwns()
|
|
{
|
|
NS_ASSERTION(mMutex, "No mutex associated with this wrapper!");
|
|
+#if 0
|
|
NS_ASSERTION(sqlite3_mutex_notheld(mMutex),
|
|
"Mutex is held, but we expect it to not be!");
|
|
+#endif
|
|
}
|
|
#endif // ifndef DEBUG
|
|
|