pkgsrc/www/seamonkey/patches/patch-mozilla_mozglue_misc_StackWalk.cpp
ryoon ea74fdb7e4 Update to 2.38
Changelog:
Based on xulrunner 41.0

Security fixes:
    2015-114 Information disclosure via the High Resolution Time API
    2015-113 Memory safety errors in libGLES in the ANGLE graphics library
    2015-112 Vulnerabilities found through code inspection
    2015-111 Errors in the handling of CORS preflight request headers
    2015-110 Dragging and dropping images exposes final URL after redirects
    2015-109 JavaScript immutable property enforcement can be bypassed
    2015-108 Scripted proxies can access inner window
    2015-107 Out-of-bounds read during 2D canvas display on Linux 16-bit color depth systems
    2015-106 Use-after-free while manipulating HTML media content
    2015-105 Buffer overflow while decoding WebM video
    2015-104 Use-after-free with shared workers and IndexedDB
    2015-103 URL spoofing in reader mode
    2015-102 Crash when using debugger with SavedStacks in JavaScript
    2015-101 Buffer overflow in libvpx while parsing vp9 format video
    2015-100 Arbitrary file manipulation by local user through Mozilla updater
    2015-99 Site attribute spoofing on Android by pasting URL with unknown scheme
    2015-98 Out of bounds read in QCMS library with ICC V4 profile attributes
    2015-97 Memory leak in mozTCPSocket to servers
    2015-96 Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
2015-10-02 22:49:35 +00:00

13 lines
539 B
C++

$NetBSD: patch-mozilla_mozglue_misc_StackWalk.cpp,v 1.1 2015/10/02 22:49:36 ryoon Exp $
--- mozilla/mozglue/misc/StackWalk.cpp.orig 2015-09-25 07:36:02.000000000 +0000
+++ mozilla/mozglue/misc/StackWalk.cpp
@@ -903,7 +903,7 @@ FramePointerStackWalk(MozWalkStackCallba
(long(next) & 3)) {
break;
}
-#if (defined(__ppc__) && defined(XP_MACOSX)) || defined(__powerpc64__)
+#if (defined(__ppc__) && defined(XP_DARWIN)) || defined(__powerpc64__)
// ppc mac or powerpc64 linux
void* pc = *(bp + 2);
bp += 3;