Shared security patch analysis results
AI Used: DEEPSEEK deepseek-chat--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/transformations/2d.transformation.rotate.nonfinite.worker.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/transformations/2d.transformation.rotate.nonfinite.worker.js@@ -13,8 +13,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = '#f00'; ctx.fillRect(0, 0, 100, 50);@@ -24,7 +24,7 @@ ctx.rotate(NaN); ctx.fillStyle = '#0f0'; ctx.fillRect(-100, -10, 100, 50);-_assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");+_assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255"); t.done(); });
Based on the provided diff, I'll analyze it for potential security vulnerabilities: 1. Vulnerability Existed: no No specific vulnerability [File] testing/web-platform/tests/html/canvas/offscreen/transformations/2d.transformation.rotate.nonfinite.worker.js [Lines] 13-24 [Old Code] var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); [Fixed Code] var canvas = new OffscreenCanvas(100, 50); var ctx = canvas.getContext('2d'); 2. Vulnerability Existed: no No specific vulnerability [File] testing/web-platform/tests/html/canvas/offscreen/transformations/2d.transformation.rotate.nonfinite.worker.js [Lines] 24 [Old Code] _assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255"); [Fixed Code] _assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255"); The changes appear to be purely variable name refactoring (renaming 'offscreenCanvas' to 'canvas') rather than security fixes. There's no indication of any security vulnerability being addressed in this diff. The changes are consistent throughout the file, maintaining the same functionality but with a more concise variable name.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/compositing/2d.composite.uncovered.nocontext.source-out.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/compositing/2d.composite.uncovered.nocontext.source-out.html@@ -17,8 +17,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = 'rgba(0, 255, 255, 0.5)';@@ -26,7 +26,7 @@ ctx.globalCompositeOperation = 'source-out'; var offscreenCanvas2 = new OffscreenCanvas(100, 50); ctx.drawImage(offscreenCanvas2, 0, 0);-_assertPixelApprox(offscreenCanvas, 50,25, 0,0,0,0, "50,25", "0,0,0,0", 5);+_assertPixelApprox(canvas, 50,25, 0,0,0,0, "50,25", "0,0,0,0", 5); t.done(); });
Based on the provided diff, I don't see any security vulnerabilities being fixed. The changes appear to be purely variable renaming and don't involve any security-related modifications. Here's the analysis: Vulnerability Existed: no No security vulnerability found [testing/web-platform/tests/html/canvas/offscreen/compositing/2d.composite.uncovered.nocontext.source-out.html] [Lines 17-26] [Old Code] var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); ... _assertPixelApprox(offscreenCanvas, 50,25, 0,0,0,0, "50,25", "0,0,0,0", 5); [Fixed Code] var canvas = new OffscreenCanvas(100, 50); var ctx = canvas.getContext('2d'); ... _assertPixelApprox(canvas, 50,25, 0,0,0,0, "50,25", "0,0,0,0", 5); The changes simply rename the variable from `offscreenCanvas` to `canvas` for consistency or clarity, but don't address any security issues. The functionality remains exactly the same.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/js/src/tests/non262/ReadableStream/bug-1549768.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/js/src/tests/non262/ReadableStream/bug-1549768.js@@ -1,5 +1,7 @@-var otherGlobal = newGlobal({newCompartment: true});-var obj = { start(c) {} };+// |reftest| skip-if(!this.hasOwnProperty('ReadableStream'))++var otherGlobal = newGlobal({ newCompartment: true });+var obj = { start(c) { } }; var Cancel = otherGlobal.ReadableStream.prototype.tee.call(new ReadableStream(obj))[0].cancel; var stream = new ReadableStream(obj);
Analyzing the provided code diff: 1. Vulnerability Existed: not sure [Potential Test Reliability Issue] [js/src/tests/non262/ReadableStream/bug-1549768.js] [Lines 1-5] [Old Code] var otherGlobal = newGlobal({newCompartment: true}); var obj = { start(c) {} }; [Fixed Code] // |reftest| skip-if(!this.hasOwnProperty('ReadableStream')) var otherGlobal = newGlobal({ newCompartment: true }); var obj = { start(c) { } }; Additional Details: - The main change is the addition of a test directive (`|reftest| skip-if`) and some minor formatting changes - The skip-if directive suggests this test should only run in environments with ReadableStream support - While not a security vulnerability per se, this improves test reliability by preventing failures in environments without ReadableStream - No clear security vulnerability was fixed in this diff, though the test appears related to stream cancellation behavior - The original bug number (1549768) might reference a security issue, but the diff itself doesn't show security fixes
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/webrtc-encoded-transform/RTCPeerConnection-insertable-streams.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/webrtc-encoded-transform/RTCPeerConnection-insertable-streams.js@@ -160,7 +160,7 @@ // Compute the buffer reported in the additionalData field using the metadata // provided by a video frame. // Based on the webrtc::RtpDescriptorAuthentication() C++ function at-// https://source.chromium.org/chromium/chromium/src/+/master:third_party/webrtc/modules/rtp_rtcp/source/rtp_descriptor_authentication.cc+// https://source.chromium.org/chromium/chromium/src/+/main:third_party/webrtc/modules/rtp_rtcp/source/rtp_descriptor_authentication.cc function computeAdditionalData(videoFrame) { const kMaxSpatialLayers = 8; const kMaxTemporalLayers = 8;
Analyzing the provided code diff, here's the security assessment: Vulnerability Existed: no [URL Reference Update] [testing/web-platform/tests/webrtc-encoded-transform/RTCPeerConnection-insertable-streams.js] [Lines 160-163] [Old Code] // Based on the webrtc::RtpDescriptorAuthentication() C++ function at // https://source.chromium.org/chromium/chromium/src/+/master:third_party/webrtc/modules/rtp_rtcp/source/rtp_descriptor_authentication.cc [Fixed Code] // Based on the webrtc::RtpDescriptorAuthentication() C++ function at // https://source.chromium.org/chromium/chromium/src/+/main:third_party/webrtc/modules/rtp_rtcp/source/rtp_descriptor_authentication.cc Additional Details: - This is simply a URL reference update from "master" branch to "main" branch in a code comment - No actual code changes were made, only documentation/comments were modified - No security vulnerability was fixed in this change - The change reflects Google's branch naming convention update from "master" to "main"
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/css/css-transforms/perspective-origin-004.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/css/css-transforms/perspective-origin-004.html@@ -5,7 +5,6 @@ <link rel="author" title="Jieqiong Cui" href="mailto:[email protected]"> <link rel="help" title="11. The 'perspective-origin' Property" href="http://www.w3.org/TR/css-transforms-2/#propdef-perspective-origin"> <link rel="match" href="../reference/ref-filled-green-100px-square.xht">-<meta name="flags" content=""> <meta name="assert" content="The 'perspective-origin' property set 'top' computes to 0% for the vertical position."> <style> div {
Based on the provided diff, I'll analyze it for potential security vulnerabilities: Vulnerability Existed: no [No specific vulnerability found] [testing/web-platform/tests/css/css-transforms/perspective-origin-004.html] [Lines 5] [Old Code] <meta name="flags" content=""> [Fixed Code] [Removed line] Additional Details: - The change simply removes an empty meta tag for "flags" which appears to be test-related metadata - No actual security vulnerability is being fixed here - This is likely just a cleanup of unnecessary test markup rather than a security fix - The change doesn't affect any security-sensitive functionality or introduce/remove any security controls The modification appears to be purely cosmetic/structural rather than addressing any security concerns.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.isPointInPath.bigarc.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.isPointInPath.bigarc.html@@ -17,8 +17,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.arc(50, 25, 10, 0, 7, false); _assertSame(ctx.isPointInPath(50, 10), false, "ctx.isPointInPath(50, 10)", "false");
Analysis of the provided code diff: 1. Vulnerability Existed: no No security vulnerability found [testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.isPointInPath.bigarc.html] [Lines 17-18] Old Code: var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); Fixed Code: var canvas = new OffscreenCanvas(100, 50); var ctx = canvas.getContext('2d'); Additional Details: - The change appears to be purely a variable renaming from `offscreenCanvas` to `canvas` - No security implications or vulnerabilities are apparent in this change - The modification doesn't affect any security-sensitive operations or data handling - This is likely a code style/consistency improvement rather than a security fix
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/modules/libpref/init/StaticPrefList.yaml+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/modules/libpref/init/StaticPrefList.yaml@@ -526,6 +526,32 @@ value: true mirror: always+# Mode to use when receiving kinetic scroll input.+#+# * 0: Auto mode (uses the default behavior, subject to change).+# * 1: Page mode: Uses gtk deltas as a percentage of the page size to scroll. This mode matches:+#+# https://gitlab.gnome.org/GNOME/gtk/blob/c734c7e9188b56f56c3a504abee05fa40c5475ac/gtk/gtkrange.c#L3063-3074+#+# * 2: Pixel mode: Uses gtk deltas as a fixed pixel multiplier. This mode matches e.g. GNOME web.+#+# https://webkit-search.igalia.com/webkit/rev/215039ef09d6bfd6e088175bfe30788d95b9705d/Source/WebKit/Shared/gtk/WebEventFactory.cpp#265-296+# (multiplied then by pixelsPerLineStep which in GNOME-web is 40).+- name: apz.gtk.kinetic_scroll.delta_mode+ type: uint32_t+ value: 0+ mirror: always++- name: apz.gtk.kinetic_scroll.page_delta_mode_multiplier+ type: float+ value: 1.0f+ mirror: always++- name: apz.gtk.kinetic_scroll.pixel_delta_mode_multiplier+ type: float+ value: 40.0f+ mirror: always+ - name: apz.gtk.touchpad_pinch.enabled type: RelaxedAtomicBool value: true@@ -1124,7 +1150,7 @@ # See bug 1710926 - name: browser.download.improvements_to_download_panel type: bool- value: false+ value: true mirror: always # See bug 1731668@@ -1148,6 +1174,11 @@ - name: browser.enable_click_image_resizing type: bool value: @IS_NOT_ANDROID@+ mirror: always++- name: browser.find.ignore_ruby_annotations+ type: bool+ value: true mirror: always #if defined(XP_MACOSX)@@ -1180,6 +1211,12 @@ value: 16777216 mirror: always+# True to collect wireframes upon navigations / pushState+- name: browser.history.collectWireframes+ type: bool+ value: false+ mirror: always+ #if defined(XP_WIN) || defined(XP_LINUX) # Notify TabUnloader or send the memory pressure if the memory resource # notification is signaled AND the available commit space is lower than@@ -1427,14 +1464,6 @@ value: true mirror: always-# Temporary pref which makes certain ServiceWorkers be isolated in special-# processes instead of within a the normal web/webIsolated process based on-# the URI. Entries are separated by commas-- name: browser.tabs.remote.serviceWorkerIsolationList- type: String- value: ""- mirror: never- # When this pref is enabled, opaque response is only allowed to enter the # content process if it's a response for media (audio, image, video), CSS, or # JavaScript.@@ -1477,7 +1506,11 @@ # be loaded normally as-if users normally navigated to the page. - name: browser.soft_reload.only_force_validate_top_level_document type: bool- value: @IS_NIGHTLY_BUILD@+#if defined(EARLY_BETA_OR_EARLIER)+ value: true+#else+ value: false+#endif mirror: always #---------------------------------------------------------------------------@@ -1492,7 +1525,7 @@ # Add support for canvas path objects - name: canvas.path.enabled- type: bool+ type: RelaxedAtomicBool value: true mirror: always@@ -1971,7 +2004,7 @@ # HTML <dialog> element - name: dom.dialog_element.enabled type: bool- value: @IS_NIGHTLY_BUILD@+ value: true mirror: always # Only propagate the open window click permission if the setTimeout() is equal@@ -2147,12 +2180,6 @@ type: String value: "" mirror: never--# Whether WheelEvent should expose wheelDelta / wheelDeltaX / wheelDeltaY-- name: dom.event.wheelDelta.enabled- type: bool- value: true- mirror: always #if defined(XP_MACOSX) # Whether to disable treating ctrl click as right click@@ -3415,6 +3442,11 @@ value: false mirror: always+- name: dom.workers.requestAnimationFrame+ type: RelaxedAtomicBool+ value: false+ mirror: always+ - name: dom.workers.serialized-sab-access type: RelaxedAtomicBool value: false@@ -3449,6 +3481,12 @@ - name: dom.storageManager.enabled type: RelaxedAtomicBool value: @IS_NOT_ANDROID@+ mirror: always++# Whether the File System API is enabled+- name: dom.fs.enabled+ type: RelaxedAtomicBool+ value: false mirror: always # Should we abort LocalStorage requests when a sync message from parent is@@ -3506,9 +3544,75 @@ mirror: always do_not_use_directly: true+# The amount of snapshot peak usage which is attempted to be pre-incremented+# during snapshot creation.+- name: dom.storage.snapshot_peak_usage.initial_preincrement+ type: RelaxedAtomicUint32+ value: 16384+ mirror: always++# The amount of snapshot peak usage which is attempted to be pre-incremented+# during snapshot creation if the LocalStorage usage was already close to the+# limit (a fallback for dom.storage.snapshot_peak_usage.initial_preincrement).+- name: dom.storage.snapshot_peak_usage.reduced_initial_preincrement+ type: RelaxedAtomicUint32+ value: 4096+ mirror: always++# The amount of snapshot peak usage which is attempted to be pre-incremented+# beyond the specific values which are subsequently requested after snapshot+# creation.+- name: dom.storage.snapshot_peak_usage.gradual_preincrement+ type: RelaxedAtomicUint32+ value: 4096+ mirror: always++# The amount of snapshot peak usage which is attempted to be pre-incremented+# beyond the specific values which are subsequently requested after snapshot+# creation if the LocalStorage total usage was already close to the limit+# (a fallback for dom.storage.snapshot_peak_usage.gradual_preincrement).+- name: dom.storage.snapshot_peak_usage.reduced_gradual_preincrement+ type: RelaxedAtomicUint32+ value: 1024+ mirror: always++# How long between a snapshot becomes idle and when we actually finish the+# snapshot. This preference is only used when "dom.storage.snapshot_reusing"+# is true.+- name: dom.storage.snapshot_idle_timeout_ms+ type: uint32_t+ value: 5000+ mirror: always+ # Is support for Storage test APIs enabled? - name: dom.storage.testing type: bool+ value: false+ mirror: always++# DOM Streams Prefs++## Exposure Prefs: To ensure the DOM Streams don't expose more+# than existing JS Streams implementation, we want to hide some+# interfaces from the global until later.+- name: dom.streams.readable_stream_default_controller.enabled+ type: RelaxedAtomicBool+ value: false+ mirror: always++- name: dom.streams.readable_stream_default_reader.enabled+ type: RelaxedAtomicBool+ value: false+ mirror: always++# DON'T enable, there are known issues!+- name: dom.streams.byte_streams.enabled+ type: RelaxedAtomicBool+ value: false+ mirror: always++- name: dom.streams.writable_streams.enabled+ type: RelaxedAtomicBool value: false mirror: always@@ -3532,6 +3636,12 @@ - name: dom.testing.sync-content-blocking-notifications type: bool+ value: false+ mirror: always++# To enable TestUtils interface on WPT+- name: dom.testing.testutils.enabled+ type: RelaxedAtomicBool value: false mirror: always@@ -3976,7 +4086,7 @@ # Is support for form-associated custom element enabled? - name: dom.webcomponents.formAssociatedCustomElement.enabled type: bool- value: @IS_NIGHTLY_BUILD@+ value: true mirror: always # Is support for the Web GPU API enabled?@@ -4877,6 +4987,26 @@ value: 1000 mirror: always+- name: general.utility-process.startup_timeout_ms+ type: RelaxedAtomicInt32+ value: 5000+ mirror: always++# Temporary pref to test website compatibility with Firefox 100 UA string. This+# pref will be removed in Firefox 100 because it will no longer needed.+- name: general.useragent.forceVersion100+ type: bool+ value: false+ mirror: always++# Temporary pref to remember whether we have handled the Nimbus enrollment+# event for the Firefox 100 UA experiment. This pref will be removed in Firefox+# 100 because the experiment will have ended.+- name: general.useragent.handledVersionExperimentEnrollment+ type: bool+ value: false+ mirror: always+ #--------------------------------------------------------------------------- # Prefs starting with "geo." #---------------------------------------------------------------------------@@ -5316,10 +5446,23 @@ mirror: once do_not_use_directly: true+# Enable OffscreenCanvas everywhere. - name: gfx.offscreencanvas.enabled type: RelaxedAtomicBool value: false mirror: always++# Enable OffscreenCanvas based on the domain allowlist.+- name: gfx.offscreencanvas.domain-enabled+ type: RelaxedAtomicBool+ value: false+ mirror: always++# Domains included in the allowlist.+- name: gfx.offscreencanvas.domain-allowlist+ type: String+ value: ""+ mirror: never - name: gfx.omta.background-color type: bool@@ -5425,6 +5568,11 @@ mirror: once - name: gfx.vsync.force-disable-waitforvblank+ type: RelaxedAtomicBool+ value: false+ mirror: always++- name: gfx.will-change.ignore-opacity type: RelaxedAtomicBool value: false mirror: always@@ -5584,6 +5732,12 @@ value: true mirror: once+# Whether or not we should force partial present on.+- name: gfx.webrender.force-partial-present+ type: bool+ value: false+ mirror: once+ - name: gfx.webrender.enable-gpu-markers type: bool #ifdef DEBUG@@ -5612,6 +5766,11 @@ mirror: once # Whether to use a video overlay layers with DirectComposition - name: gfx.webrender.dcomp-video-overlay-win+ type: bool+ value: false+ mirror: once+ # Whether to use a yuv video overlay layers with DirectComposition+- name: gfx.webrender.dcomp-video-yuv-overlay-win type: bool value: false mirror: once@@ -6334,6 +6493,12 @@ type: bool value: false mirror: always++ # Experimental support for Array Grouping in JavaScript.+- name: javascript.options.experimental.array_grouping+ type: bool+ value: true+ mirror: always #endif // NIGHTLY_BUILD # Experimental support for class static blocks in JavaScript.@@ -6390,7 +6555,7 @@ - name: javascript.options.wasm_caching type: bool- value: @IS_EARLY_BETA_OR_EARLIER@+ value: true mirror: always # The amount of time we wait between a request to GC (due to leaving a page) and doing the actual GC, in ms.@@ -6462,7 +6627,7 @@ mirror: always # LoadStartupJSPrefs do_not_use_directly: true-# Streams API.+# Streams API. This only applies to JS Streams - name: javascript.options.streams type: RelaxedAtomicBool value: true@@ -6502,7 +6667,7 @@ #if defined(ENABLE_WASM_RELAXED_SIMD) - name: javascript.options.wasm_relaxed_simd type: bool- value: false+ value: @IS_NIGHTLY_BUILD@ mirror: always #endif // defined(ENABLE_WASM_RELAXED_SIMD)@@ -6523,7 +6688,7 @@ #if defined(ENABLE_WASM_EXCEPTIONS) - name: javascript.options.wasm_exceptions type: bool- value: false+ value: @IS_NIGHTLY_BUILD@ mirror: always #endif // defined(ENABLE_WASM_EXCEPTIONS)@@ -6550,6 +6715,17 @@ type: bool value: false mirror: always+#endif++#if defined(ENABLE_WASM_SIMD)+#if defined(JS_CODEGEN_X64) || defined(JS_CODEGEN_X86)+ # Enables AVX instructions support on X86/X64 platforms.+ # Changing these prefs requires a restart.+- name: javascript.options.wasm_simd_avx+ type: bool+ value: false+ mirror: always+#endif #endif #if defined(ENABLE_WASM_MEMORY64)@@ -7339,7 +7515,7 @@ # Is support for CSS hyphenate-character enabled? - name: layout.css.hyphenate-character.enabled type: RelaxedAtomicBool- value: @IS_NIGHTLY_BUILD@+ value: true mirror: always # Is support for CSS individual transform enabled?@@ -7511,11 +7687,6 @@ # Is CSS error reporting enabled? - name: layout.css.report_errors- type: bool- value: true- mirror: always--- name: layout.css.resizeobserver.enabled type: bool value: true mirror: always@@ -7646,6 +7817,11 @@ value: true mirror: always+- name: layout.display-list.retain.sc+ type: RelaxedAtomicBool+ value: @IS_NIGHTLY_BUILD@+ mirror: always+ # Set the maximum number of modified frames allowed before doing a full # display list rebuild. - name: layout.display-list.rebuild-frame-limit@@ -7692,6 +7868,14 @@ value: @IS_EARLY_BETA_OR_EARLIER@ mirror: always+# Enables the mechanism to optimize away flex item's final reflow.+# Warning: Disabling the pref will impact the performance. This is useful only for+# debugging flexbox issues.+- name: layout.flexbox.item-final-reflow-optimization.enabled+ type: bool+ value: true+ mirror: always+ # Enables the <input type=search> custom layout frame with a clear icon. # Still needs tests and a web-exposed way to remove that icon, see bug 1654288. - name: layout.forms.input-type-search.enabled@@ -7699,8 +7883,14 @@ value: false mirror: always-# Enables the Show Password button inside a <input type=password>.-- name: layout.forms.input-type-show-password-button.enabled+# Enables the Reveal Password button inside a <input type=password>.+- name: layout.forms.reveal-password-button.enabled+ type: bool+ value: false+ mirror: always++# Enables the Reveal Password context-menu entry.+- name: layout.forms.reveal-password-context-menu.enabled type: bool value: false mirror: always@@ -8124,7 +8314,7 @@ value: 32768 # Measured in KiB mirror: always-# Whether cubeb is sandboxed+# Whether cubeb is sandboxed (AudioIPC) - name: media.cubeb.sandbox type: bool mirror: always@@ -8132,6 +8322,22 @@ value: true #elif defined(XP_WIN) && !defined(_ARM64_) value: true+#elif defined(XP_MACOSX)+ value: false+#else+ value: false+#endif++# Whether cubeb sandbox (AudioIPC) is v2+- name: media.cubeb.sandbox_v2+ type: bool+ mirror: always+#if defined(XP_LINUX) && !defined(MOZ_WIDGET_ANDROID)+ value: false+#elif defined(XP_WIN) && !defined(_ARM64_)+ value: true+#elif defined(XP_MACOSX)+ value: false #else value: false #endif@@ -8332,7 +8538,7 @@ - name: media.eme.max-throughput-ms type: RelaxedAtomicUint32- value: 200+ value: 500 mirror: always - name: media.clearkey.persistent-license.enabled@@ -8562,6 +8768,12 @@ mirror: always #endif+# Allow ffmpeg decoder to decode directly onto shmem buffer+- name: media.ffmpeg.customized-buffer-allocation+ type: RelaxedAtomicBool+ value: @IS_NIGHTLY_BUILD@+ mirror: always+ #ifdef MOZ_FFMPEG - name: media.ffmpeg.enabled type: RelaxedAtomicBool@@ -8578,22 +8790,10 @@ mirror: always #ifdef MOZ_WAYLAND-# Disable DMABuf for ffmpeg video textures on Linux-- name: media.ffmpeg.dmabuf-textures.disabled- type: RelaxedAtomicBool- value: false- mirror: always- # Use VA-API for ffmpeg video playback on Linux - name: media.ffmpeg.vaapi.enabled type: RelaxedAtomicBool value: false- mirror: always--# Use DRM display for VA-API ffmpeg video decoding on Linux-- name: media.ffmpeg.vaapi-drm-display.enabled- type: RelaxedAtomicBool- value: true mirror: always #endif # MOZ_WAYLAND #endif # MOZ_FFMPEG@@ -9013,6 +9213,15 @@ value: true mirror: always+# This pref turns off window-focus checks on the navigator.mediaDevices methods,+# for partner testing frameworks.+# Prefer "focusmanager.testmode", which is already set by default for+# web-platform tests.+- name: media.devices.unfocused.enabled+ type: bool+ value: false+ mirror: always+ # This pref turns off [SecureContext] on the navigator.mediaDevices object, for # more compatible legacy behavior. - name: media.devices.insecure.enabled@@ -9276,6 +9485,18 @@ - name: media.audio.playbackrate.soundtouch_overlap_ms type: RelaxedAtomicInt32 value: 8+ mirror: always++# The duration, in milliseconds, of decoded audio to keep around in the+# AudioSink ring-buffer. New decoding operations are started when this limit is+# reached. The total size of the ring-buffer is slightly bigger than this.+- name: media.audio.audiosink.threshold_ms+ type: AtomicFloat+#if defined(XP_MACOSX) && defined(__aarch64__)+ value: 1000.0+#else+ value: 200.0+#endif mirror: always@@ -10006,7 +10227,7 @@ # If true, don't fallback to native DNS upon network errors. - name: network.trr.strict_native_fallback type: RelaxedAtomicBool- value: @IS_NIGHTLY_BUILD@+ value: false mirror: always # If false, the temporary blocklisting feature is disabled.@@ -10016,6 +10237,13 @@ - name: network.trr.temp_blocklist type: RelaxedAtomicBool value: true+ mirror: always++# TRR blocklist entry expire time (in seconds). Default is one minute.+# Meant to survive basically a page load.+- name: network.trr.temp_blocklist_duration_sec+ type: RelaxedAtomicUint32+ value: 60 mirror: always # Single TRR request timeout, in milliseconds@@ -10296,6 +10524,12 @@ value: "" mirror: never+# Enable HTTP/3+- name: network.http.http3.enable+ type: RelaxedAtomicBool+ value: true+ mirror: always+ # Receive buffer size of QUIC socket - name: network.http.http3.recvBufferSize type: RelaxedAtomicInt32@@ -10337,9 +10571,9 @@ value: 12582912 mirror: always-# Enable http3 network priorization as described in+# Enable http3 network priority as described in # https://httpwg.org/http-extensions/draft-ietf-httpbis-priority.html-- name: network.http.http3.priorization+- name: network.http.http3.priority type: RelaxedAtomicBool value: true mirror: always@@ -10349,7 +10583,7 @@ # improve performance when switching to an tab with a website using the same # QUIC connection. On the other hand it sends more data to the website and # might be a privacy concern.-- name: network.http.http3.send_background_tabs_depriorization+- name: network.http.http3.send_background_tabs_deprioritization type: RelaxedAtomicBool value: false mirror: always@@ -10415,12 +10649,6 @@ - name: network.dns.httpssvc.http3_fast_fallback_timeout type: RelaxedAtomicUint32 value: 50- mirror: always--# Whether to use https rr for speculative connections.-- name: network.dns.use_https_rr_for_speculative_connection- type: RelaxedAtomicBool- value: false mirror: always # Whether to force a transaction to wait https rr.@@ -11286,6 +11514,17 @@ value: false mirror: always+# Enrollment preferences for the win32k experiment, set and managed by Normandy+- name: security.sandbox.content.win32k-experiment.enrollmentStatus+ type: uint32_t+ value: 0+ mirror: never++- name: security.sandbox.content.win32k-experiment.startupEnrollmentStatus+ type: uint32_t+ value: 0+ mirror: never+ #if defined(XP_WIN) && defined(MOZ_SANDBOX) # Note: win32k is currently _not_ disabled for GMP due to intermittent test # failures, where the GMP process fails very early. See bug 1449348.@@ -12386,15 +12625,6 @@ value: false mirror: always-# Whether we try to extract dark theme GTK colors.-#-# For now, needed for follow-firefox-theme. In the future will also be needed-# for the color-scheme CSS property / meta tag / etc.-- name: widget.gtk.alt-theme.dark- type: bool- value: true- mirror: always- # Whether selection colors for the non-system theme get passed from the system # GTK theme. - name: widget.gtk.alt-theme.selection@@ -12463,18 +12693,6 @@ value: true mirror: always-# Use async clipboard on Wayland-- name: widget.wayland.async-clipboard.enabled- type: bool- value: true- mirror: once--# Use async data getter on Wayland Clipboard-- name: widget.wayland.async-data-transfer.enabled- type: bool- value: false- mirror: once- # Force fractional scaling using wp_viewporter. Valid values: 0.5 - 8 - name: widget.wayland.fractional_buffer_scale type: float@@ -12495,7 +12713,21 @@ #endif #ifdef MOZ_WIDGET_GTK++# The timeout we should spend on a DBUS call to the Settings proxy before+# giving up. #+# -1 for the default system timeout, INT_MAX for "infinite time".+#+# This runs just once, but during startup, so make sure it doesn't take too+# long. Three seconds should be way more than enough, and if we don't get the+# reply on time then the only potential issue is that we use a light instead of+# dark interface or vice versa.+- name: widget.gtk.settings-portal-timeout-ms+ type: int32_t+ value: 3000+ mirror: always+ # Whether to use gtk portal for the file picker. # - 0: never # - 1: always@@ -12519,6 +12751,16 @@ # - 1: always # - 2: auto (for now only true for flatpak, since it needs work, see bug 1688720). - name: widget.use-xdg-desktop-portal.print+ type: int32_t+ value: 0+ mirror: always++# Whether to try to use XDG portal for settings / look-and-feel information.+# https://flatpak.github.io/xdg-desktop-portal/#gdbus-org.freedesktop.portal.Settings+# - 0: never+# - 1: always+# - 2: auto+- name: widget.use-xdg-desktop-portal.settings type: int32_t value: 2 mirror: always@@ -12539,7 +12781,7 @@ - name: widget.windows.window_occlusion_tracking.enabled type: bool- value: @IS_EARLY_BETA_OR_EARLIER@+ value: true mirror: always - name: widget.windows.window_occlusion_tracking_display_state.enabled
Here's the analysis of the provided code diff for security fixes: 1. Vulnerability Existed: not sure [Potential Information Leak] [modules/libpref/init/StaticPrefList.yaml] [1124-1127] [Old Code] - name: browser.download.improvements_to_download_panel type: bool value: false mirror: always [Fixed Code] - name: browser.download.improvements_to_download_panel type: bool value: true mirror: always 2. Vulnerability Existed: not sure [Potential Privacy Issue] [modules/libpref/init/StaticPrefList.yaml] [1180-1185] [Old Code] (No previous code) [Fixed Code] - name: browser.history.collectWireframes type: bool value: false mirror: always 3. Vulnerability Existed: not sure [Potential Service Worker Isolation Issue] [modules/libpref/init/StaticPrefList.yaml] [1427-1433] [Old Code] - name: browser.tabs.remote.serviceWorkerIsolationList type: String value: "" mirror: never [Fixed Code] (Removed completely) 4. Vulnerability Existed: not sure [Potential DOM Security Issue] [modules/libpref/init/StaticPrefList.yaml] [1971-1975] [Old Code] - name: dom.dialog_element.enabled type: bool value: @IS_NIGHTLY_BUILD@ mirror: always [Fixed Code] - name: dom.dialog_element.enabled type: bool value: true mirror: always 5. Vulnerability Existed: not sure [Potential Wheel Event Security Issue] [modules/libpref/init/StaticPrefList.yaml] [2147-2151] [Old Code] - name: dom.event.wheelDelta.enabled type: bool value: true mirror: always [Fixed Code] (Removed completely) 6. Vulnerability Existed: not sure [Potential Storage Security Issue] [modules/libpref/init/StaticPrefList.yaml] [3506-3579] [Old Code] (No previous code) [Fixed Code] (Multiple new storage-related preferences added with conservative default values) Note: Many of these changes appear to be feature additions or modifications rather than direct security fixes. The analysis focuses on changes that could potentially impact security, though the actual security implications would require deeper context about how these preferences are used in the codebase.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/devtools/docs/contributor/tools/highlighters.md+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/devtools/docs/contributor/tools/highlighters.md@@ -17,7 +17,7 @@ ## Using highlighters-Highlighters run on the debuggee side, not on the toolbox side. This is so that it's possible to highlight elements on a remote device for instance. This means you need to go through the [Remote Debugging Protocol](protocol.md) to use a highlighter.+Highlighters run on the debuggee side, not on the toolbox side. This is so that it's possible to highlight elements on a remote device for instance. This means you need to go through the [Remote Debugging Protocol](../backend/protocol.md) to use a highlighter. The InspectorFront provides the following method:
Analysis of the provided code diff: 1. Vulnerability Existed: no No security vulnerability found [File] devtools/docs/contributor/tools/highlighters.md [Lines] 17 Old Code: Highlighters run on the debuggee side, not on the toolbox side. This is so that it's possible to highlight elements on a remote device for instance. This means you need to go through the [Remote Debugging Protocol](protocol.md) to use a highlighter. Fixed Code: Highlighters run on the debuggee side, not on the toolbox side. This is so that it's possible to highlight elements on a remote device for instance. This means you need to go through the [Remote Debugging Protocol](../backend/protocol.md) to use a highlighter. Additional Details: - The change appears to be a documentation fix updating a relative file path reference from "protocol.md" to "../backend/protocol.md" - This is not a security-related change but rather a documentation improvement for correct file linking - No security vulnerabilities are introduced or fixed by this change
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/devtools/client/debugger/test/mochitest/browser_dbg-windowless-service-workers.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/devtools/client/debugger/test/mochitest/browser_dbg-windowless-service-workers.js@@ -121,9 +121,14 @@ await removeTab(gBrowser.selectedTab); });+ // Test setting breakpoints while the service worker is starting up. add_task(async function() { info("Subtest #4");+ if (Services.appinfo.fissionAutostart) {+ // Disabled when serviceworker isolation is used due to bug 1749341+ return;+ } const toolbox = await openNewTabAndToolbox( EXAMPLE_URL + "doc-service-workers.html",
Let me analyze the provided code diff for security fixes. Vulnerability Existed: not sure [Potential Race Condition or Isolation Issue] [devtools/client/debugger/test/mochitest/browser_dbg-windowless-service-workers.js] [Lines 121-129] [Old Code] // Test setting breakpoints while the service worker is starting up. add_task(async function() { info("Subtest #4"); const toolbox = await openNewTabAndToolbox( [Fixed Code] // Test setting breakpoints while the service worker is starting up. add_task(async function() { info("Subtest #4"); if (Services.appinfo.fissionAutostart) { // Disabled when serviceworker isolation is used due to bug 1749341 return; } const toolbox = await openNewTabAndToolbox( Additional Details: - The change adds a conditional check for fissionAutostart and skips the test if service worker isolation is enabled - This appears to be related to bug 1749341 (though the exact nature isn't specified in the diff) - The change suggests there might be issues with service worker isolation in certain configurations - Without more context about bug 1749341, it's hard to determine if this was fixing an actual security vulnerability or just a functional bug - The comment suggests this might be a temporary workaround rather than a security fix
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/third_party/rust/async-trait/tests/test.rs+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/third_party/rust/async-trait/tests/test.rs@@ -6,6 +6,7 @@ clippy::let_underscore_drop, clippy::let_unit_value, clippy::missing_panics_doc,+ clippy::missing_safety_doc, clippy::needless_return, clippy::trivially_copy_pass_by_ref, clippy::unused_async@@ -1376,3 +1377,15 @@ pub fn test(_t: &dyn Trait) {} }++// https://github.com/dtolnay/async-trait/issues/183+pub mod issue183 {+ #![deny(clippy::shadow_same)]++ use async_trait::async_trait;++ #[async_trait]+ trait Foo {+ async fn foo(_n: i32) {}+ }+}
Let me analyze the provided code diff for security fixes. Vulnerability Existed: no [No specific vulnerability found] [third_party/rust/async-trait/tests/test.rs] [Lines 6] [Old Code] clippy::missing_panics_doc, [Fixed Code] clippy::missing_panics_doc, clippy::missing_safety_doc, Additional Details: This appears to be a lint addition (missing_safety_doc) which improves code quality but doesn't indicate a security vulnerability. Vulnerability Existed: no [No specific vulnerability found] [third_party/rust/async-trait/tests/test.rs] [Lines 1377-1387] [Old Code] [No previous code] [Fixed Code] pub mod issue183 { #![deny(clippy::shadow_same)] use async_trait::async_trait; #[async_trait] trait Foo { async fn foo(_n: i32) {} } } Additional Details: This addition appears to be a test case for issue #183 from the async-trait repository. It's a test for functionality rather than a security fix. The deny(clippy::shadow_same) is a lint configuration to prevent variable shadowing, which is a code quality improvement rather than a security fix.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/media/libwebp/src/demux/demux.c+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/media/libwebp/src/demux/demux.c@@ -25,7 +25,7 @@ #define DMUX_MAJ_VERSION 1 #define DMUX_MIN_VERSION 2-#define DMUX_REV_VERSION 1+#define DMUX_REV_VERSION 2 typedef struct { size_t start_; // start location of the data
Based on the provided diff, I'll analyze it for security vulnerabilities: Vulnerability Existed: not sure [Potential Version Number Update] [media/libwebp/src/demux/demux.c] [Lines 25] [Old Code] #define DMUX_REV_VERSION 1 [Fixed Code] #define DMUX_REV_VERSION 2 Additional Details: The diff shows only a version number update from 1 to 2 for DMUX_REV_VERSION. While version number updates can sometimes indicate security fixes, there's no direct evidence in this diff of what specific vulnerability was fixed. Version bumps often accompany security patches, but without more context from the changelog or commit message, we can't be certain what vulnerability (if any) this addresses. The change could be purely functional or maintenance-related.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/widget/windows/WinIMEHandler.h+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/widget/windows/WinIMEHandler.h@@ -221,6 +221,7 @@ static bool IsInTabletMode(); static bool AutoInvokeOnScreenKeyboardInDesktopMode(); static bool NeedsToAssociateIMC();+ static bool NeedsSearchInputScope(); /** * Show the Windows on-screen keyboard. Only allowed for
Based on the provided code diff, here's the analysis following the required format: Vulnerability Existed: no [Feature Addition] [widget/windows/WinIMEHandler.h] [Lines 221-222] [Old Code] static bool NeedsToAssociateIMC(); [Fixed Code] static bool NeedsToAssociateIMC(); static bool NeedsSearchInputScope(); Additional Details: The diff shows only an addition of a new static method declaration `NeedsSearchInputScope()` to the WinIMEHandler class. There is no modification or removal of existing code, just an extension of the interface. This appears to be a feature addition rather than a security fix, as there's no evidence of: 1. Any vulnerability being patched 2. Any insecure code being modified 3. Any security-related functionality being added The change simply adds a new method that likely provides additional input scope handling capabilities, possibly related to search functionality in the IME context. Without more context about the implementation of this method, we cannot identify any security implications.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/css/css-backgrounds/background-attachment-350.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/css/css-backgrounds/background-attachment-350.html@@ -17,7 +17,6 @@ -->- <meta content="" name="flags"> <meta content="This test checks that when an element has 'background-attachment: local', then the background image is fixed with regard to what is the element's scrollable area and not to its viewport. In this test, what would be the scrollable area for the div element is where the red square is and such area is clipped due to 'overflow: hidden'." name="assert"> <style>
Analysis of the provided code diff: 1. Vulnerability Existed: no No specific vulnerability found [File] testing/web-platform/tests/css/css-backgrounds/background-attachment-350.html [Lines] 17 [Old Code] `<meta content="" name="flags">` [Fixed Code] (Line removed) Additional Details: The change simply removes an empty meta tag with a "flags" attribute. This doesn't appear to be a security fix but rather a cleanup of unnecessary markup. There's no indication of any security vulnerability being addressed by this change. The meta tag was empty and didn't serve any apparent purpose in the test file.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/marionette/harness/marionette_harness/tests/unit/test_quit_restart.py+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/marionette/harness/marionette_harness/tests/unit/test_quit_restart.py@@ -181,6 +181,13 @@ ): self.marionette.restart(in_app=True, clean=True)+ def test_restart_preserves_requested_capabilities(self):+ self.marionette.delete_session()+ self.marionette.start_session(capabilities={"moz:fooBar": True})++ self.marionette.restart(in_app=False)+ self.assertEqual(self.marionette.session.get("moz:fooBar"), True)+ def test_restart_safe_mode(self): try: self.assertFalse(self.is_safe_mode, "Safe Mode is unexpectedly enabled")@@ -279,6 +286,13 @@ self.marionette.shutdown_timeout = timeout_shutdown self.marionette.startup_timeout = timeout_startup+ def test_in_app_restart_preserves_requested_capabilities(self):+ self.marionette.delete_session()+ self.marionette.start_session(capabilities={"moz:fooBar": True})++ self.marionette.restart(in_app=True)+ self.assertEqual(self.marionette.session.get("moz:fooBar"), True)+ def test_in_app_quit(self): details = self.marionette.quit(in_app=True)
Based on the provided code diff, I don't see any security vulnerabilities being fixed. The changes appear to be adding new test cases to verify that requested capabilities are preserved during restarts (both in-app and out-of-app). Here's the analysis: 1. Vulnerability Existed: no No security vulnerability found [File] testing/marionette/harness/marionette_harness/tests/unit/test_quit_restart.py [Lines] 181-286 [Old Code] (No previous test cases for capability preservation) [Fixed Code] Added test cases to verify capability preservation during restarts The changes are purely test-related additions and don't indicate any security fixes. The new test cases are verifying functionality rather than addressing vulnerabilities. There are no changes to production code or security-sensitive operations in this diff.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/css/mediaqueries/mq-calc-001.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/css/mediaqueries/mq-calc-001.html@@ -6,7 +6,6 @@ <link rel="help" href="http://www.w3.org/TR/css3-values/#calc-notation"> <link rel="match" href="../reference/ref-filled-green-100px-square.xht"> <meta name="assert" content="calc can be used in Media Queries">- <meta name="flags" content=""> <style> div { width: 100px;
Based on the provided code diff, here's the analysis: Vulnerability Existed: no [No specific vulnerability found] [testing/web-platform/tests/css/mediaqueries/mq-calc-001.html] [Lines 6-7] [Old Code] <meta name="flags" content=""> [Fixed Code] [Line removed] Additional Details: 1. The change simply removes an empty meta tag with the "flags" attribute. This appears to be a minor cleanup rather than a security fix. 2. There are no apparent security vulnerabilities being addressed in this change. 3. The modification doesn't involve any security-sensitive operations or potentially dangerous content.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/css/css-fonts/font-size-adjust-zero-1.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/css/css-fonts/font-size-adjust-zero-1.html@@ -5,7 +5,6 @@ <link rel="help" href="http://www.w3.org/TR/css3-fonts/#font-size-adjust-prop"> <link rel="help" href="http://www.w3.org/TR/CSS21/box.html#collapsing-margins"> <link rel="match" href="font-size-zero-2-ref.html">-<meta name="flags" content=""> <style> /* spec ambiguous whether font-size-adjust influences line-height: normal */ body { line-height: 1.2 }
Based on the provided diff, I'll analyze it for security vulnerabilities: 1. Vulnerability Existed: no No specific vulnerability found [File: testing/web-platform/tests/css/css-fonts/font-size-adjust-zero-1.html] [Lines: 5] Old Code: <meta name="flags" content=""> Fixed Code: (removed line) Additional details: - The change simply removes an empty meta tag that wasn't serving any apparent purpose - There's no indication this was related to a security fix - The modification appears to be a test cleanup rather than a security patch - No known vulnerability patterns (XSS, injection, etc.) are present in this change The diff shows no evidence of security vulnerabilities being fixed. The change is likely part of general test maintenance or cleanup.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/drawing-rectangles-to-the-canvas/2d.clearRect.nonfinite.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/drawing-rectangles-to-the-canvas/2d.clearRect.nonfinite.html@@ -17,8 +17,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = '#0f0'; ctx.fillRect(0, 0, 100, 50);@@ -45,7 +45,7 @@ ctx.clearRect(0, Infinity, Infinity, Infinity); ctx.clearRect(0, Infinity, 100, Infinity); ctx.clearRect(0, 0, Infinity, Infinity);-_assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");+_assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255"); t.done(); });
After analyzing the provided code diff, here's my assessment: 1. Vulnerability Existed: no The changes appear to be purely variable renaming (from `offscreenCanvas` to `canvas`) and don't relate to any security fixes. No security vulnerabilities are addressed in this diff. 2. Vulnerability Existed: not sure While the changes don't appear to fix any security issues, the test case does involve handling non-finite values in canvas operations. However: - The test appears to be verifying expected behavior rather than fixing vulnerabilities - The operations with Infinity values might be related to potential arithmetic issues, but no specific vulnerability is being fixed here The diff shows: - Variable name standardization (offscreenCanvas → canvas) - No changes to the actual test logic or security-relevant behavior - The test continues to verify canvas behavior with non-finite values - No CVE or known vulnerability patterns are being addressed No specific vulnerability names can be associated with these changes as they appear to be code style improvements rather than security fixes.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/js/src/jit-test/tests/stream/bug-1503399-1.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/js/src/jit-test/tests/stream/bug-1503399-1.js@@ -1,3 +1,4 @@+// |jit-test| skip-if: !this.hasOwnProperty("ReadableStream") // Don't assert if the wrapper that's the value of stream.[[reader]] gets nuked. load(libdir + "asserts.js");
Let me analyze the diff according to your instructions: Vulnerability Existed: not sure [Potential Test Coverage Issue] [js/src/jit-test/tests/stream/bug-1503399-1.js] [Lines 1] [Old Code] [Don't assert if the wrapper that's the value of stream.[[reader]] gets nuked.] [Fixed Code] [// |jit-test| skip-if: !this.hasOwnProperty("ReadableStream") // Don't assert if the wrapper that's the value of stream.[[reader]] gets nuked.] Additional Details: 1. The change adds a conditional skip to the test when ReadableStream is not available 2. This appears to be a test improvement rather than a direct security fix 3. The original test might have failed in environments without ReadableStream 4. No specific vulnerability name is apparent from this change 5. The change prevents potential test failures rather than fixing a security issue
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/css/css-color/t424-hsl-values-b-10.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/css/css-color/t424-hsl-values-b-10.html@@ -6,7 +6,6 @@ <link rel="author" title="Intel" href="http://www.intel.com"> <link rel="help" href="http://www.w3.org/TR/css3-color/#hsl-color" /> <link rel="match" href="t424-hsl-values-b-10-ref.html" />-<meta name="flags" content="" /> <meta name="assert" content="Implementation of algorithm for converting hsl() colors to rgb() colors." /> <style> table { border-spacing: 0; padding: 0; border: none; }
Based on the provided diff content, here's the analysis: Vulnerability Existed: no No security vulnerability found [File] [Lines 6] [Old Code] <meta name="flags" content="" /> [Fixed Code] (removed line) Additional Details: - The diff shows removal of a meta "flags" tag with empty content - This appears to be a test file cleanup rather than a security fix - No actual vulnerability is being addressed here - The change seems related to test metadata rather than security functionality No other vulnerabilities are apparent in this small diff. The modification is minor and doesn't relate to any known security issues. The removal of an empty flags meta tag doesn't impact security in any way.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/image/test/crashtests/1676172-1.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/image/test/crashtests/1676172-1.html@@ -19,6 +19,15 @@ <body onload="setup();"> <script> let numiframes = 30;++const Cc = SpecialPowers.Cc;+const Ci = SpecialPowers.Ci;+let isDebugBuild =+ Cc["@mozilla.org/xpcom/debug;1"].getService(Ci.nsIDebug2).isDebugBuild;+let isMac =+ navigator.appVersion.toLowerCase().includes("mac") ||+ navigator.platform.toLowerCase().includes("mac");+ // On some platforms too many animating and reloading gifs means we don't ever // get enough time to serve paints so that there is never a period of time // where there are no paints pending, so the reftest harness can't end the@@ -34,6 +43,9 @@ if (navigator.appVersion.includes("Android")) { numiframes = 2; }+if (isMac && isDebugBuild) {+ numiframes = 20;+} for (let i = 0; i < numiframes; i++) { let ifr = document.createElement("iframe"); document.body.appendChild(ifr)
Based on the provided diff, I'll analyze it for security vulnerabilities: 1. Vulnerability Existed: no No specific vulnerability found [File] image/test/crashtests/1676172-1.html [Lines] 19-43 [Old Code] let numiframes = 30; // On some platforms too many animating and reloading gifs means we don't ever // get enough time to serve paints... if (navigator.appVersion.includes("Android")) { numiframes = 2; } [Fixed Code] let numiframes = 30; const Cc = SpecialPowers.Cc; const Ci = SpecialPowers.Ci; let isDebugBuild = Cc["@mozilla.org/xpcom/debug;1"].getService(Ci.nsIDebug2).isDebugBuild; let isMac = navigator.appVersion.toLowerCase().includes("mac") || navigator.platform.toLowerCase().includes("mac"); // On some platforms too many animating and reloading gifs means we don't ever // get enough time to serve paints... if (navigator.appVersion.includes("Android")) { numiframes = 2; } if (isMac && isDebugBuild) { numiframes = 20; } Additional Details: The changes appear to be test-related adjustments rather than security fixes. The modification adds platform-specific handling (Mac + debug build) to reduce the number of iframes, likely to prevent test failures or performance issues rather than addressing a security vulnerability. The code accesses privileged components (SpecialPowers) but this is expected in test code. No actual vulnerability is being fixed here.
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.