GNU bug report logs - #74628
[PATCH 0/2] gnu: librewolf: Update to 133.0-1 [security fixes].

Previous Next

Package: guix-patches;

Reported by: Ian Eure <ian <at> retrospec.tv>

Date: Sat, 30 Nov 2024 18:32:02 UTC

Severity: normal

Tags: patch

Done: Hilton Chain <hako <at> ultrarare.space>

Bug is archived. No further changes may be made.

To add a comment to this bug, you must first unarchive it, by sending
a message to control AT debbugs.gnu.org, with unarchive 74628 in the body.
You can then email your comments to 74628 AT debbugs.gnu.org in the normal way.

Toggle the display of automated, internal messages from the tracker.

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to guix-patches <at> gnu.org:
bug#74628; Package guix-patches. (Sat, 30 Nov 2024 18:32:02 GMT) Full text and rfc822 format available.

Acknowledgement sent to Ian Eure <ian <at> retrospec.tv>:
New bug report received and forwarded. Copy sent to guix-patches <at> gnu.org. (Sat, 30 Nov 2024 18:32:02 GMT) Full text and rfc822 format available.

Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):

From: Ian Eure <ian <at> retrospec.tv>
To: guix-patches <at> gnu.org
Cc: Ian Eure <ian <at> retrospec.tv>
Subject: [PATCH 0/2] gnu: librewolf: Update to 133.0-1 [security fixes].
Date: Sat, 30 Nov 2024 10:31:31 -0800
Straightforward update, only requires an nss-rapid version bump.

Ian Eure (2):
  gnu: nss-rapid: Update to 3.107.
  gnu: librewolf: Update to 133.0-1 [security fixes].

 gnu/packages/librewolf.scm | 8 ++++----
 gnu/packages/nss.scm       | 6 +++---
 2 files changed, 7 insertions(+), 7 deletions(-)

-- 
2.46.0





Information forwarded to guix-patches <at> gnu.org:
bug#74628; Package guix-patches. (Sat, 30 Nov 2024 18:33:03 GMT) Full text and rfc822 format available.

Message #8 received at 74628 <at> debbugs.gnu.org (full text, mbox):

From: Ian Eure <ian <at> retrospec.tv>
To: 74628 <at> debbugs.gnu.org
Cc: Ian Eure <ian <at> retrospec.tv>
Subject: [PATCH 1/2] gnu: nss-rapid: Update to 3.107.
Date: Sat, 30 Nov 2024 10:32:41 -0800
* gnu/packages/nss.scm (nss-rapid): Update to 3.107.

Change-Id: I05c6e9c6633ed222d26b76ae5def35179f31f317
---
 gnu/packages/nss.scm | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/gnu/packages/nss.scm b/gnu/packages/nss.scm
index 86b3743656..aaa9848501 100644
--- a/gnu/packages/nss.scm
+++ b/gnu/packages/nss.scm
@@ -333,7 +333,7 @@ (define-public nss-rapid
   (package
    (inherit nss)
    (name "nss-rapid")
-   (version "3.105")
+   (version "3.107")
    (source (origin
              (inherit (package-source nss))
              (uri (let ((version-with-underscores
@@ -344,7 +344,7 @@ (define-public nss-rapid
                      "nss-" version ".tar.gz")))
              (sha256
               (base32
-               "06an746lrnmp7mnr866cjxngkrw8c5ngdykw425q4p6ai264r3lf"))))
+               "0ab7kpyg54aha86aw0ak70ckmfj1ih7d9x8mlrqhf59q7r3rczkz"))))
    (arguments
     (substitute-keyword-arguments (package-arguments nss)
       ((#:phases phases)
@@ -376,7 +376,7 @@ (define-public nss-rapid
                      ;; leading to test failures:
                      ;; <https://bugzilla.mozilla.org/show_bug.cgi?id=609734>.  To
                      ;; work around that, set the time to roughly the release date.
-                     (invoke "faketime" "2024-09-2" "./nss/tests/all.sh"))
+                     (invoke "faketime" "2024-11-29" "./nss/tests/all.sh"))
                    (format #t "test suite not run~%"))))))))
    (synopsis "Network Security Services (Rapid Release)")
    (description
-- 
2.46.0





Information forwarded to guix-patches <at> gnu.org:
bug#74628; Package guix-patches. (Sat, 30 Nov 2024 18:33:03 GMT) Full text and rfc822 format available.

Message #11 received at 74628 <at> debbugs.gnu.org (full text, mbox):

From: Ian Eure <ian <at> retrospec.tv>
To: 74628 <at> debbugs.gnu.org
Cc: Ian Eure <ian <at> retrospec.tv>
Subject: [PATCH 2/2] gnu: librewolf: Update to 133.0-1 [security fixes].
Date: Sat, 30 Nov 2024 10:32:42 -0800
New upstream version.  Fixes CVEs:

CVE-2024-11691: Out-of-bounds write in Apple GPU drivers via WebGL
CVE-2024-11700: Potential Tapjacking Exploit for Intent Confirmation
                on Android
CVE-2024-11692: Select list elements could be shown over another site
CVE-2024-11701: Misleading Address Bar State During Navigation
                Interruption
CVE-2024-11702: Inadequate Clipboard Protection in Private Browsing
                Mode on Android
CVE-2024-11693: Download Protections were bypassed by .library-ms
                files on Windows
CVE-2024-11694: CSP Bypass and XSS Exposure via Web Compatibility
                Shims
CVE-2024-11695: URL Bar Spoofing via Manipulated Punycode and
                Whitespace Characters
CVE-2024-11703: Password access without authentication via PIN bypass
                on Android
CVE-2024-11696: Unhandled Exception in Add-on Signature Verification
CVE-2024-11697: Improper Keypress Handling in Executable File
                Confirmation Dialog
CVE-2024-11704: Potential Double-Free Vulnerability in PKCS#7
                Decryption Handling
CVE-2024-11698: Fullscreen Lock-Up When Modal Dialog Interrupts
                Transition on macOS
CVE-2024-11705: Null Pointer Dereference in NSC_DeriveKey
CVE-2024-11706: Null Pointer Dereference in PKCS#12 Utility
CVE-2024-11708: Data race with PlaybackParams
CVE-2024-11699: Memory safety bugs fixed in Firefox 133, Firefox ESR
                128.5, and Thunderbird 128.5

* gnu/packages/librewolf.scm (librewolf): Update to 133.0-1.

Change-Id: I611505daf4d4f0940405190471f443d99102c2b9
---
 gnu/packages/librewolf.scm | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/gnu/packages/librewolf.scm b/gnu/packages/librewolf.scm
index ad387b1cac..5d432cfad8 100644
--- a/gnu/packages/librewolf.scm
+++ b/gnu/packages/librewolf.scm
@@ -199,17 +199,17 @@ (define rust-librewolf rust) ; 1.75 is the default in Guix, 1.65 is the minimum.
 ;; Update this id with every update to its release date.
 ;; It's used for cache validation and therefore can lead to strange bugs.
 ;; ex: date '+%Y%m%d%H%M%S'
-(define %librewolf-build-id "20241119164012")
+(define %librewolf-build-id "20241130102406")
 
 (define-public librewolf
   (package
     (name "librewolf")
-    (version "132.0.2-1")
+    (version "133.0-1")
     (source
      (make-librewolf-source
       #:version version
-      #:firefox-hash "1s8h4sf78i5ybzv5pvdpx09fb04gdly7pzgivh8kzqdlyij1g7ij"
-      #:librewolf-hash "0qyi0w92vj5yqljrkzcif2jiz3ispyglg4awywyiqd874i0p8c7c"))
+      #:firefox-hash "0q6cqfnwc2x09frdvsndmhck8ixrnbl281j9rqw5w8bd7fd2qas9"
+      #:librewolf-hash "1xf7gx3xm3c7dhch9gwpb0xp11lcyim1nrbm8sjljxdcs7iq9jy4"))
     (build-system gnu-build-system)
     (arguments
      (list
-- 
2.46.0





Information forwarded to guix-patches <at> gnu.org:
bug#74628; Package guix-patches. (Sat, 30 Nov 2024 21:17:02 GMT) Full text and rfc822 format available.

Message #14 received at 74628 <at> debbugs.gnu.org (full text, mbox):

From: Rodion Goritskov <rodion.goritskov <at> gmail.com>
To: 74628 <at> debbugs.gnu.org
Subject: [PATCH 0/2] gnu: librewolf: Update to 133.0-1 [security fixes].
Date: Sun, 01 Dec 2024 01:14:56 +0400
Hi!

Patches apply successfully, both nss-rapid and librewolf build fine on
x86_64.

Librewolf starts and opens a couple of sites.

LGTM.




Reply sent to Hilton Chain <hako <at> ultrarare.space>:
You have taken responsibility. (Mon, 02 Dec 2024 00:04:03 GMT) Full text and rfc822 format available.

Notification sent to Ian Eure <ian <at> retrospec.tv>:
bug acknowledged by developer. (Mon, 02 Dec 2024 00:04:04 GMT) Full text and rfc822 format available.

Message #19 received at 74628-done <at> debbugs.gnu.org (full text, mbox):

From: Hilton Chain <hako <at> ultrarare.space>
To: Ian Eure <ian <at> retrospec.tv>
Cc: 74628-done <at> debbugs.gnu.org
Subject: Re: [bug#74628] [PATCH 0/2] gnu: librewolf: Update to 133.0-1
 [security fixes].
Date: Mon, 02 Dec 2024 08:02:33 +0800
Hi Ian,

On Sun, 01 Dec 2024 02:31:31 +0800,
Ian Eure wrote:
>
> Straightforward update, only requires an nss-rapid version bump.
>
> Ian Eure (2):
>   gnu: nss-rapid: Update to 3.107.
>   gnu: librewolf: Update to 133.0-1 [security fixes].
>
>  gnu/packages/librewolf.scm | 8 ++++----
>  gnu/packages/nss.scm       | 6 +++---
>  2 files changed, 7 insertions(+), 7 deletions(-)
>
> --
> 2.46.0

Applied as 395abb86a61e9ea9ed49a25e4ba3f44ac80cebb4 and
41fd9cfc65e0284173c9cb45117f8b47bd88874d, thanks!




bug archived. Request was from Debbugs Internal Request <help-debbugs <at> gnu.org> to internal_control <at> debbugs.gnu.org. (Mon, 30 Dec 2024 12:24:09 GMT) Full text and rfc822 format available.

This bug report was last modified 166 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.