Skip to content
Snippets Groups Projects
Unverified Commit a5388a80 authored by Georg Koppen's avatar Georg Koppen
Browse files

Apply follow-up patch for bug 24052

parent 8c793c6e
No related branches found
No related tags found
No related merge requests found
...@@ -37,6 +37,7 @@ files: ...@@ -37,6 +37,7 @@ files:
- "dzip.sh" - "dzip.sh"
- "versions" - "versions"
- "24052.patch" - "24052.patch"
- "24052_2.patch"
script: | script: |
source versions source versions
INSTDIR="$HOME/install" INSTDIR="$HOME/install"
...@@ -90,6 +91,7 @@ script: | ...@@ -90,6 +91,7 @@ script: |
cd tor-browser cd tor-browser
patch -p1 < ../24052.patch patch -p1 < ../24052.patch
patch -p1 < ../24052_2.patch
# run get-moz-build-date before removing .git, which is used to get the year # run get-moz-build-date before removing .git, which is used to get the year
chmod +x ~/build/get-moz-build-date chmod +x ~/build/get-moz-build-date
eval $(~/build/get-moz-build-date $(cat browser/config/version.txt)) eval $(~/build/get-moz-build-date $(cat browser/config/version.txt))
......
...@@ -25,6 +25,7 @@ files: ...@@ -25,6 +25,7 @@ files:
- "fix-info-plist.py" - "fix-info-plist.py"
- "versions" - "versions"
- "24052.patch" - "24052.patch"
- "24052_2.patch"
script: | script: |
INSTDIR="$HOME/install/" INSTDIR="$HOME/install/"
source versions source versions
...@@ -38,6 +39,7 @@ script: | ...@@ -38,6 +39,7 @@ script: |
cd tor-browser cd tor-browser
patch -p1 < ../24052.patch patch -p1 < ../24052.patch
patch -p1 < ../24052_2.patch
# Extracting all the necessary tools # Extracting all the necessary tools
tar xaf ../MacOSX10.7.sdk.tar.gz tar xaf ../MacOSX10.7.sdk.tar.gz
tar xaf ../cctools.tar.gz tar xaf ../cctools.tar.gz
......
From e2c1240ad25f4edcc7d3828b29f6aeb953a24a2e Mon Sep 17 00:00:00 2001
From: Arthur Edelstein <arthuredelstein@gmail.com>
Date: Wed, 1 Nov 2017 02:33:18 -0700
Subject: [PATCH] Bug 24052: Handle redirects by blocking them early
This is the second part of the workaround for
https://bugzilla.mozilla.org/show_bug.cgi?id=1412081.
diff --git a/netwerk/protocol/http/nsHttpChannel.cpp b/netwerk/protocol/http/nsHttpChannel.cpp
index 0e570e8cb57d..b38be48bf0c9 100644
--- a/netwerk/protocol/http/nsHttpChannel.cpp
+++ b/netwerk/protocol/http/nsHttpChannel.cpp
@@ -5419,6 +5419,13 @@ nsHttpChannel::AsyncProcessRedirection(uint32_t redirectType)
return NS_ERROR_CORRUPTED_CONTENT;
}
+ bool isRedirectToFile = false;
+ rv = mRedirectURI->SchemeIs("file", &isRedirectToFile);
+ if (!NS_FAILED(rv) && isRedirectToFile) {
+ LOG(("Attempted to redirect from a remote page to a file:// URI."));
+ return NS_ERROR_FAILURE;
+ }
+
if (mApplicationCache) {
// if we are redirected to a different origin check if there is a fallback
// cache entry to fall back to. we don't care about file strict
--
2.14.2
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment