Result, color emoji(s) will look different than before.Īdjusted some things in our memory allocator code to. This also furtherĮxtends unicode support to Unicode 10 emoji(s). To the open-licensed Twemoji (with additional ). Changed the embedded font from the no longer free EmojiOne Updated RegExp(RegExp object, flags) to the ES6 standard Object.getOwnPropertyNames(string) and others for web compatibility. Added a trailing slash to referrers when policy is set to a number of spec compliance in our media. Major new features will be added from this point forward.Ĭhanges/. Support v27.9 with security and stability updates for a while, but no On UXP and the new v28 milestone building on it. This is the last major development update for the v27 milestoneĪfter this, we will be focusing our efforts for new features entirely Several stability (crashes) and memory safety. This vulnerability requires the use of a malicious or Unicode string conversion within JavaScript with extremely largeĪmounts of data. (CVE-2018-5178) a buffer overflow during UTF8 to (CVE-2018-5154) a use-after-free vulnerability whileĮnumerating attributes during SVG animations with clip paths. The Skia library resulting in possible out-of-bounds writes. (CVE-2018-5159) an integer overflow vulnerability in Leading to a buffer overflow and crash if it occurs. (CVE-2018-5177) a vulnerability in the XSLT component Potentially executable files from user view in the panel. This could be used to obscure the file extension of Improperly rendering some Unicode characters, allowing for the file (CVE-2018-5173) an in the Downloads panel (CVE-2018-5174) Prevent potential SmartScreen bypass on We changed the language strings for softblocked items so. Surrounding code changes, exposing the problem, or when new attackĬhanges/. Prevents future vulnerabilities caused by the same code, e.g. Potentially) actively exploitable vulnerability in Pale Moon, but. The is "Defense-in-Depth": It is a that does not apply to a temporary permission due toīackup, virus scanning or similar external processes). an in the case the preferences file in the Added some sanity checks on nsMozIconURI. a buffer overflow using the computed size of canvas.Įlements (CVE-2018-12359). an with invalid qcms transformsĬVE-2018-12366). Kinds of files without being prompted, this permission has been reset. Likely accidentally) granted a system-wide waiver for opening these Improved the security check for launching executable files on Windows from the browser. Redirected to different origins (CVE-2018-12364). a potential vulnerability with plugins being Prevented various location-based threats. Scheme that could potentially be abused to infringe the user's privacy. Their "Only with Firefox" discrimination preventing users fromĭownloading themes, old versions of extensions, and other files with Updated the useragent for to work around.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |