about summary refs log tree commit diff
path: root/pkgs/applications
diff options
context:
space:
mode:
authorAndreas Rammhold <andreas@rammhold.de>2018-10-03 09:38:43 +0200
committerAndreas Rammhold <andreas@rammhold.de>2018-10-03 09:51:13 +0200
commite7785f1148a8d9535b320eef4aa2d8cd8b64c400 (patch)
tree3216dc299be7d31c56c99e0c45b4eef58d8987bd /pkgs/applications
parent64d02660cb832ceaf1e3fe88c9c3e9a27609cbd4 (diff)
downloadnixlib-e7785f1148a8d9535b320eef4aa2d8cd8b64c400.tar
nixlib-e7785f1148a8d9535b320eef4aa2d8cd8b64c400.tar.gz
nixlib-e7785f1148a8d9535b320eef4aa2d8cd8b64c400.tar.bz2
nixlib-e7785f1148a8d9535b320eef4aa2d8cd8b64c400.tar.lz
nixlib-e7785f1148a8d9535b320eef4aa2d8cd8b64c400.tar.xz
nixlib-e7785f1148a8d9535b320eef4aa2d8cd8b64c400.tar.zst
nixlib-e7785f1148a8d9535b320eef4aa2d8cd8b64c400.zip
firefox: 62.0.2 -> 62.0.3 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
Diffstat (limited to 'pkgs/applications')
-rw-r--r--pkgs/applications/networking/browsers/firefox/packages.nix4
1 files changed, 2 insertions, 2 deletions
diff --git a/pkgs/applications/networking/browsers/firefox/packages.nix b/pkgs/applications/networking/browsers/firefox/packages.nix
index 935be6230cd3..1f1f8d127ab1 100644
--- a/pkgs/applications/networking/browsers/firefox/packages.nix
+++ b/pkgs/applications/networking/browsers/firefox/packages.nix
@@ -20,10 +20,10 @@ rec {
 
   firefox = common rec {
     pname = "firefox";
-    version = "62.0.2";
+    version = "62.0.3";
     src = fetchurl {
       url = "mirror://mozilla/firefox/releases/${version}/source/firefox-${version}.source.tar.xz";
-      sha512 = "0j5q1aa7jhq4pydaywp8ymibc319wv3gw2q15qp14i069qk3fpn33zb5z86lhb6z864f88ikx3zxv6phqs96qvzj25yqbh7nxmzwhvv";
+      sha512 = "0kvb664s47bmmdq2ppjsnyqy8yaiig1xj81r25s36c3i8igfq3zxvws10k2dlmmmrwyc5k4g9i9imgkxj7r3xwwqxc72dl429wvfys8";
     };
 
     patches = nixpkgsPatches ++ [