![]() ![]() Mozilla reveals in the release notes that Firefox may crash on macOS 'while pinch-zooming under certain circumstances'. Firefox 111.0.1 addresses a crash that affects the browser on macOS devices only. Mozilla Firefox 35.0.1 Change Log 35.0.1 - With the Enhanced Steam extension, Firefox could crash (1123732) 35.0. The vulnerability has been fixed in and Those who cannot upgrade and are using one of the affected packages mentioned above should upgrade them to their latest version to avoid triggering the vulnerable code path in affected versions: v7.23.2, v7.23.2, v0.4.3, `babel-plugin-polyfill-corejs2` v0.4.6, `babel-plugin-polyfill-corejs3` v0.8.5, `babel-plugin-polyfill-es-shims` v0.10.0, `babel-plugin-polyfill-regenerator` v0.5.3. The new version of the browser, once released, should get picked up automatically at this stage. ![]() Users that only compile trusted code are not impacted. No other plugins under the namespace are impacted, but third-party plugins might be. Known affected plugins are when using its `useBuiltIns` option and any "polyfill provider" plugin that depends on such as `babel-plugin-polyfill-corejs3`, `babel-plugin-polyfill-corejs2`, `babel-plugin-polyfill-es-shims`, `babel-plugin-polyfill-regenerator`. In prior to versions 7.23.2 and 8.0.0-alpha.4 and all versions of `babel-traverse`, using Babel to compile code that was specifically crafted by an attacker can lead to arbitrary code execution during compilation, when using plugins that rely on the `path.evaluate()`or `path.evaluateTruthy()` internal Babel methods. CVE-2023-45133 Babel is a compiler for writingJavaScript. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |