home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.comp.freeware      Generic free software discussions      39,996 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 39,760 of 39,996   
   JJ to VanguardLH   
   Re: Mozilla finishes 2025 with an almost   
   04 Jan 26 16:27:33   
   
   From: jj4public@gmail.com   
      
   On Sat, 3 Jan 2026 09:48:17 -0600, VanguardLH wrote:   
   >   
   > What I couldn't tell from the CVE reports mentioned by Shadow is whether   
   > or not the memory reuse vulnerability was in Javascript interpreter in   
   > Firefox, as Shadow and yeti surmised rather blindly, or in some other   
   > part of Firefox.  As you say, disabling Javascript in web docs won't   
   > affect Javascript employed elsewhere.  Plus, the CVEs only mention some   
   > memory pointer reuse, and never mentioned Javascript at all nor the   
   > vulnerability was only within the scope of Javascript employed in   
   > malicious web docs.   
      
   It's likely both. Disability API requires JS to access, and memory   
   management is beyond the reach of JS code.   
      
   The first CVE may be a bug in Disability API object destruction routine. The   
   second CVE may be a long standing bug in Firefox's general memory   
   management.   
      
   I always suspect that, Firefox's memory management has a problem which kept   
   piling up little by little getting ready to blow up. If you use Firefox as   
   your main browser, you might be aware of its long standing memory leak   
   problem. Most notably, when browsing search results and accessing result   
   items back and forth in Google Maps.   
      
   > With uBlock Origin still usable in Firefox, you could define it to block   
   > 3rd-party scripts, but not 1st-party scripts.   
      
   IMO, the uBlock Origin's colored filter UI design is flawed. We have to   
   block the domain name in order to block 1st party scripts of the current   
   site. The "1st-party" setting alone doesn't do anything. I kept the old   
   uMatrix (also based on uBlock) along side uBlock Origin, since it provides   
   much finer control on this matter. I only use uBlock for URL based filter.   
      
   > I also used to block 3rd-party web fonts which   
   > allow the font foundaries (most Google) to track where you visited,   
   > perhaps even which page, when you visited, and how often.  Problem was   
   > the pages could get rather difficult to figure out what a placeholder   
   > icon would do when clicked on unless I dug into code, and that's way too   
   > much trouble.   
      
   That! I hate that too. Moreover most sites which use them for icons, they   
   only need less than 25% of the font characters. Wasting more resources than   
   what they try to save. The final result has bigger waste ratio.   
      
   > but when I go there it says I need to login.  I also went to   
   > bugzilla.mozilla.org to search on 2000597, but got the same denial.  I   
   > can do a search to find bug tickets without logging in, but not this one   
   > nor 1996570 or 1999700 for the other CVE.  If you can login, do those   
   > bug tickets report the Javascript engine is the culprit when a web doc's   
   > script or Firefox uses the Disability API?   
      
   The details of crucial bugs are usually kept confidential or at least have   
   strict public access to prevent it from being misused.   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca