head	1.2;
access;
symbols
	RELEASE_5_3_0:1.1;
locks; strict;
comment	@# @;


1.2
date	2004.10.22.00.42.19;	author adamw;	state dead;
branches;
next	1.1;

1.1
date	2004.09.28.03.20.33;	author marcus;	state Exp;
branches;
next	;


desc
@@


1.2
log
@Update to 1.8a4. For now, if you're building with Xft2 support,
an explicit --disable-freetype2 is passed to the configure script.
@
text
@Index: mozilla/netwerk/dns/src/nsIDNService.cpp
===================================================================
RCS file: /cvsroot/mozilla/netwerk/dns/src/nsIDNService.cpp,v
retrieving revision 1.18
retrieving revision 1.18.10.1
diff -u -r1.18 -r1.18.10.1
--- netwerk/dns/src/nsIDNService.cpp	3 Apr 2004 07:32:18 -0000	1.18
+++ netwerk/dns/src/nsIDNService.cpp	27 Aug 2004 11:23:21 -0000	1.18.10.1
@@@@ -242,6 +242,9 @@@@
 
 NS_IMETHODIMP nsIDNService::Normalize(const nsACString & input, nsACString & output)
 {
+  // protect against bogus input
+  NS_ENSURE_TRUE(IsUTF8(input), NS_ERROR_UNEXPECTED);
+
   nsAutoString outUTF16;
   nsresult rv = stringPrep(NS_ConvertUTF8toUTF16(input), outUTF16);
   if (NS_SUCCEEDED(rv))
@


1.1
log
@Patch the various recently reported security vulnerabilities in Mozilla.

This update covers the following Mozilla bugs:

245066
226669
250862
255067
256316
257317
258005

Thanks to nectar for scraping all of these patches together.

Obtained from:	Mozilla CVS
Approved by:	portmgr (implicit)
@
text
@@

