Skip to content

Commit 8a777c0

Browse files
committed
✨ jQuery v1.4.5-sec
1 parent 507478b commit 8a777c0

File tree

4 files changed

+200
-158
lines changed

4 files changed

+200
-158
lines changed

README.md

Lines changed: 14 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -32,20 +32,20 @@ In some cases, it may be unavoidable that a security fix involves a breaking cha
3232

3333
In a perfect world, at least every MAJOR EOL jQuery release line would have a security-patched release. "Major" refers to the meaning of the term in [SemVer](https://semver.org/), thus releases that have breaking changes. The goal is to provide a patched version of jQuery for all major release lines to provide a path of least resistance for all downstream users to upgrade to a secure version jQuery with [no (or minimal) breaking changes](#but-what-about-breaking-changes).
3434

35-
| jQuery version | jQuery-sec version | Branch | PR | Release | CVEs Patched |
36-
| -------------- | ------------------ | ----------- | -------------- | ------- | ------------------------------------------------------------------------------------------------------------------------------------ |
37-
| `1.2.6` | `1.2.7-sec` | [1.2.7-sec] | [PR][1.2.7-pr] | | [CVE-2011-4969] \| [CVE-2012-6708] \| <del>CVE-2015-9251</del>* \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
38-
| `1.3.2` | `1.3.3-sec` | [1.3.3-sec] | [PR][1.3.3-pr] | | [CVE-2011-4969] \| [CVE-2012-6708] \| <del>CVE-2015-9251</del>* \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
39-
| `1.4.4` | `1.4.5-sec` | | | | [CVE-2011-4969] \| [CVE-2012-6708] \| [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
40-
| `1.5.2` | `1.5.3-sec` | | | | [CVE-2011-4969] \| [CVE-2012-6708] \| [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
41-
| `1.6.4` | `1.6.5-sec` | [1.6.5-sec] | [PR][1.6.5-pr] | | [CVE-2012-6708] \| [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
42-
| `1.7.2` | `1.7.3-sec` | | | | [CVE-2012-6708] \| [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
43-
| `1.8.3` | `1.8.4-sec` | | | | [CVE-2012-6708] \| [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
44-
| `1.12.4` | `1.12.5-sec` | | | | [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-11022] \| [CVE-2020-11023] |
45-
| `2.2.4` | `2.2.5-sec` | | | | [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-11022] \| [CVE-2020-11023] \| [CVE-2020-23064] |
35+
| jQuery version | jQuery-sec version | Branch | PR | Release | CVEs Patched |
36+
| -------------- | ------------------ | ----------- | -------------- | ------- | ----------------------------------------------------------------------------------------------------------------------------------------------- |
37+
| `1.2.6` | `1.2.7-sec` | [1.2.7-sec] | [PR][1.2.7-pr] | | [CVE-2011-4969] \| [CVE-2012-6708] \| <del>CVE-2015-9251</del>\* \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
38+
| `1.3.2` | `1.3.3-sec` | [1.3.3-sec] | [PR][1.3.3-pr] | | [CVE-2011-4969] \| [CVE-2012-6708] \| <del>CVE-2015-9251</del>\* \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
39+
| `1.4.4` | `1.4.5-sec` | [1.4.5-sec] | [PR][1.4.5-pr] | | [CVE-2011-4969] \| [CVE-2012-6708] \| [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
40+
| `1.5.2` | `1.5.3-sec` | | | | [CVE-2011-4969] \| [CVE-2012-6708] \| [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
41+
| `1.6.4` | `1.6.5-sec` | [1.6.5-sec] | [PR][1.6.5-pr] | | [CVE-2012-6708] \| [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
42+
| `1.7.2` | `1.7.3-sec` | | | | [CVE-2012-6708] \| [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
43+
| `1.8.3` | `1.8.4-sec` | | | | [CVE-2012-6708] \| [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-7656] \| [CVE-2020-11022] \| [CVE-2020-11023] |
44+
| `1.12.4` | `1.12.5-sec` | | | | [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-11022] \| [CVE-2020-11023] |
45+
| `2.2.4` | `2.2.5-sec` | | | | [CVE-2015-9251] \| [CVE-2019-11358] \| [CVE-2020-11022] \| [CVE-2020-11023] \| [CVE-2020-23064] |
4646

4747
> [!IMPORTANT]
48-
> *CVE-2015-9251 is not reproducible in `1.2.6` and `1.3.2`
48+
> \*CVE-2015-9251 is not reproducible in `1.2.6` and `1.3.2`
4949
5050
> [!NOTE]
5151
> The 3.x release line is currently supported by jQuery, so we have no need to provide patched versions of 3.x at this time. jQuery 3.5 introduced a breaking change, but it was necessary to fix CVE-2020-11022 and CVE-2020-11023. However, since these vulnerabilities are present in virtually all versions of jQuery, there would be no value in providing a patched version of 3.4 as it would need to include that breaking change anyway.
@@ -60,13 +60,12 @@ Ultimately, our hope is that these patched versions can be approved and accepted
6060

6161
[1.2.7-sec]: https://github.com/ctcpip/jquery-security-patches/tree/1.2.7-sec
6262
[1.2.7-pr]: https://github.com/ctcpip/jquery-security-patches/pull/2
63-
6463
[1.3.3-sec]: https://github.com/ctcpip/jquery-security-patches/tree/1.3.3-sec
6564
[1.3.3-pr]: https://github.com/ctcpip/jquery-security-patches/pull/3
66-
65+
[1.4.5-sec]: https://github.com/ctcpip/jquery-security-patches/tree/1.4.5-sec
66+
[1.4.5-pr]: https://github.com/ctcpip/jquery-security-patches/pull/4
6767
[1.6.5-sec]: https://github.com/ctcpip/jquery-security-patches/tree/1.6.5-sec
6868
[1.6.5-pr]: https://github.com/ctcpip/jquery-security-patches/pull/1
69-
7069
[CVE-2011-4969]: https://github.com/advisories/GHSA-579v-mp3v-rrw5
7170
[CVE-2012-6708]: https://github.com/advisories/GHSA-2pqj-h3vj-pqgw
7271
[CVE-2015-9251]: https://github.com/advisories/GHSA-rmxg-73gg-4p98

security/README.md

Lines changed: 52 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
<!-- markdownlint-disable MD024 -->
2+
13
# Testing (and building) jQuery
24

35
> [!IMPORTANT]
@@ -21,6 +23,36 @@
2123
- Run `make test` from the root folder of the repo
2224
- Open `/tests/index.html` in your browser -->
2325

26+
##### 1.4.4 / 1.4.5-sec
27+
28+
###### Prerequisites
29+
30+
- Install php 5.6
31+
- For Macs, We recommend using [homebrew-php](https://github.com/shivammathur/homebrew-php)
32+
33+
###### Running the tests
34+
35+
- Checkout the `1.4.4` or `1.4.5-sec` branch
36+
- From the root folder of the repo:
37+
- `git clone git@github.com:qunitjs/qunit.git --depth=1 test/qunit`
38+
- `cd test/qunit`
39+
- Get the closest QUnit commit to the jQuery version/release:
40+
- `git checkout 25e4489a5f280e8f0a22ca99ecb401338bb75308`
41+
- `cd ../..`
42+
- `git clone git@github.com:jquery/sizzle.git --depth=1 src/sizzle`
43+
- `cd src/sizzle`
44+
- `git fetch --tags`
45+
- Get corresponding sizzle branch for this jQuery version/release:
46+
- `git checkout 1.4.4`
47+
- `cd ..`
48+
- Create symlink to src in test folder:
49+
- `ln -s ../src src`
50+
- `cd ..`
51+
- `make jquery`
52+
- Run php server:
53+
- `php -S 127.0.0.1:8000 -t test`
54+
- Open `/tests/index.html` in your browser
55+
2456
##### 1.6.4 / 1.6.5-sec
2557

2658
###### Prerequisites
@@ -59,19 +91,34 @@ You can run the A/B tests locally in CI mode or manually in the browser
5991

6092
## Building
6193

62-
<!-- markdownlint-disable-next-line MD024 -->
6394
### 1.2.6 / 1.2.7-sec
6495

6596
- Checkout the `1.2.6` or `1.2.7-sec` branch
6697
- Run `make jquery` from the root folder of the repo
67-
- this will output `./dist/jquery.js`
98+
- This will output `./dist/jquery.js`
6899

69-
<!-- markdownlint-disable-next-line MD024 -->
70100
### 1.3.2 / 1.3.3-sec
71101

72102
- Checkout the `1.3.2` or `1.3.3-sec` branch
73103
- Run `make jquery` from the root folder of the repo
74-
- this will output `./dist/jquery.js`
104+
- This will output `./dist/jquery.js`
105+
106+
### 1.4.4 / 1.4.5-sec
107+
108+
- Checkout the `1.4.4` or `1.4.5-sec` branch
109+
- From the root folder of the repo:
110+
- `git clone git@github.com:qunitjs/qunit.git --depth=1 test/qunit`
111+
- `cd test/qunit`
112+
- Get the closest QUnit commit to the jQuery version/release:
113+
- `git checkout 25e4489a5f280e8f0a22ca99ecb401338bb75308`
114+
- `cd ../..`
115+
- `git clone git@github.com:jquery/sizzle.git --depth=1 src/sizzle`
116+
- `cd src/sizzle`
117+
- `git fetch --tags`
118+
- Get corresponding sizzle branch for this jQuery version/release:
119+
- `git checkout 1.4.4`
120+
- `cd ../..`
121+
- Run `make jquery`
122+
- This will output `./dist/jquery.js`
75123

76-
<!-- markdownlint-disable-next-line MD024 -->
77124
### 1.6.4 / 1.6.5-sec

0 commit comments

Comments
 (0)