diff options
author | ghen <ghen@pkgsrc.org> | 2006-07-31 11:58:04 +0000 |
---|---|---|
committer | ghen <ghen@pkgsrc.org> | 2006-07-31 11:58:04 +0000 |
commit | de387ff96b6a8e7209c153516e0dea6eba2336ef (patch) | |
tree | 6903ef455e6507918ada808de2cdee9c11a25a62 /www/seamonkey | |
parent | 66e3e0214872b4e01b808a14347cdb92eaf93c47 (diff) | |
download | pkgsrc-de387ff96b6a8e7209c153516e0dea6eba2336ef.tar.gz |
Update the Seamonkey packages to 1.0.3.
Changes:
* Improved stability
* Several security fixes (see below)
* A bug was introduced in SeaMonkey 1.0.2 that sometimes caused the URL bar to
stop working properly when switching tabs. This has been fixed. (Bug 332874)
* If you have more bookmarks on your personal toolbar than there is space for,
the ">>" overflow icon will now display more reliably (Bug 338803)
* If you choose to update SeaMonkey when it notifies you that an update is
available, the update page will load in a more useful browser window (with
navigation buttons and toolbars) (Bug 334903)
Security fixes:
MFSA 2006-56 chrome: scheme loading remote content
MFSA 2006-55 Crashes with evidence of memory corruption (rv:1.8.0.5)
MFSA 2006-54 XSS with XPCNativeWrapper(window).Function(...)
MFSA 2006-53 UniversalBrowserRead privilege escalation
MFSA 2006-52 PAC privilege escalation using Function.prototype.call
MFSA 2006-51 Privilege escalation using named-functions and redefined "new Object()"
MFSA 2006-50 JavaScript engine vulnerabilities
MFSA 2006-49 Heap buffer overwrite on malformed VCard
MFSA 2006-48 JavaScript new Function race condition
MFSA 2006-47 Native DOM methods can be hijacked across domains
MFSA 2006-46 Memory corruption with simultaneous events
MFSA 2006-45 Javascript navigator Object Vulnerability
MFSA 2006-44 Code execution through deleted frame reference
For a detailed ChangeLog, see:
http://www.mozilla.org/projects/seamonkey/releases/seamonkey1.0.3/changelog.html
Diffstat (limited to 'www/seamonkey')
-rw-r--r-- | www/seamonkey/Makefile | 4 | ||||
-rw-r--r-- | www/seamonkey/distinfo | 10 | ||||
-rw-r--r-- | www/seamonkey/patches/patch-cn | 27 |
3 files changed, 25 insertions, 16 deletions
diff --git a/www/seamonkey/Makefile b/www/seamonkey/Makefile index 9b68be2d9fa..650cb977f55 100644 --- a/www/seamonkey/Makefile +++ b/www/seamonkey/Makefile @@ -1,8 +1,8 @@ -# $NetBSD: Makefile,v 1.5 2006/06/03 08:04:36 ghen Exp $ +# $NetBSD: Makefile,v 1.6 2006/07/31 11:58:04 ghen Exp $ MOZILLA= seamonkey MOZILLA_BIN= seamonkey-bin -MOZ_VER= 1.0.2 +MOZ_VER= 1.0.3 EXTRACT_SUFX= .tar.bz2 DISTFILES= ${DISTNAME}${EXTRACT_SUFX} diff --git a/www/seamonkey/distinfo b/www/seamonkey/distinfo index 985e4374556..1e5d7714e5f 100644 --- a/www/seamonkey/distinfo +++ b/www/seamonkey/distinfo @@ -1,8 +1,8 @@ -$NetBSD: distinfo,v 1.7 2006/07/10 13:17:13 christos Exp $ +$NetBSD: distinfo,v 1.8 2006/07/31 11:58:04 ghen Exp $ -SHA1 (seamonkey-1.0.2.source.tar.bz2) = 966e9a57269cd54f40312e5fdaa42e9f2c3fbcea -RMD160 (seamonkey-1.0.2.source.tar.bz2) = b6ff9bcb1289ae9190a1934dcc3f6eea3f6d716c -Size (seamonkey-1.0.2.source.tar.bz2) = 35473635 bytes +SHA1 (seamonkey-1.0.3.source.tar.bz2) = b770a32a5b941325beede42f153affe32043f4bd +RMD160 (seamonkey-1.0.3.source.tar.bz2) = 93fb9e46ad64bf59cb0649eefe862681bd632f2a +Size (seamonkey-1.0.3.source.tar.bz2) = 35838471 bytes SHA1 (patch-aa) = 2d117311991c4c71803f3c446334d7b6f1e1067a SHA1 (patch-ab) = 4bcabb447ca151c5e87e8799398ee239e69f3f90 SHA1 (patch-ac) = b05971f672c83c80a29edc69c2055fd6ca855fa1 @@ -43,7 +43,7 @@ SHA1 (patch-cj) = 8716afb433a9cab1202cd39db1611ec784859c43 SHA1 (patch-ck) = 157fad436bb71795e5ff4b6b8efb26f7f6a84e90 SHA1 (patch-cl) = 0c6d7f86739ec8cb805d8ddc0034a421488274bc SHA1 (patch-cm) = f3de952dd8eedfb5e4a11a2b05500d37890b13f5 -SHA1 (patch-cn) = 67b5ed52ffe09eb083ee30d9916c231666e0507c +SHA1 (patch-cn) = 50ce66acc8df8cab48f281b93ae74edcaf939d21 SHA1 (patch-db) = f10187cf9de4466e49a967b79875eb01c5afd69f SHA1 (patch-dc) = ba7b06f04460d4966e115a9ffdeafc1ebf555972 SHA1 (patch-dd) = de9d705fdc3cb9879a19d58dfd170d104ca379f7 diff --git a/www/seamonkey/patches/patch-cn b/www/seamonkey/patches/patch-cn index eecdf65a1a4..f1ad01964d1 100644 --- a/www/seamonkey/patches/patch-cn +++ b/www/seamonkey/patches/patch-cn @@ -1,6 +1,6 @@ -$NetBSD: patch-cn,v 1.1.1.1 2006/03/30 19:15:51 ghen Exp $ +$NetBSD: patch-cn,v 1.2 2006/07/31 11:58:04 ghen Exp $ ---- extensions/transformiix/source/xpath/XFormsFunctionCall.cpp.orig 2005-08-04 23:15:37.000000000 +0200 +--- extensions/transformiix/source/xpath/XFormsFunctionCall.cpp.orig 2006-06-13 22:58:31.000000000 +0200 +++ extensions/transformiix/source/xpath/XFormsFunctionCall.cpp @@ -104,7 +104,7 @@ XFormsFunctionCall::evaluate(txIEvalCont res = (res/i); @@ -20,7 +20,16 @@ $NetBSD: patch-cn,v 1.1.1.1 2006/03/30 19:15:51 ghen Exp $ nsresult rv = xformsService->GetDaysFromDateTime(date, &result); if (NS_SUCCEEDED(rv)) { res = result; -@@ -345,7 +345,7 @@ XFormsFunctionCall::evaluate(txIEvalCont +@@ -222,7 +222,7 @@ XFormsFunctionCall::evaluate(txIEvalCont + NS_ENSURE_SUCCESS(rv, rv); + + PRInt32 index = 0; +- double res = Double::NaN; ++ double res = Double::NaN(); + rv = xformsService->GetRepeatIndex(repeatEle, &index); + NS_ENSURE_SUCCESS(rv, rv); + +@@ -354,7 +354,7 @@ XFormsFunctionCall::evaluate(txIEvalCont getter_AddRefs(nodes)); NS_ENSURE_SUCCESS(rv, rv); @@ -29,7 +38,7 @@ $NetBSD: patch-cn,v 1.1.1.1 2006/03/30 19:15:51 ghen Exp $ PRInt32 i; for (i = 0; i < nodes->size(); ++i) { double test; -@@ -353,7 +353,7 @@ XFormsFunctionCall::evaluate(txIEvalCont +@@ -362,7 +362,7 @@ XFormsFunctionCall::evaluate(txIEvalCont txXPathNodeUtils::appendNodeValue(nodes->get(i), resultStr); test = Double::toDouble(resultStr); if (Double::isNaN(test)) { @@ -38,7 +47,7 @@ $NetBSD: patch-cn,v 1.1.1.1 2006/03/30 19:15:51 ghen Exp $ break; } if (test > res || i == 0) { -@@ -373,7 +373,7 @@ XFormsFunctionCall::evaluate(txIEvalCont +@@ -382,7 +382,7 @@ XFormsFunctionCall::evaluate(txIEvalCont getter_AddRefs(nodes)); NS_ENSURE_SUCCESS(rv, rv); @@ -47,7 +56,7 @@ $NetBSD: patch-cn,v 1.1.1.1 2006/03/30 19:15:51 ghen Exp $ PRInt32 i; for (i = 0; i < nodes->size(); ++i) { double test; -@@ -381,7 +381,7 @@ XFormsFunctionCall::evaluate(txIEvalCont +@@ -390,7 +390,7 @@ XFormsFunctionCall::evaluate(txIEvalCont txXPathNodeUtils::appendNodeValue(nodes->get(i), resultStr); test = Double::toDouble(resultStr); if (Double::isNaN(test)) { @@ -56,7 +65,7 @@ $NetBSD: patch-cn,v 1.1.1.1 2006/03/30 19:15:51 ghen Exp $ break; } if ((test < res) || (i==0)) { -@@ -404,7 +404,7 @@ XFormsFunctionCall::evaluate(txIEvalCont +@@ -413,7 +413,7 @@ XFormsFunctionCall::evaluate(txIEvalCont NS_ENSURE_SUCCESS(rv, rv); PRInt32 result = 0; @@ -65,7 +74,7 @@ $NetBSD: patch-cn,v 1.1.1.1 2006/03/30 19:15:51 ghen Exp $ nsresult rv = xformsService->GetMonths(duration, &result); if (NS_SUCCEEDED(rv)) { res = result; -@@ -480,7 +480,7 @@ XFormsFunctionCall::evaluate(txIEvalCont +@@ -489,7 +489,7 @@ XFormsFunctionCall::evaluate(txIEvalCont // up the chain return rv; } @@ -74,7 +83,7 @@ $NetBSD: patch-cn,v 1.1.1.1 2006/03/30 19:15:51 ghen Exp $ } return aContext->recycler()->getNumberResult(res, aResult); -@@ -505,7 +505,7 @@ XFormsFunctionCall::evaluate(txIEvalCont +@@ -514,7 +514,7 @@ XFormsFunctionCall::evaluate(txIEvalCont // up the chain return rv; } |