summaryrefslogtreecommitdiff
path: root/www/firefox-bin
AgeCommit message (Collapse)AuthorFilesLines
2009-09-30Add checksums for Solaris 10 binary, package still doesn't build but atsketch1-1/+4
least bulk builds are not left retrying the distfile for hours and hours.
2009-06-06Update firefox-bin to 2.0.0.20.obache2-6/+12
Firefox 2.0.0.20 includes an additional security fix over Firefox 2.0.0.19 for users of the Windows platform. So no significant changes for Linux edition, but 2.0.0.19 is not available.
2008-12-17Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.19.ghen2-6/+6
Security fixes in this version: MFSA 2008-69 XSS vulnerabilities in SessionStore MFSA 2008-68 XSS and JavaScript privilege escalation MFSA 2008-67 Escaped null characters ignored by CSS parser MFSA 2008-66 Errors parsing URLs with leading whitespace and control characters MFSA 2008-65 Cross-domain data theft via script redirect error message MFSA 2008-64 XMLHttpRequest 302 response disclosure MFSA 2008-62 Additional XSS attack vectors in feed preview MFSA 2008-61 Information stealing via loadBindingDocument MFSA 2008-60 Crashes with evidence of memory corruption (rv:1.9.0.5/1.8.1.19) For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.19/releasenotes/
2008-11-20Set the default maintainer for Mozilla related binary packages totron1-1/+2
<pkgsrc-users@NetBSD.org> and only assign the "firefox-bin" package to <grant@NetBSD.org> because that is the package he really created.
2008-11-13Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.18.ghen2-6/+6
Security fixes in this version: MFSA 2008-58 Parsing error in E4X default namespace MFSA 2008-57 -moz-binding property bypasses security checks on codebase principals MFSA 2008-56 nsXMLHttpRequest::NotifyEventListeners() same-origin violation MFSA 2008-55 Crash and remote code execution in nsFrameManager MFSA 2008-54 Buffer overflow in http-index-format parser MFSA 2008-53 XSS and JavaScript privilege escalation via session restore MFSA 2008-52 Crashes with evidence of memory corruption (rv:1.9.0.4/1.8.1.18) MFSA 2008-50 Crash and remote code execution via __proto__ tampering MFSA 2008-49 Arbitrary code execution via Flash Player dynamic module unloading MFSA 2008-48 Image stealing via canvas and HTTP redirect MFSA 2008-47 Information stealing via local shortcut files For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.18/releasenotes/
2008-09-24Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.17.ghen2-6/+6
(ok during freeze agc@) Security fixes in this version: MFSA 2008-45 XBM image uninitialized memory reading MFSA 2008-44 resource: traversal vulnerabilities MFSA 2008-43 BOM characters stripped from JavaScript before execution MFSA 2008-42 Crashes with evidence of memory corruption (rv:1.9.0.2/1.8.1.17) MFSA 2008-41 Privilege escalation via XPCnativeWrapper pollution MFSA 2008-40 Forced mouse drag MFSA 2008-39 Privilege escalation using feed preview page and XSS flaw MFSA 2008-38 nsXMLDocument::OnChannelRedirect() same-origin violation MFSA 2008-37 UTF-8 URL stack buffer overflow For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.17/releasenotes/
2008-07-16Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.16.ghen2-6/+6
Security fixes in this version: MFSA 2008-35 Command-line URLs launch multiple tabs when Firefox not running MFSA 2008-34 Remote code execution by overflowing CSS reference counter For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.16/releasenotes/
2008-07-02Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.15.ghen2-6/+6
Part of patch-af has been fixed upstream. Security fixes in this version: MFSA 2008-33 Crash and remote code execution in block reflow MFSA 2008-32 Remote site run as local file via Windows URL shortcut MFSA 2008-31 Peer-trusted certs can use alt names to spoof MFSA 2008-30 File location URL in directory listings not escaped properly MFSA 2008-29 Faulty .properties file results in uninitialized memory being used MFSA 2008-28 Arbitrary socket connections with Java LiveConnect on Mac OS X MFSA 2008-27 Arbitrary file upload via originalTarget and DOM Range MFSA 2008-25 Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() MFSA 2008-24 Chrome script loading from fastload file MFSA 2008-23 Signed JAR tampering MFSA 2008-22 XSS through JavaScript same-origin violation MFSA 2008-21 Crashes with evidence of memory corruption (rv:1.8.1.15) For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.15/releasenotes/
2008-04-17Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.14.ghen2-6/+6
Security fixes in this version: MFSA 2008-20 Crash in JavaScript garbage collector For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.14/releasenotes/
2008-03-27Update "firefox-bin" package to version 2.0.0.13. This update fixes thetron2-6/+6
following security issues: - MFSA 2008-19 XUL popup spoofing variant (cross-tab popups) - MFSA 2008-18 Java socket connection to any local port via LiveConnect - MFSA 2008-17 Privacy issue with SSL Client Authentication - MFSA 2008-16 HTTP Referrer spoofing with malformed URLs - MFSA 2008-15 Crashes with evidence of memory corruption (rv:1.8.1.13) - MFSA 2008-14 JavaScript privilege escalation and arbitrary code execution
2008-03-07Add support for user-destdir installation -- seamonkey-bin/Makefile.commonjlam1-1/+3
has already been altered to support user-destdir, so we just need to turn it on in these packages.
2008-02-08Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.12.ghen2-18/+6
Security fixes in this version: MFSA 2008-11 Web forgery overwrite with div overlay MFSA 2008-10 URL token stealing via stylesheet redirect MFSA 2008-09 Mishandling of locally-saved plain text files MFSA 2008-08 File action dialog tampering MFSA 2008-06 Web browsing history and forward navigation stealing MFSA 2008-05 Directory traversal via chrome: URI MFSA 2008-04 Stored password corruption MFSA 2008-03 Privilege escalation, XSS, Remote Code Execution MFSA 2008-02 Multiple file input focus stealing vulnerabilities MFSA 2008-01 Crashes with evidence of memory corruption (rv:1.8.1.12) For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.12/releasenotes/
2007-12-02Add distinfo for solaris10 binaries (weren't available yet when the 2.0.0.11ghen1-1/+7
release was announced).
2007-12-01Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.11.ghen2-18/+12
This update fixes a bug introduced by the 2.0.0.10 update in the <canvas> feature that affected some web pages and extensions. For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.11/releasenotes/
2007-11-28Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.10.ghen2-18/+18
Security fixes in this version: MFSA 2007-39 Referer-spoofing via window.location race condition MFSA 2007-38 Memory corruption vulnerabilities (rv:1.8.1.10) MFSA 2007-37 jar: URI scheme XSS hazard For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.10/releasenotes/
2007-11-02Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.9.ghen2-18/+18
Fixes a number of regressions introduced in 2.0.0.8: * Bug 400406 - Firefox will ignore the clear CSS property when used beneath a box that is using the float property. There is a temporary workaround JS/CSS code available for web developers with affected layouts. * Bug 400467 - Windows Vista users will get Java not found or Java not working errors when trying to load Java applets after updating. To fix this, users can right-click the Firefox icon and Run as administrator, then browse to a page with a Java applet doing this once will fix the problem and permanently restore Java functionality. * Bug 396695 - Add-ons are disabled after updating. Users can fix this problem by opening their profile folder and removing three files (extensions.rdf, extensions.ini and extensions.cache) * Bug 400421 - Removing a single area element from an image map will cause the entire map to disappear. There is no workaround available at this time. * Bug 400735 - Some Windows users may experience crashes at startup. There is no workaround available at this time. For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.9/releasenotes/
2007-10-25Move code that generates a dynamic PLIST from the {pre,do,post}-installjlam1-2/+0
targets and into a GENERATE_PLIST variable definition. Remove some unnecessary empty PLISTs as a result of properly setting GENERATE_PLIST.
2007-10-25Re-add "intentionally empty" PLISTs for meta-packages and other packagesjlam1-0/+2
that directly manipulate empty PLISTs. Modify plist/plist.mk so that if the PLIST files are missing and no GENERATE_PLIST is defined, then the package fails to build.
2007-10-25Remove empty PLISTs from pkgsrc since revision 1.33 of plist/plist.mkjlam1-2/+0
can handle packages having no PLIST files.
2007-10-20Remove empty lines to get rid of warnings in weekly pkgsrc checks on babylon5.ghen1-5/+1
Suggested by veego.
2007-10-19Add distinfo entries for Solaris {8,10}/{i386,sparc} as well.ghen1-1/+17
Noted by dmcmahill.
2007-10-19Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.8.ghen2-22/+6
Security fixes in this version: MFSA 2007-36 URIs with invalid %-encoding mishandled by Windows MFSA 2007-35 XPCNativeWrapper pollution using Script object MFSA 2007-34 Possible file stealing through sftp protocol MFSA 2007-33 XUL pages can hide the window titlebar MFSA 2007-32 File input focus stealing vulnerability MFSA 2007-31 Browser digest authentication request splitting MFSA 2007-30 onUnload Tailgating MFSA 2007-29 Crashes with evidence of memory corruption (rv:1.8.1.8) For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.8/releasenotes/
2007-10-09Remove trailing spaces.martti1-2/+2
2007-10-07add a bunch of missing distfile checksums (for solaris8, solaris10, sparc ↵dmcmahill2-4/+20
and x86 for each of those).
2007-09-20Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.7.ghen2-14/+6
This version only fixes a Windows-specific security issue, but update nevertheless so we start the freeze with the latest available version. (People will start asking about this update anyway?) For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.7/releasenotes/
2007-08-23Allow a nicer syntax for expressing needing at least a certain versionjlam2-17/+9
of an emulated operating system. Instead of proliferating things like SUSE_VERSION_REQD, NETBSD_VERSION_REQD, SOLARIS_VERSION_REQD, etc., a package can say: EMUL_REQD= suse>=9.1 netbsd>=2.0 solaris>=10 all in one, succinct line.
2007-08-06Bump revision number after dependence fix.tron1-1/+3
2007-07-31Add distinfo for solaris-i386 and solaris-sparc (using "make emul-fetch" andghen1-1/+7
"make emul-distinfo", thanks jlam!).
2007-07-31Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.6.ghen2-18/+6
Security fixes in this version: MFSA 2007-27 Unescaped URIs passed to external programs MFSA 2007-26 Privilege escalation through chrome-loaded about:blank windows For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.6/releasenotes/
2007-07-29* Add new emulator framework in pkgsrc/mk/emulator that handles alljlam8-26/+63
binary-only packages that require binary "emulation" on the native operating system. Please see pkgsrc/mk/emulator/README for more details. * Teach the plist framework to automatically use any existing PLIST.${EMUL_PLATFORM} as part of the default PLIST_SRC definition. * Convert all of the binary-only packages in pkgsrc to use the emulator framework. Most of them have been tested to install and deinstall correctly. This involves the following cleanup actions: * Remove use of custom PLIST code and use PLIST.${EMUL_PLATFORM} more consistently. * Simplify packages by using default INSTALL and DEINSTALL scripts instead of custom INSTALL/DEINSTALL code. * Remove "SUSE_COMPAT32" and "PKG_OPTIONS.suse" from pkgsrc. Packages only need to state exactly which emulations they support, and the framework handles any i386-on-x86_64 or sparc-on-sparc64 uses. * Remove "USE_NATIVE_LINUX" from pkgsrc. The framework will automatically detect when the package is installing on Linux. Specific changes to packages include: * Bump the PKGREVISIONs for all of the suse100* and suse91* packages due to changes in the +INSTALL/+DEINSTALL scripts used in all of the packages. * Remove pkgsrc/emulators/suse_linux, which is unused by any packages. * cad/lc -- remove custom code to create the distinfo file for all supported platforms; just use "emul-fetch" and "emul-distinfo" instead. * lang/Cg-compiler -- install the shared libraries under ${EMULDIR} instead of ${PREFIX}/lib so that compiled programs will find the shared libraries. * mail/thunderbird-bin-nightly -- update to latest binary distributions for supported platforms. * multimedia/ns-flash -- update Linux version to 9.0.48 as the older version is no longer available for interactive fetch. * security/uvscan -- set LD_LIBRARY_PATH explicitly so that it's not necessary to install library symlinks into ${EMULDIR}/usr/local/lib. * www/firefox-bin-flash -- update Linux version to 9.0.48 as the older version is no longer available for interactive fetch.
2007-07-19Update to 2.0.0.5:xtraeme2-6/+6
MFSA 2007-25 XPCNativeWrapper pollution MFSA 2007-24 Unauthorized access to wyciwyg:// documents MFSA 2007-23 Remote code execution by launching Firefox from Internet Explorer MFSA 2007-22 File type confusion due to %00 in name MFSA 2007-21 Privilege escalation using an event handler attached to an element not in the document MFSA 2007-20 Frame spoofing while window is loading MFSA 2007-19 XSS using addEventListener and setTimeout MFSA 2007-18 Crashes with evidence of memory corruption
2007-05-31Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.4.ghen2-6/+6
Security fixes in this version: MFSA 2007-17 XUL Popup Spoofing MFSA 2007-16 XSS using addEventListener MFSA 2007-14 Path Abuse in Cookies MFSA 2007-13 Persistent Autocomplete Denial of Service MFSA 2007-12 Crashes with evidence of memory corruption For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.4/releasenotes/
2007-05-12Update to Firefox 2.0.0.3 (nb1), from www/firefox2* (see there for historyghen6-32/+19
and change notes). Firefox 1.5.0.x will be maintained in www/firefox15*, as discussed on tech-pkg.
2007-05-12Add an EOL note here as well.ghen1-0/+4
2007-03-21Update firefox, firefox-bin and firefox-gtk1 to 1.5.0.11. Fixed in this version:ghen2-6/+6
* Security update: MFSA 2007-11 (FTP PASV port-scanning) has been fixed. * Website Compatibility: Fixed various web compatibility regressions. For more info, see http://www.mozilla.com/en-US/firefox/releases/1.5.0.11.html
2007-02-25Update firefox, firefox-bin and firefox-gtk1 to 1.5.0.10. Fixed in this version:ghen2-6/+6
Fixed in Firefox 1.5.0.10 MFSA 2007-07 Embedded nulls in location.hostname confuse same-domain checks MFSA 2007-06 Mozilla Network Security Services (NSS) SSLv2 buffer overflow MFSA 2007-05 XSS and local file access by opening blocked popups MFSA 2007-04 Spoofing using custom cursor and CSS3 hotspot MFSA 2007-03 Information disclosure through cache collisions MFSA 2007-02 Improvements to help protect against Cross-Site Scripting attacks MFSA 2007-01 Crashes with evidence of memory corruption (rv:1.8.0.10/1.8.1.2) For more info, see http://www.mozilla.com/en-US/firefox/releases/1.5.0.10.html
2007-02-22Whitespace cleanup, courtesy of pkglint.wiz1-2/+2
Patch provided by Sergey Svishchev in private mail.
2006-12-20Update firefox, firefox-bin and firefox-gtk1 to 1.5.0.9. Fixed in this version:ghen2-6/+6
MFSA 2006-75 RSS Feed-preview referrer leak MFSA 2006-73 Mozilla SVG Processing Remote Code Execution MFSA 2006-72 XSS by setting img.src to javascript: URI MFSA 2006-71 LiveConnect crash finalizing JS objects MFSA 2006-70 Privilege escallation using watch point MFSA 2006-68 Crashes with evidence of memory corruption (rv:1.8.0.9/1.8.1.1) For more info, see http://www.mozilla.com/en-US/firefox/releases/1.5.0.9.html
2006-11-25seamonkey-bin/Makefile.common - allow override of MOZ_DIRjdolecek2-9/+4
update firefox-bin and firefox2-bin to override MOZ_DIR to point to the binary Linux distribution; kill their own MASTER_SITES now firefox-bin and firefox2-bin automaticaly pick up mirror changes in the master script
2006-11-08Update firefox, firefox-bin and firefox-gtk1 to 1.5.0.8. Fixed in this version:ghen2-6/+6
MFSA 2006-67 Running Script can be recompiled MFSA 2006-66 RSA signature forgery (variant) MFSA 2006-65 Crashes with evidence of memory corruption (rv:1.8.0.8) For more info, see http://www.mozilla.com/en-US/firefox/releases/1.5.0.8.html
2006-09-24Use Makefile.common from seamonkey-bin dir instead of mozilla-bin.salo1-2/+2
2006-09-15Update firefox-bin to 1.5.0.7 and seamonkey-bin to 1.0.5. Source packageghen2-6/+6
updates will follow later. Fixed in Firefox 1.5.0.7: MFSA 2006-64 Crashes with evidence of memory corruption (rv:1.8.0.7) MFSA 2006-62 Popup-blocker cross-site scripting (XSS) MFSA 2006-61 Frame spoofing using document.open() MFSA 2006-60 RSA Signature Forgery MFSA 2006-59 Concurrency-related vulnerability MFSA 2006-58 Auto-Update compromise through DNS and SSL spoofing MFSA 2006-57 JavaScript Regular Expression Heap Corruption Fixed in SeaMonkey 1.0.5: MFSA 2006-64 Crashes with evidence of memory corruption (rv:1.8.0.7) MFSA 2006-63 JavaScript execution in mail via XBL MFSA 2006-61 Frame spoofing using document.open() MFSA 2006-60 RSA Signature Forgery MFSA 2006-59 Concurrency-related vulnerability MFSA 2006-57 JavaScript Regular Expression Heap Corruption For more info, see http://www.mozilla.com/firefox/releases/1.5.0.7.html and http://www.mozilla.org/projects/seamonkey/releases/seamonkey1.0.5/
2006-08-03Update "firefox-bin" package to version 1.5.0.6. Changes since 1.5.0.5:tron3-9/+10
- Fixed an issue with playing Windows Media content
2006-07-27Update "firefox-bin" package to version 1.5.0.5. Changes since 1.5.0.4:tron2-6/+6
- Improvements to product stability - Several security fixes: MFSA 2006-56 chrome: scheme loading remote content MFSA 2006-55 Crashes with evidence of memory corruption (rv:1.8.0.5) MFSA 2006-54 XSS with XPCNativeWrapper(window).Function(...) MFSA 2006-53 UniversalBrowserRead privilege escalation MFSA 2006-52 PAC privilege escalation using Function.prototype.call MFSA 2006-51 Privilege escalation using named-functions and redefined "new Object()" MFSA 2006-50 JavaScript engine vulnerabilities MFSA 2006-48 JavaScript new Function race condition MFSA 2006-47 Native DOM methods can be hijacked across domains MFSA 2006-46 Memory corruption with simultaneous events MFSA 2006-45 Javascript navigator Object Vulnerability MFSA 2006-44 Code execution through deleted frame reference
2006-06-09firefox-bin requires libraries from suse_compat when using SUSE 10.0salo1-1/+4
2006-06-02Updated to version 1.5.0.4salo2-6/+6
Changes: Fixes for security issues: MFSA 2006-43 Privilege escalation using addSelectionListener MFSA 2006-42 Web site XSS using BOM on UTF-8 pages MFSA 2006-41 File stealing by changing input type (variant) MFSA 2006-39 "View Image" local resource linking (Windows) MFSA 2006-38 Buffer overflow in crypto.signText() MFSA 2006-37 Remote compromise via content-defined setter on object prototypes MFSA 2006-36 PLUGINSPAGE privileged JavaScript execution 2 MFSA 2006-35 Privilege escalation through XUL persist MFSA 2006-34 XSS viewing javascript: frames or images from context menu MFSA 2006-33 HTTP response smuggling MFSA 2006-32 Fixes for crashes with potential memory corruption MFSA 2006-31 EvalInSandbox escape (Proxy Autoconfig, Greasemonkey)
2006-05-03use http CZ mirrorjdolecek1-2/+2
2006-05-03add cz mirrorjdolecek1-2/+4
XXX why this has special MASTER_SITES setting? it should make use of XXX list in mozilla-bin/Makefile.common
2006-05-03Update "firefox-bin" package to version 1.5.0.3. Changes since 1.5.0.2:tron2-7/+6
- Security fix for denial of service vulnerability reported in Mozilla Foundation Security Advisory 2006-30
2006-04-14Update to 1.5.0.2:xtraeme2-7/+7
* Universal Binary support for Mac OS X which provides native support for Macintosh with Intel Core processors. Firefox supports the enhancements to performance introduced by the new MacIntel chipsets. * Improvements to product stability. * Several security fixes.