summaryrefslogtreecommitdiff
path: root/www/firefox-bin
AgeCommit message (Collapse)AuthorFilesLines
2008-03-07Add support for user-destdir installation -- seamonkey-bin/Makefile.commonjlam1-1/+3
has already been altered to support user-destdir, so we just need to turn it on in these packages.
2008-02-08Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.12.ghen2-18/+6
Security fixes in this version: MFSA 2008-11 Web forgery overwrite with div overlay MFSA 2008-10 URL token stealing via stylesheet redirect MFSA 2008-09 Mishandling of locally-saved plain text files MFSA 2008-08 File action dialog tampering MFSA 2008-06 Web browsing history and forward navigation stealing MFSA 2008-05 Directory traversal via chrome: URI MFSA 2008-04 Stored password corruption MFSA 2008-03 Privilege escalation, XSS, Remote Code Execution MFSA 2008-02 Multiple file input focus stealing vulnerabilities MFSA 2008-01 Crashes with evidence of memory corruption (rv:1.8.1.12) For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.12/releasenotes/
2007-12-02Add distinfo for solaris10 binaries (weren't available yet when the 2.0.0.11ghen1-1/+7
release was announced).
2007-12-01Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.11.ghen2-18/+12
This update fixes a bug introduced by the 2.0.0.10 update in the <canvas> feature that affected some web pages and extensions. For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.11/releasenotes/
2007-11-28Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.10.ghen2-18/+18
Security fixes in this version: MFSA 2007-39 Referer-spoofing via window.location race condition MFSA 2007-38 Memory corruption vulnerabilities (rv:1.8.1.10) MFSA 2007-37 jar: URI scheme XSS hazard For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.10/releasenotes/
2007-11-02Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.9.ghen2-18/+18
Fixes a number of regressions introduced in 2.0.0.8: * Bug 400406 - Firefox will ignore the clear CSS property when used beneath a box that is using the float property. There is a temporary workaround JS/CSS code available for web developers with affected layouts. * Bug 400467 - Windows Vista users will get Java not found or Java not working errors when trying to load Java applets after updating. To fix this, users can right-click the Firefox icon and Run as administrator, then browse to a page with a Java applet doing this once will fix the problem and permanently restore Java functionality. * Bug 396695 - Add-ons are disabled after updating. Users can fix this problem by opening their profile folder and removing three files (extensions.rdf, extensions.ini and extensions.cache) * Bug 400421 - Removing a single area element from an image map will cause the entire map to disappear. There is no workaround available at this time. * Bug 400735 - Some Windows users may experience crashes at startup. There is no workaround available at this time. For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.9/releasenotes/
2007-10-25Move code that generates a dynamic PLIST from the {pre,do,post}-installjlam1-2/+0
targets and into a GENERATE_PLIST variable definition. Remove some unnecessary empty PLISTs as a result of properly setting GENERATE_PLIST.
2007-10-25Re-add "intentionally empty" PLISTs for meta-packages and other packagesjlam1-0/+2
that directly manipulate empty PLISTs. Modify plist/plist.mk so that if the PLIST files are missing and no GENERATE_PLIST is defined, then the package fails to build.
2007-10-25Remove empty PLISTs from pkgsrc since revision 1.33 of plist/plist.mkjlam1-2/+0
can handle packages having no PLIST files.
2007-10-20Remove empty lines to get rid of warnings in weekly pkgsrc checks on babylon5.ghen1-5/+1
Suggested by veego.
2007-10-19Add distinfo entries for Solaris {8,10}/{i386,sparc} as well.ghen1-1/+17
Noted by dmcmahill.
2007-10-19Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.8.ghen2-22/+6
Security fixes in this version: MFSA 2007-36 URIs with invalid %-encoding mishandled by Windows MFSA 2007-35 XPCNativeWrapper pollution using Script object MFSA 2007-34 Possible file stealing through sftp protocol MFSA 2007-33 XUL pages can hide the window titlebar MFSA 2007-32 File input focus stealing vulnerability MFSA 2007-31 Browser digest authentication request splitting MFSA 2007-30 onUnload Tailgating MFSA 2007-29 Crashes with evidence of memory corruption (rv:1.8.1.8) For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.8/releasenotes/
2007-10-09Remove trailing spaces.martti1-2/+2
2007-10-07add a bunch of missing distfile checksums (for solaris8, solaris10, sparc ↵dmcmahill2-4/+20
and x86 for each of those).
2007-09-20Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.7.ghen2-14/+6
This version only fixes a Windows-specific security issue, but update nevertheless so we start the freeze with the latest available version. (People will start asking about this update anyway?) For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.7/releasenotes/
2007-08-23Allow a nicer syntax for expressing needing at least a certain versionjlam2-17/+9
of an emulated operating system. Instead of proliferating things like SUSE_VERSION_REQD, NETBSD_VERSION_REQD, SOLARIS_VERSION_REQD, etc., a package can say: EMUL_REQD= suse>=9.1 netbsd>=2.0 solaris>=10 all in one, succinct line.
2007-08-06Bump revision number after dependence fix.tron1-1/+3
2007-07-31Add distinfo for solaris-i386 and solaris-sparc (using "make emul-fetch" andghen1-1/+7
"make emul-distinfo", thanks jlam!).
2007-07-31Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.6.ghen2-18/+6
Security fixes in this version: MFSA 2007-27 Unescaped URIs passed to external programs MFSA 2007-26 Privilege escalation through chrome-loaded about:blank windows For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.6/releasenotes/
2007-07-29* Add new emulator framework in pkgsrc/mk/emulator that handles alljlam8-26/+63
binary-only packages that require binary "emulation" on the native operating system. Please see pkgsrc/mk/emulator/README for more details. * Teach the plist framework to automatically use any existing PLIST.${EMUL_PLATFORM} as part of the default PLIST_SRC definition. * Convert all of the binary-only packages in pkgsrc to use the emulator framework. Most of them have been tested to install and deinstall correctly. This involves the following cleanup actions: * Remove use of custom PLIST code and use PLIST.${EMUL_PLATFORM} more consistently. * Simplify packages by using default INSTALL and DEINSTALL scripts instead of custom INSTALL/DEINSTALL code. * Remove "SUSE_COMPAT32" and "PKG_OPTIONS.suse" from pkgsrc. Packages only need to state exactly which emulations they support, and the framework handles any i386-on-x86_64 or sparc-on-sparc64 uses. * Remove "USE_NATIVE_LINUX" from pkgsrc. The framework will automatically detect when the package is installing on Linux. Specific changes to packages include: * Bump the PKGREVISIONs for all of the suse100* and suse91* packages due to changes in the +INSTALL/+DEINSTALL scripts used in all of the packages. * Remove pkgsrc/emulators/suse_linux, which is unused by any packages. * cad/lc -- remove custom code to create the distinfo file for all supported platforms; just use "emul-fetch" and "emul-distinfo" instead. * lang/Cg-compiler -- install the shared libraries under ${EMULDIR} instead of ${PREFIX}/lib so that compiled programs will find the shared libraries. * mail/thunderbird-bin-nightly -- update to latest binary distributions for supported platforms. * multimedia/ns-flash -- update Linux version to 9.0.48 as the older version is no longer available for interactive fetch. * security/uvscan -- set LD_LIBRARY_PATH explicitly so that it's not necessary to install library symlinks into ${EMULDIR}/usr/local/lib. * www/firefox-bin-flash -- update Linux version to 9.0.48 as the older version is no longer available for interactive fetch.
2007-07-19Update to 2.0.0.5:xtraeme2-6/+6
MFSA 2007-25 XPCNativeWrapper pollution MFSA 2007-24 Unauthorized access to wyciwyg:// documents MFSA 2007-23 Remote code execution by launching Firefox from Internet Explorer MFSA 2007-22 File type confusion due to %00 in name MFSA 2007-21 Privilege escalation using an event handler attached to an element not in the document MFSA 2007-20 Frame spoofing while window is loading MFSA 2007-19 XSS using addEventListener and setTimeout MFSA 2007-18 Crashes with evidence of memory corruption
2007-05-31Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.4.ghen2-6/+6
Security fixes in this version: MFSA 2007-17 XUL Popup Spoofing MFSA 2007-16 XSS using addEventListener MFSA 2007-14 Path Abuse in Cookies MFSA 2007-13 Persistent Autocomplete Denial of Service MFSA 2007-12 Crashes with evidence of memory corruption For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.4/releasenotes/
2007-05-12Update to Firefox 2.0.0.3 (nb1), from www/firefox2* (see there for historyghen6-32/+19
and change notes). Firefox 1.5.0.x will be maintained in www/firefox15*, as discussed on tech-pkg.
2007-05-12Add an EOL note here as well.ghen1-0/+4
2007-03-21Update firefox, firefox-bin and firefox-gtk1 to 1.5.0.11. Fixed in this version:ghen2-6/+6
* Security update: MFSA 2007-11 (FTP PASV port-scanning) has been fixed. * Website Compatibility: Fixed various web compatibility regressions. For more info, see http://www.mozilla.com/en-US/firefox/releases/1.5.0.11.html
2007-02-25Update firefox, firefox-bin and firefox-gtk1 to 1.5.0.10. Fixed in this version:ghen2-6/+6
Fixed in Firefox 1.5.0.10 MFSA 2007-07 Embedded nulls in location.hostname confuse same-domain checks MFSA 2007-06 Mozilla Network Security Services (NSS) SSLv2 buffer overflow MFSA 2007-05 XSS and local file access by opening blocked popups MFSA 2007-04 Spoofing using custom cursor and CSS3 hotspot MFSA 2007-03 Information disclosure through cache collisions MFSA 2007-02 Improvements to help protect against Cross-Site Scripting attacks MFSA 2007-01 Crashes with evidence of memory corruption (rv:1.8.0.10/1.8.1.2) For more info, see http://www.mozilla.com/en-US/firefox/releases/1.5.0.10.html
2007-02-22Whitespace cleanup, courtesy of pkglint.wiz1-2/+2
Patch provided by Sergey Svishchev in private mail.
2006-12-20Update firefox, firefox-bin and firefox-gtk1 to 1.5.0.9. Fixed in this version:ghen2-6/+6
MFSA 2006-75 RSS Feed-preview referrer leak MFSA 2006-73 Mozilla SVG Processing Remote Code Execution MFSA 2006-72 XSS by setting img.src to javascript: URI MFSA 2006-71 LiveConnect crash finalizing JS objects MFSA 2006-70 Privilege escallation using watch point MFSA 2006-68 Crashes with evidence of memory corruption (rv:1.8.0.9/1.8.1.1) For more info, see http://www.mozilla.com/en-US/firefox/releases/1.5.0.9.html
2006-11-25seamonkey-bin/Makefile.common - allow override of MOZ_DIRjdolecek2-9/+4
update firefox-bin and firefox2-bin to override MOZ_DIR to point to the binary Linux distribution; kill their own MASTER_SITES now firefox-bin and firefox2-bin automaticaly pick up mirror changes in the master script
2006-11-08Update firefox, firefox-bin and firefox-gtk1 to 1.5.0.8. Fixed in this version:ghen2-6/+6
MFSA 2006-67 Running Script can be recompiled MFSA 2006-66 RSA signature forgery (variant) MFSA 2006-65 Crashes with evidence of memory corruption (rv:1.8.0.8) For more info, see http://www.mozilla.com/en-US/firefox/releases/1.5.0.8.html
2006-09-24Use Makefile.common from seamonkey-bin dir instead of mozilla-bin.salo1-2/+2
2006-09-15Update firefox-bin to 1.5.0.7 and seamonkey-bin to 1.0.5. Source packageghen2-6/+6
updates will follow later. Fixed in Firefox 1.5.0.7: MFSA 2006-64 Crashes with evidence of memory corruption (rv:1.8.0.7) MFSA 2006-62 Popup-blocker cross-site scripting (XSS) MFSA 2006-61 Frame spoofing using document.open() MFSA 2006-60 RSA Signature Forgery MFSA 2006-59 Concurrency-related vulnerability MFSA 2006-58 Auto-Update compromise through DNS and SSL spoofing MFSA 2006-57 JavaScript Regular Expression Heap Corruption Fixed in SeaMonkey 1.0.5: MFSA 2006-64 Crashes with evidence of memory corruption (rv:1.8.0.7) MFSA 2006-63 JavaScript execution in mail via XBL MFSA 2006-61 Frame spoofing using document.open() MFSA 2006-60 RSA Signature Forgery MFSA 2006-59 Concurrency-related vulnerability MFSA 2006-57 JavaScript Regular Expression Heap Corruption For more info, see http://www.mozilla.com/firefox/releases/1.5.0.7.html and http://www.mozilla.org/projects/seamonkey/releases/seamonkey1.0.5/
2006-08-03Update "firefox-bin" package to version 1.5.0.6. Changes since 1.5.0.5:tron3-9/+10
- Fixed an issue with playing Windows Media content
2006-07-27Update "firefox-bin" package to version 1.5.0.5. Changes since 1.5.0.4:tron2-6/+6
- Improvements to product stability - Several security fixes: MFSA 2006-56 chrome: scheme loading remote content MFSA 2006-55 Crashes with evidence of memory corruption (rv:1.8.0.5) MFSA 2006-54 XSS with XPCNativeWrapper(window).Function(...) MFSA 2006-53 UniversalBrowserRead privilege escalation MFSA 2006-52 PAC privilege escalation using Function.prototype.call MFSA 2006-51 Privilege escalation using named-functions and redefined "new Object()" MFSA 2006-50 JavaScript engine vulnerabilities MFSA 2006-48 JavaScript new Function race condition MFSA 2006-47 Native DOM methods can be hijacked across domains MFSA 2006-46 Memory corruption with simultaneous events MFSA 2006-45 Javascript navigator Object Vulnerability MFSA 2006-44 Code execution through deleted frame reference
2006-06-09firefox-bin requires libraries from suse_compat when using SUSE 10.0salo1-1/+4
2006-06-02Updated to version 1.5.0.4salo2-6/+6
Changes: Fixes for security issues: MFSA 2006-43 Privilege escalation using addSelectionListener MFSA 2006-42 Web site XSS using BOM on UTF-8 pages MFSA 2006-41 File stealing by changing input type (variant) MFSA 2006-39 "View Image" local resource linking (Windows) MFSA 2006-38 Buffer overflow in crypto.signText() MFSA 2006-37 Remote compromise via content-defined setter on object prototypes MFSA 2006-36 PLUGINSPAGE privileged JavaScript execution 2 MFSA 2006-35 Privilege escalation through XUL persist MFSA 2006-34 XSS viewing javascript: frames or images from context menu MFSA 2006-33 HTTP response smuggling MFSA 2006-32 Fixes for crashes with potential memory corruption MFSA 2006-31 EvalInSandbox escape (Proxy Autoconfig, Greasemonkey)
2006-05-03use http CZ mirrorjdolecek1-2/+2
2006-05-03add cz mirrorjdolecek1-2/+4
XXX why this has special MASTER_SITES setting? it should make use of XXX list in mozilla-bin/Makefile.common
2006-05-03Update "firefox-bin" package to version 1.5.0.3. Changes since 1.5.0.2:tron2-7/+6
- Security fix for denial of service vulnerability reported in Mozilla Foundation Security Advisory 2006-30
2006-04-14Update to 1.5.0.2:xtraeme2-7/+7
* Universal Binary support for Mac OS X which provides native support for Macintosh with Intel Core processors. Firefox supports the enhancements to performance introduced by the new MacIntel chipsets. * Improvements to product stability. * Several security fixes.
2006-03-10Accept suse100* packages too. Bump PKGREVISION.wiz1-2/+2
2006-02-05Recursive revision bump / recommended bump for gettext ABI change.joerg1-1/+2
2006-02-03Update to 1.5.0.1.xtraeme2-6/+6
* Improved stability. * Improved support for Mac OS X. * International Domain Name support for Iceland (.is) is now enabled. * Fixes for several memory leaks. * Several security enhancements.
2005-12-12Update to version 1.5salo2-8/+7
Changes: - Automated update to streamline product upgrades. Notification of an update is more prominent, and updates to Firefox may now be half a megabyte or smaller. Updating extensions has also improved. - Faster browser navigation with improvements to back and forward button performance. - Drag and drop reordering for browser tabs. - Improvements to popup blocking. - Clear Private Data feature provides an easy way to quickly remove personal data through a menu item or keyboard shortcut. - Answers.com is added to the search engine list. - Improvements to product usability including descriptive error pages, redesigned options menu, RSS discovery, and "Safe Mode" experience. - Better accessibility including support for DHTML accessibility and assistive technologies such as the Window-Eyes 5.5 beta screen reader for Microsoft Windows. Screen readers read aloud all available information in applications and documents or show the information on a Braille display, enabling blind and visually impaired users to use equivalent software functionality as their sighted peers. - Report a broken Web site wizard to report Web sites that are not working in Firefox. - Better support for Mac OS X (10.2 and greater) including profile migration from Safari and Mac Internet Explorer. - New support for Web Standards including SVG, CSS 2 and CSS 3, and JavaScript 1.6. - Many security enhancements. Full release notes: http://www.mozilla.com/firefox/releases/1.5.html XXX: Solaris packages available, need work.
2005-12-08Bumped the PKGREVISION of the packages that have been broken by the recentrillig1-1/+2
"pkglint --autofix" change.
2005-12-05Fixed pkglint warnings. The warnings are mostly quoting issues, forrillig1-2/+2
example MAKE_ENV+=FOO=${BAR} is changed to MAKE_ENV+=FOO=${BAR:Q}. Some other changes are outlined in http://mail-index.netbsd.org/tech-pkg/2005/12/02/0034.html
2005-09-21Update "firefox-bin" package to version 1.0.7. Changes since version 1.0.6:tron2-6/+6
- Fix for a potential buffer overflow vulnerability when loading a hostname with all soft-hyphens - Fix to prevent URLs passed from external programs from being parsed by the shell - Fix to prevent a crash when loading a Proxy Auto-Config (PAC) script that uses an "eval" statement - Fix to restore InstallTrigger.getVersion() for Extension authors - Other stability and security fixes
2005-07-21Update "firefox-bin" package to version 1.0.6. Changes since version 1.0.5:tron2-6/+6
- Restore API compatibility for extensions and web applications that did not work in Firefox 1.0.5.
2005-07-13Update "firefox-bin"package to version 1.0.5. Besides improved stabilitytron2-6/+6
this release fixes the following security issues: MFSA 2005-56 Code execution through shared function objects MFSA 2005-55 XHTML node spoofing MFSA 2005-54 Javascript prompt origin spoofing MFSA 2005-53 Standalone applications can run arbitrary code through the browser MFSA 2005-52 Same origin violation: frame calling top.focus() MFSA 2005-51 The return of frame-injection spoofing MFSA 2005-50 Possibly exploitable crash in InstallVersion.compareTo() MFSA 2005-49 Script injection from Firefox sidebar panel using data: MFSA 2005-48 Same-origin violation with InstallTrigger callback MFSA 2005-47 Code execution via "Set as Wallpaper" MFSA 2005-46 XBL scripts ran even when Javascript disabled MFSA 2005-45 Content-generated event vulnerabilities
2005-05-12Update "firefox-bin" package to version 1.0.4. The following securitytron2-6/+6
issuses were fixed in this release: MFSA 2005-44 Privilege escalation via non-DOM property overrides MFSA 2005-43 "Wrapped" javascript: urls bypass security checks MFSA 2005-42 Code execution via javascript: IconURL