pkgsrc/www/seamonkey/distinfo

116 lines
11 KiB
Text
Raw Normal View History

$NetBSD: distinfo,v 1.144 2017/02/04 06:35:24 ryoon Exp $
SHA1 (seamonkey-2.46.source.tar.xz) = 5322723a0c7757f29db5636fc60f4c9f3f6734c5
RMD160 (seamonkey-2.46.source.tar.xz) = ba09b9606457371c46524fdda3b73f3b37571f30
SHA512 (seamonkey-2.46.source.tar.xz) = b70a40ad6797c82458436ce8e15d461bec982916a3ad5949610f2830647872f3b54a63fb62b17780c33e74c067054b590d0a5ebd0e836854a10e60feee692491
Size (seamonkey-2.46.source.tar.xz) = 204913776 bytes
SHA1 (patch-ao) = dba7bba4035f4789258b31aebab11a57be4866f3
Update to 2.21 Changelog: SeaMonkey-specific changes Implemented an option to thread messages received by date. Allowed deletion of news posts by default. Implemented optional taskbar preview-per-tab. Added support (permission prompt) for desktop notifications. Added Isn't operator for searching by Priority. See the changes page for a more complete overview. Mozilla platform changes Support for new scrollbar style on Mac OS X 10.7 and newer. Accessibility related improvements on using pinned tabs (bug 577727). Major SVG rendering improvements around Image tiling and scaling (bug 600207). Removed support for sherlock files that are loaded from application or profile directory. Support for W3C touch events disabled (bug 888304). Fixed several stability issues. Fixed in SeaMonkey 2.21 MFSA 2013-92 GC hazard with default compartments and frame chain restoration MFSA 2013-91 User-defined properties on DOM proxies get the wrong "this" object MFSA 2013-90 Memory corruption involving scrolling MFSA 2013-89 Buffer overflow with multi-column, lists, and floats MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes MFSA 2013-85 Uninitialized data in IonMonkey MFSA 2013-83 Mozilla Updater does not lock MAR file after signature verification MFSA 2013-82 Calling scope for new Javascript objects can lead to memory corruption MFSA 2013-81 Use-after-free with select element MFSA 2013-80 NativeKey continues handling key messages after widget is destroyed MFSA 2013-79 Use-after-free in Animation Manager during stylesheet cloning MFSA 2013-78 Integer overflow in ANGLE library MFSA 2013-77 Improper state in HTML5 Tree Builder with templates MFSA 2013-76 Miscellaneous memory safety hazards (rv:24.0 / rv:17.0.9)
2013-09-28 16:37:05 +02:00
SHA1 (patch-bf) = cf7fef695c6db66a3653d3258a2385c6f1eb709e
SHA1 (patch-ldap_c-sdk_include_portable.h) = ce0b643fa031b74bf7d74eedc4f3729807aef799
SHA1 (patch-mail_app_Makefile.in) = da6ac87ffdcff733f11218cb11f8ef316bb1bc18
Update to 2.22 Changelog: SeaMonkey-specific changes Sorting messages by date can now be configured to look at the thread root instead of the newest message in it (pref: mailnews.sort_threads_by_root). Plugins doorhangers now allow to activate different plugin types independently. The proxy popup is now also available from the MailNews main window. A new Recipients column has been added that shows all recipients (To, CC, BCC). The default HTML5 audio/video player controls allow to change the playback rate now. A "Validate this page" entry has been added to Tools/Web Development. The Firefox devtools debugger can now be used to debug SeaMonkey remotely. See the changes page for a more complete overview. Mozilla platform changes Web Audio support has been added. CSS3 background-attachment:local support to control background scrolling has been implemented. Many new ES6 functions have been implemented. iframe document content can now be specified inline. Fixed several stability issues. Fixed in SeaMonkey 2.22 MFSA 2013-102 Use-after-free in HTML document templates MFSA 2013-101 Memory corruption in workers MFSA 2013-100 Miscellaneous use-after-free issues found through ASAN fuzzing MFSA 2013-98 Use-after-free when updating offline cache MFSA 2013-97 Writing to cycle collected object during image decoding MFSA 2013-96 Improperly initialized memory and overflows in some JavaScript functions MFSA 2013-95 Access violation with XSLT and uninitialized data MFSA 2013-94 Spoofing addressbar though SELECT element MFSA 2013-93 Miscellaneous memory safety hazards (rv:25.0 / rv:24.1 / rv:17.0.10)
2013-11-04 07:01:46 +01:00
SHA1 (patch-mailnews_base_search_src_nsMsgSearchTerm.cpp) = 0cbabcf5b188e86404e3ded8452c73a7f498efe3
SHA1 (patch-mozilla_browser_installer_package-manifest.in) = 0a880d70d61c04af258299f62f14c5a1338a76c9
Update to 2.26.1 Changelog: SeaMonkey-specific changes The delimiter for forwarded messages can now be configured. An option to not strip signatures on reply has been added to prevent top signatures from deleting the body. Add to Searchbar (search-engine autodiscovery) was implemented. The location bar tooltip now shows the complete current URL in case it is displayed only partially. See the changes page for a more complete overview. Mozilla platform changes The Gamepad API has been finalized and enabled (learn more). navigator.plugins is no longer enumerable, for user privacy. ECMAScript Internationalization API has been enabled. 'box-sizing' (dropping the -moz- prefix) has been implemented. SharedWorker is now enabled by default. CSS3 variables have been implemented. Console object is now available in Web Workers. Promises have been enabled by default. <input type="number"> has been implemented and enabled. <input type="color"> has been implemented and enabled. Fixed several stability issues. Fixed in SeaMonkey 2.26.1 MFSA 2014-54 Buffer overflow in Gamepad API MFSA 2014-53 Buffer overflow in Web Audio Speex resampler MFSA 2014-52 Use-after-free with SMIL Animation Controller MFSA 2014-51 Use-after-free in Event Listener Manager MFSA 2014-49 Use-after-free and out of bounds issues found using Address Sanitizer MFSA 2014-48 Miscellaneous memory safety hazards (rv:30.0 / rv:24.6) Fixed in SeaMonkey 2.26 MFSA 2014-47 Debugger can bypass XrayWrappers with JavaScript MFSA 2014-46 Use-after-free in nsHostResolve MFSA 2014-45 Incorrect IDNA domain name matching for wildcard certificates MFSA 2014-44 Use-after-free in imgLoader while resizing images MFSA 2014-43 Cross-site scripting (XSS) using history navigations MFSA 2014-42 Privilege escalation through Web Notification API MFSA 2014-41 Out-of-bounds write in Cairo MFSA 2014-39 Use-after-free in the Text Track Manager for HTML video MFSA 2014-38 Buffer overflow when using non-XBL object as XBL MFSA 2014-37 Out of bounds read while decoding JPG images MFSA 2014-36 Web Audio memory corruption issues MFSA 2014-34 Miscellaneous memory safety hazards (rv:29.0 / rv:24.5)
2014-06-22 10:54:39 +02:00
SHA1 (patch-mozilla_build_autoconf_compiler-opts.m4) = 1970fa246049adde4f2338ccd51f3651081bea56
SHA1 (patch-mozilla_build_gyp.mozbuild) = a80cbc009f031de527349da416dd9a914e731358
SHA1 (patch-mozilla_build_moz.configure_old.configure) = d7c7eef2a5846118829b7f1252fd1f0342ec5305
SHA1 (patch-mozilla_config_Makefile.in) = cfe5e6b6dc4ec1d070e492af3f75aa95580dca94
SHA1 (patch-mozilla_config_baseconfig.mk) = 49914353e167442440e04afd8e64b57ddf9399df
SHA1 (patch-mozilla_config_external_moz.build) = 4728434753f27bf391e85c1a2fb50d40d57853d2
SHA1 (patch-mozilla_config_stl__wrappers_ios) = 9200935d025d899a5810dc615345b9a7005369b2
SHA1 (patch-mozilla_config_stl__wrappers_ostream) = 232e253bca5d8f7f0de1b880dc34b613f8852ee7
SHA1 (patch-mozilla_config_system-headers) = 70e35a15eae5d8d97a4d4cd9886b2efe2882b828
SHA1 (patch-mozilla_config_system__wrappers_unwind.h) = aab35222a5f4c1cd5ed4ca85e54e6eb664dee89c
SHA1 (patch-mozilla_dom_media_moz.build) = de68e47c0e630dc25816ce4baa420896ee5b64e8
Update to 2.35 * Remove unused PLIST.enigmail. Changelog: System Requirements, Installation and Uninstallation Before installing, make sure your computer meets the system requirements. SeaMonkey 2.35 will no longer offer to migrate your data from SeaMonkey 1.x or Mozilla 1.x at the first start after installation (bug 689437). In order to upgrade from such an old version, install the last SeaMonkey 2.0 release first, do the one-time profile upgrade, uninstall SeaMonkey 2.0 and then install your target release (e.g. this one). You can find more details about installation, profile data and uninstallation in our install and uninstall document. Extensions (Add-ons) and Themes Extensions installed under SeaMonkey 1.x are not migrated to SeaMonkey 2, and may not be compatible for reinstalling in this version due to major changes in our architecture. Please report any issues to the maintainer of the extension. Extensions and Themes for SeaMonkey 2.35 can be installed from the SeaMonkey Add-Ons website or the "Get Add-Ons" section in the Add-ons Manager. Extensions with binary components such as Lightning, Enigmail and HTML Validator only work on certain platforms (e.g. Windows). Furthermore they need to be adjusted for each new SeaMonkey release, which also means that an old version of such an add-on can break SeaMonkey if you disabled compatibility checking (which e.g. happens when you install the Add-on Compatibility Reporter add-on). For Lightning, please check the Stable Releases section on the Calendar Versions page. Alternatively check the Lightning add-on page (Development Channel at the bottom of the page). For Enigmail, please refer to the Enigmail Nightly Builds page. For HTML Validator you need to check whether the Firefox version that appears on SeaMonkey's about: page is listed on the 0.9x download page. Note that only Windows is supported at this time. SeaMonkey 2.29 dropped support for the legacy JavaScript Debugger interface (JSD1). Hence add-ons that relied on it, like the JavaScript Debugger (Venkman) that came bundled with SeaMonkey, or Firebug 1.x, have stopped working. While Venkman has been discontinued, Firebug can simply be upgraded to a more recent version (2.x) which supports the new JSD2 interface. If you are searching for a Venkman replacement (especially for debugging SeaMonkey itself or add-ons), have a look at the Tiny JavaScript Debugger add-on. Known Issues This list covers some of the known problems with SeaMonkey 2.35. Please read this before reporting any new bugs. The SSL 3.0 encryption protocol is disabled by default due to security concerns (bug 1076983). Legacy websites may still rely on it and will not work with the newer TLS 1.x protocols. SSL 3.0 support can be re-enabled in Preferences under Privacy & Security, SSL. Lightning does not work with SeaMonkey when icaljs is enabled, which it is by default (bug 1081534). As a workaround, disable icaljs by setting the calendar.icaljs pref to false in about:config. The Remember Passwords add-on breaks password handling. Please disable or uninstall this add-on using the Add-ons Manager. You cannot set up a new Sync account or pair a device anymore (bug 998807). Workaround: Use an older version of SeaMonkey for such tasks for now. Data loss warning: If you use a profile with this or any later version and then try to go back to SeaMonkey 2.0, SeaMonkey will rename your history file to places.sqlite.corrupt and create a new places.sqlite file, effectively resetting your browsing history. This is because the internal format changed and the upgrade process only works in one direction. Additionally, running MailNews with local folders and POP3 mail filters may produce summary files that are not correctly read by previous versions of SeaMonkey. If you decide to go back to a previous version of SeaMonkey, you should delete the .msf files for your local folders and POP3 accounts or repair the folders using the folder properties dialog in order to avoid potential data loss. After creating a news account through clicking a news URL, the MailNews account wizard may be broken (the account type will always be News). To work around the problem, set the mail.server.serverX.valid pref (where X is the internal number of the corresponding news account) to true in about:config, or delete the invalid news account (bug 521861). Web pages may appear differently in the MailNews feed reader than in the browser (bug 662907). Workaround: Add a "noscript {display:none}" rule to your userContent.css (note that the Stylish add-on cannot be used here since it does not integrate with the MailNews feed reader). Select Element by Click doesn't flash the element in DOM Inspector on Windows if hardware acceleration is enabled (bug 594299). The option "When opening a bookmark group" / "Replace existing tabs" under Preferences / Tabbed Browsing does not have an effect anymore (bug 664101). Lightning keyboard shortcuts for accessing the calendar tab from within the MailNews window or from the main menu (Ctrl+Shift+C/D) do not work. (bug 514512). If you try to start SeaMonkey using a locked profile, it will crash (see bug 573369). Some synaptic touch pads are unable to vertical scroll (see bug 622410). Under certain conditions, scrolling and text input may be jerky (see bug 711900). Mac OS X and Windows: Citrix Receiver no longer works. As a workaround, mark the plugin as Always Enable in the Add-ons Manager (see bug 1025627). Windows: Norton/Symantec anti-virus scanners may report that some parts of SeaMonkey (e.g. the file freebl3.dll) are suspicious. If you downloaded SeaMonkey from one of the official download sites, this is a false alarm. You might experience problems with secure websites when this happens. To fix the issue, instruct your anti-virus software to ignore these files (and move them out of quarantine) and/or switch to another anti-virus software and reinstall SeaMonkey. Linux: The cursor may change to "drag & drop" mode in the mail window, causing a hang (bug 736811). Mac: When hardware acceleration is off, background colors in the UI (toolbar, status bar etc.) might not update correctly when you switch focus from/to a window. Users running Macs with certain older hardware (e.g. Intel GMA 950) will experience this even if they haven't turned off hardware acceleration in Preferences (Appearance/Content) (bug 626096). Troubleshooting Some questions are asked more frequently than others. Have a look at the SeaMonkey FAQ. Maybe your particular problem has already been solved. Some anti-virus software keeps detectine installer so that its contents can run and install SeaMonkey. That technology is widely used and probably can be used to compress bad as well as good software, but the 7-Zip code itself is perfectly safe. Mozilla scans all our files routinely when putticanned by the same mechanisms. Poorly designed or incompatible extensions can cause problems with SeaMonkey, including make it crash, slow down page display, etc. If you encounter strange problems relating to parts of SeaMonkey no longer working, the etc, you may be suffering from Extension or Theme trouble. Restart SeaMonkey in Safe Mode. On Windows, start using the "Safe Mode" shortcut created in your Start menu or by running seamonkey.exe -safe-mode. On Linux, start with ./seamonkey -safe-mode and on Mac OS X, run: cd /Applications/SeaMonkey.app/Contents/MacOS/ ./seamonkey-bin -safe-mode When started in Safe Mode all extensions are disabled and the Default theme is used. Disable the Extension/Theme that is causing trouble and then start normally. If you uninstall an extension that is installed with your user profile (i.e. you installed it from a Web page) and then wish to install it for all user profiles using the -install-global-extension command line flag, you must restart SeaMonkey once to cleanse the profile extensions datasource of traces of that extension before installing with the switch. If you do not do this you may end up with a jammed entry in the Extensions list and will be unable to install the extension globally. If you encounter strange problems relating to bookmarks, downloads, window placement, toolbars, history, or other settings, it is recommended that you try creating a new profile and attempting to reproduce the problem before filing bugs. Create a new profile by running SeaMonkey with the -P command line argument, choose the "Manage Profiles" button and then choose "Create Profile...". Migrate your settings files (Bookmarks, Saved Passwords, etc) over one by one, checking each time to see if the problems resurface. If you do find a particular profile data file is causing a problem, file a bug and attach the file.
2015-09-21 07:03:45 +02:00
SHA1 (patch-mozilla_dom_plugins_ipc_PluginModuleChild.cpp) = 005a611073f3a8b865d19e7204df9d40e5e1c3ff
Update to 2.20 * Merge SunOS patches from www/firefox. Changelog: SeaMonkey-specific changes The Content Security Policy (CSP) 1.0 parser has been enabled. The Mixed Content Blocker has been enabled, blocking insecure active content loads on HTTPS pages. New mail alert information can be customized now (Preferences/Mail & Newsgroups/Notifications). A confirmation prompt has been introduced to protect against accidental permanent data loss when force-deleting messages using Shift+Del. MailNews Save As Template supports multiple selections now. The size on disk is now shown for newsgroup folders. See the changes page for a more complete overview. Mozilla platform changes Added support for scrollbar style in Mac OS X 10.7 and newer. Enabled mixed content blocking to protects users from man-in-the-middle attacks and eavesdroppers on HTTPS pages (learn more). Improved about:memory's functional UI. Enabled DXVA2 on Windows Vista+ to accelerate H.264 video decoding. Simplified interface for notifications of plugin installation. Enabled users to switch the search provider across the entire browser. CSP policies using the standard syntax and semantics will now be enforced. Implemented the HTML5 <input type="range"> form control. Added unprefixed requestAnimationFrame. Dropped blink effect from CSS rule text-decoration:blink and completely removed <blink> element. Fixed several stability issues. Fixed in SeaMonkey 2.20 MFSA 2013-75 Local Java applets may read contents of local file system MFSA 2013-74 Firefox full and stub installer DLL hijacking MFSA 2013-73 Same-origin bypass with web workers and XMLHttpRequest MFSA 2013-72 Wrong principal used for validating URI for some Javascript components MFSA 2013-71 Further Privilege escalation through Mozilla Updater MFSA 2013-70 Bypass of XrayWrappers using XBL Scopes MFSA 2013-69 CRMF requests allow for code execution and XSS attacks MFSA 2013-68 Document URI misrepresentation and masquerading MFSA 2013-67 Crash during WAV audio file decoding MFSA 2013-66 Buffer overflow in Mozilla Maintenance Service and Mozilla Updater MFSA 2013-65 Buffer underflow when generating CRMF requests MFSA 2013-64 Use after free mutating DOM during SetBody MFSA 2013-63 Miscellaneous memory safety hazards (rv:23.0 / rv:17.0.8)
2013-08-11 05:18:46 +02:00
SHA1 (patch-mozilla_dom_plugins_ipc_PluginModuleChild.h) = 14038ce0ee2b38db6c7952056a97a65839a2c1a9
SHA1 (patch-mozilla_extensions_spellcheck_hunspell_glue_mozHunspell.cpp) = 5c7d5429bd9a84fd2fffa86c3bd1d34d67f66681
SHA1 (patch-mozilla_gfx_cairo_libpixman_src_pixman-arm-neon-asm.S) = 818a1b1cb48bc04e91581709065948cef362aebe
SHA1 (patch-mozilla_gfx_gl_GLContextProviderGLX.cpp) = d4d0cdf25ae15f7cc07d1ad213ec7d2b015e4168
Update to 2.20 * Merge SunOS patches from www/firefox. Changelog: SeaMonkey-specific changes The Content Security Policy (CSP) 1.0 parser has been enabled. The Mixed Content Blocker has been enabled, blocking insecure active content loads on HTTPS pages. New mail alert information can be customized now (Preferences/Mail & Newsgroups/Notifications). A confirmation prompt has been introduced to protect against accidental permanent data loss when force-deleting messages using Shift+Del. MailNews Save As Template supports multiple selections now. The size on disk is now shown for newsgroup folders. See the changes page for a more complete overview. Mozilla platform changes Added support for scrollbar style in Mac OS X 10.7 and newer. Enabled mixed content blocking to protects users from man-in-the-middle attacks and eavesdroppers on HTTPS pages (learn more). Improved about:memory's functional UI. Enabled DXVA2 on Windows Vista+ to accelerate H.264 video decoding. Simplified interface for notifications of plugin installation. Enabled users to switch the search provider across the entire browser. CSP policies using the standard syntax and semantics will now be enforced. Implemented the HTML5 <input type="range"> form control. Added unprefixed requestAnimationFrame. Dropped blink effect from CSS rule text-decoration:blink and completely removed <blink> element. Fixed several stability issues. Fixed in SeaMonkey 2.20 MFSA 2013-75 Local Java applets may read contents of local file system MFSA 2013-74 Firefox full and stub installer DLL hijacking MFSA 2013-73 Same-origin bypass with web workers and XMLHttpRequest MFSA 2013-72 Wrong principal used for validating URI for some Javascript components MFSA 2013-71 Further Privilege escalation through Mozilla Updater MFSA 2013-70 Bypass of XrayWrappers using XBL Scopes MFSA 2013-69 CRMF requests allow for code execution and XSS attacks MFSA 2013-68 Document URI misrepresentation and masquerading MFSA 2013-67 Crash during WAV audio file decoding MFSA 2013-66 Buffer overflow in Mozilla Maintenance Service and Mozilla Updater MFSA 2013-65 Buffer underflow when generating CRMF requests MFSA 2013-64 Use after free mutating DOM during SetBody MFSA 2013-63 Miscellaneous memory safety hazards (rv:23.0 / rv:17.0.8)
2013-08-11 05:18:46 +02:00
SHA1 (patch-mozilla_gfx_graphite2_src_Bidi.cpp) = fb97becdfeeea742e8c0bc51e10efc124a2a11f3
SHA1 (patch-mozilla_gfx_skia_skia_src_core_SkUtilsArm.cpp) = e5e7dfa9a7ffd3f6d240cb55038ffcc8766c69ad
SHA1 (patch-mozilla_gfx_ycbcr_moz.build) = 263c37980558d485e868a7097689cdf35c5f678d
SHA1 (patch-mozilla_gfx_ycbcr_yuv__row__arm.S) = 0d31694879da5805b5472798460e2830481effc4
SHA1 (patch-mozilla_image_decoders_nsJPEGDecoder.cpp) = f851a7d2de98285a9fca433481208e46db50eae0
SHA1 (patch-mozilla_intl_hyphenation_glue_hnjalloc.h) = 773997168c0b25003f2b326c7c109e8cd454cded
SHA1 (patch-mozilla_ipc_chromium_src_base_atomicops.h) = e7ef5b1f94f7121846cab97cddabfbfd207b730e
SHA1 (patch-mozilla_ipc_chromium_src_base_message__pump__libevent.cc) = 739ea63bf6c5e190cf6b08de34535e2335bffe57
Update to 2.21 Changelog: SeaMonkey-specific changes Implemented an option to thread messages received by date. Allowed deletion of news posts by default. Implemented optional taskbar preview-per-tab. Added support (permission prompt) for desktop notifications. Added Isn't operator for searching by Priority. See the changes page for a more complete overview. Mozilla platform changes Support for new scrollbar style on Mac OS X 10.7 and newer. Accessibility related improvements on using pinned tabs (bug 577727). Major SVG rendering improvements around Image tiling and scaling (bug 600207). Removed support for sherlock files that are loaded from application or profile directory. Support for W3C touch events disabled (bug 888304). Fixed several stability issues. Fixed in SeaMonkey 2.21 MFSA 2013-92 GC hazard with default compartments and frame chain restoration MFSA 2013-91 User-defined properties on DOM proxies get the wrong "this" object MFSA 2013-90 Memory corruption involving scrolling MFSA 2013-89 Buffer overflow with multi-column, lists, and floats MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes MFSA 2013-85 Uninitialized data in IonMonkey MFSA 2013-83 Mozilla Updater does not lock MAR file after signature verification MFSA 2013-82 Calling scope for new Javascript objects can lead to memory corruption MFSA 2013-81 Use-after-free with select element MFSA 2013-80 NativeKey continues handling key messages after widget is destroyed MFSA 2013-79 Use-after-free in Animation Manager during stylesheet cloning MFSA 2013-78 Integer overflow in ANGLE library MFSA 2013-77 Improper state in HTML5 Tree Builder with templates MFSA 2013-76 Miscellaneous memory safety hazards (rv:24.0 / rv:17.0.9)
2013-09-28 16:37:05 +02:00
SHA1 (patch-mozilla_ipc_chromium_src_base_platform__thread.h) = 487468d70d9644e6b09c548ab607310ff54add84
SHA1 (patch-mozilla_ipc_chromium_src_base_platform__thread__posix.cc) = 422313eeea2dd32106c1a4d3567d8d488dfdf74b
SHA1 (patch-mozilla_ipc_chromium_src_base_process__util.h) = 738e1306fbadebd20b514b4be4705a232f567c69
SHA1 (patch-mozilla_ipc_chromium_src_base_process__util__bsd.cc) = 47c3782a207d4e743cd903acf3d0e3242243b4ac
Update to 2.20 * Merge SunOS patches from www/firefox. Changelog: SeaMonkey-specific changes The Content Security Policy (CSP) 1.0 parser has been enabled. The Mixed Content Blocker has been enabled, blocking insecure active content loads on HTTPS pages. New mail alert information can be customized now (Preferences/Mail & Newsgroups/Notifications). A confirmation prompt has been introduced to protect against accidental permanent data loss when force-deleting messages using Shift+Del. MailNews Save As Template supports multiple selections now. The size on disk is now shown for newsgroup folders. See the changes page for a more complete overview. Mozilla platform changes Added support for scrollbar style in Mac OS X 10.7 and newer. Enabled mixed content blocking to protects users from man-in-the-middle attacks and eavesdroppers on HTTPS pages (learn more). Improved about:memory's functional UI. Enabled DXVA2 on Windows Vista+ to accelerate H.264 video decoding. Simplified interface for notifications of plugin installation. Enabled users to switch the search provider across the entire browser. CSP policies using the standard syntax and semantics will now be enforced. Implemented the HTML5 <input type="range"> form control. Added unprefixed requestAnimationFrame. Dropped blink effect from CSS rule text-decoration:blink and completely removed <blink> element. Fixed several stability issues. Fixed in SeaMonkey 2.20 MFSA 2013-75 Local Java applets may read contents of local file system MFSA 2013-74 Firefox full and stub installer DLL hijacking MFSA 2013-73 Same-origin bypass with web workers and XMLHttpRequest MFSA 2013-72 Wrong principal used for validating URI for some Javascript components MFSA 2013-71 Further Privilege escalation through Mozilla Updater MFSA 2013-70 Bypass of XrayWrappers using XBL Scopes MFSA 2013-69 CRMF requests allow for code execution and XSS attacks MFSA 2013-68 Document URI misrepresentation and masquerading MFSA 2013-67 Crash during WAV audio file decoding MFSA 2013-66 Buffer overflow in Mozilla Maintenance Service and Mozilla Updater MFSA 2013-65 Buffer underflow when generating CRMF requests MFSA 2013-64 Use after free mutating DOM during SetBody MFSA 2013-63 Miscellaneous memory safety hazards (rv:23.0 / rv:17.0.8)
2013-08-11 05:18:46 +02:00
SHA1 (patch-mozilla_ipc_chromium_src_base_process__util__posix.cc) = d67e126dfb26e2394a9c21aab5e3b6cc3ab238f1
SHA1 (patch-mozilla_ipc_chromium_src_base_sys__info__posix.cc) = ad8d2843316ec1dd0b1309afe4f3eaaa711db6df
Update to 2.20 * Merge SunOS patches from www/firefox. Changelog: SeaMonkey-specific changes The Content Security Policy (CSP) 1.0 parser has been enabled. The Mixed Content Blocker has been enabled, blocking insecure active content loads on HTTPS pages. New mail alert information can be customized now (Preferences/Mail & Newsgroups/Notifications). A confirmation prompt has been introduced to protect against accidental permanent data loss when force-deleting messages using Shift+Del. MailNews Save As Template supports multiple selections now. The size on disk is now shown for newsgroup folders. See the changes page for a more complete overview. Mozilla platform changes Added support for scrollbar style in Mac OS X 10.7 and newer. Enabled mixed content blocking to protects users from man-in-the-middle attacks and eavesdroppers on HTTPS pages (learn more). Improved about:memory's functional UI. Enabled DXVA2 on Windows Vista+ to accelerate H.264 video decoding. Simplified interface for notifications of plugin installation. Enabled users to switch the search provider across the entire browser. CSP policies using the standard syntax and semantics will now be enforced. Implemented the HTML5 <input type="range"> form control. Added unprefixed requestAnimationFrame. Dropped blink effect from CSS rule text-decoration:blink and completely removed <blink> element. Fixed several stability issues. Fixed in SeaMonkey 2.20 MFSA 2013-75 Local Java applets may read contents of local file system MFSA 2013-74 Firefox full and stub installer DLL hijacking MFSA 2013-73 Same-origin bypass with web workers and XMLHttpRequest MFSA 2013-72 Wrong principal used for validating URI for some Javascript components MFSA 2013-71 Further Privilege escalation through Mozilla Updater MFSA 2013-70 Bypass of XrayWrappers using XBL Scopes MFSA 2013-69 CRMF requests allow for code execution and XSS attacks MFSA 2013-68 Document URI misrepresentation and masquerading MFSA 2013-67 Crash during WAV audio file decoding MFSA 2013-66 Buffer overflow in Mozilla Maintenance Service and Mozilla Updater MFSA 2013-65 Buffer underflow when generating CRMF requests MFSA 2013-64 Use after free mutating DOM during SetBody MFSA 2013-63 Miscellaneous memory safety hazards (rv:23.0 / rv:17.0.8)
2013-08-11 05:18:46 +02:00
SHA1 (patch-mozilla_ipc_chromium_src_base_time__posix.cc) = 2662bf55bf5276d06c4754cdce125a0bfbac17a0
SHA1 (patch-mozilla_ipc_chromium_src_build_build__config.h) = 86e88aa90bd4d573fd59d47f5a3e45c5c52c7e45
SHA1 (patch-mozilla_ipc_chromium_src_chrome_common_transport__dib.h) = 53c37dedaf5f0b302627be5dddebcb39decfa5e3
SHA1 (patch-mozilla_ipc_glue_GeckoChildProcessHost.cpp) = 7a52fef553345a46171aeb3c93db30e6b3998c2c
SHA1 (patch-mozilla_js_src_jit_LIR.cpp) = ec55fc3209b0916e53ec33756abd10f6a12db146
SHA1 (patch-mozilla_js_src_jit_MIR.cpp) = 8b160b0326eb7f2a4f3b7cd958eeb90816278b1e
SHA1 (patch-mozilla_js_src_jit_arm_Architecture-arm.cpp) = a89952ad695647cf3938f7d98c0eab637ed05a91
SHA1 (patch-mozilla_js_src_jit_none_AtomicOperations-sparc.h) = af2a610f8974ecc6fa9a55aa552a20ae4c7043fa
SHA1 (patch-mozilla_js_src_jsdate.cpp) = 03a2f5492c2878c54e6dfecb46d81d49260b3602
SHA1 (patch-mozilla_js_src_jskwgen.cpp) = efcb5898c6ddcd012bf37ff04dcbb223e753ee94
SHA1 (patch-mozilla_js_src_old-configure.in) = a98f5c7c59c334ef753a9855abd49cf4d1968b84
Update to 2.26.1 Changelog: SeaMonkey-specific changes The delimiter for forwarded messages can now be configured. An option to not strip signatures on reply has been added to prevent top signatures from deleting the body. Add to Searchbar (search-engine autodiscovery) was implemented. The location bar tooltip now shows the complete current URL in case it is displayed only partially. See the changes page for a more complete overview. Mozilla platform changes The Gamepad API has been finalized and enabled (learn more). navigator.plugins is no longer enumerable, for user privacy. ECMAScript Internationalization API has been enabled. 'box-sizing' (dropping the -moz- prefix) has been implemented. SharedWorker is now enabled by default. CSS3 variables have been implemented. Console object is now available in Web Workers. Promises have been enabled by default. <input type="number"> has been implemented and enabled. <input type="color"> has been implemented and enabled. Fixed several stability issues. Fixed in SeaMonkey 2.26.1 MFSA 2014-54 Buffer overflow in Gamepad API MFSA 2014-53 Buffer overflow in Web Audio Speex resampler MFSA 2014-52 Use-after-free with SMIL Animation Controller MFSA 2014-51 Use-after-free in Event Listener Manager MFSA 2014-49 Use-after-free and out of bounds issues found using Address Sanitizer MFSA 2014-48 Miscellaneous memory safety hazards (rv:30.0 / rv:24.6) Fixed in SeaMonkey 2.26 MFSA 2014-47 Debugger can bypass XrayWrappers with JavaScript MFSA 2014-46 Use-after-free in nsHostResolve MFSA 2014-45 Incorrect IDNA domain name matching for wildcard certificates MFSA 2014-44 Use-after-free in imgLoader while resizing images MFSA 2014-43 Cross-site scripting (XSS) using history navigations MFSA 2014-42 Privilege escalation through Web Notification API MFSA 2014-41 Out-of-bounds write in Cairo MFSA 2014-39 Use-after-free in the Text Track Manager for HTML video MFSA 2014-38 Buffer overflow when using non-XBL object as XBL MFSA 2014-37 Out of bounds read while decoding JPG images MFSA 2014-36 Web Audio memory corruption issues MFSA 2014-34 Miscellaneous memory safety hazards (rv:29.0 / rv:24.5)
2014-06-22 10:54:39 +02:00
SHA1 (patch-mozilla_js_src_vm_SPSProfiler.cpp) = f609c8f2feac9aa6d5a6f37bf4ac0270bde7e8a4
Update to 2.35 * Remove unused PLIST.enigmail. Changelog: System Requirements, Installation and Uninstallation Before installing, make sure your computer meets the system requirements. SeaMonkey 2.35 will no longer offer to migrate your data from SeaMonkey 1.x or Mozilla 1.x at the first start after installation (bug 689437). In order to upgrade from such an old version, install the last SeaMonkey 2.0 release first, do the one-time profile upgrade, uninstall SeaMonkey 2.0 and then install your target release (e.g. this one). You can find more details about installation, profile data and uninstallation in our install and uninstall document. Extensions (Add-ons) and Themes Extensions installed under SeaMonkey 1.x are not migrated to SeaMonkey 2, and may not be compatible for reinstalling in this version due to major changes in our architecture. Please report any issues to the maintainer of the extension. Extensions and Themes for SeaMonkey 2.35 can be installed from the SeaMonkey Add-Ons website or the "Get Add-Ons" section in the Add-ons Manager. Extensions with binary components such as Lightning, Enigmail and HTML Validator only work on certain platforms (e.g. Windows). Furthermore they need to be adjusted for each new SeaMonkey release, which also means that an old version of such an add-on can break SeaMonkey if you disabled compatibility checking (which e.g. happens when you install the Add-on Compatibility Reporter add-on). For Lightning, please check the Stable Releases section on the Calendar Versions page. Alternatively check the Lightning add-on page (Development Channel at the bottom of the page). For Enigmail, please refer to the Enigmail Nightly Builds page. For HTML Validator you need to check whether the Firefox version that appears on SeaMonkey's about: page is listed on the 0.9x download page. Note that only Windows is supported at this time. SeaMonkey 2.29 dropped support for the legacy JavaScript Debugger interface (JSD1). Hence add-ons that relied on it, like the JavaScript Debugger (Venkman) that came bundled with SeaMonkey, or Firebug 1.x, have stopped working. While Venkman has been discontinued, Firebug can simply be upgraded to a more recent version (2.x) which supports the new JSD2 interface. If you are searching for a Venkman replacement (especially for debugging SeaMonkey itself or add-ons), have a look at the Tiny JavaScript Debugger add-on. Known Issues This list covers some of the known problems with SeaMonkey 2.35. Please read this before reporting any new bugs. The SSL 3.0 encryption protocol is disabled by default due to security concerns (bug 1076983). Legacy websites may still rely on it and will not work with the newer TLS 1.x protocols. SSL 3.0 support can be re-enabled in Preferences under Privacy & Security, SSL. Lightning does not work with SeaMonkey when icaljs is enabled, which it is by default (bug 1081534). As a workaround, disable icaljs by setting the calendar.icaljs pref to false in about:config. The Remember Passwords add-on breaks password handling. Please disable or uninstall this add-on using the Add-ons Manager. You cannot set up a new Sync account or pair a device anymore (bug 998807). Workaround: Use an older version of SeaMonkey for such tasks for now. Data loss warning: If you use a profile with this or any later version and then try to go back to SeaMonkey 2.0, SeaMonkey will rename your history file to places.sqlite.corrupt and create a new places.sqlite file, effectively resetting your browsing history. This is because the internal format changed and the upgrade process only works in one direction. Additionally, running MailNews with local folders and POP3 mail filters may produce summary files that are not correctly read by previous versions of SeaMonkey. If you decide to go back to a previous version of SeaMonkey, you should delete the .msf files for your local folders and POP3 accounts or repair the folders using the folder properties dialog in order to avoid potential data loss. After creating a news account through clicking a news URL, the MailNews account wizard may be broken (the account type will always be News). To work around the problem, set the mail.server.serverX.valid pref (where X is the internal number of the corresponding news account) to true in about:config, or delete the invalid news account (bug 521861). Web pages may appear differently in the MailNews feed reader than in the browser (bug 662907). Workaround: Add a "noscript {display:none}" rule to your userContent.css (note that the Stylish add-on cannot be used here since it does not integrate with the MailNews feed reader). Select Element by Click doesn't flash the element in DOM Inspector on Windows if hardware acceleration is enabled (bug 594299). The option "When opening a bookmark group" / "Replace existing tabs" under Preferences / Tabbed Browsing does not have an effect anymore (bug 664101). Lightning keyboard shortcuts for accessing the calendar tab from within the MailNews window or from the main menu (Ctrl+Shift+C/D) do not work. (bug 514512). If you try to start SeaMonkey using a locked profile, it will crash (see bug 573369). Some synaptic touch pads are unable to vertical scroll (see bug 622410). Under certain conditions, scrolling and text input may be jerky (see bug 711900). Mac OS X and Windows: Citrix Receiver no longer works. As a workaround, mark the plugin as Always Enable in the Add-ons Manager (see bug 1025627). Windows: Norton/Symantec anti-virus scanners may report that some parts of SeaMonkey (e.g. the file freebl3.dll) are suspicious. If you downloaded SeaMonkey from one of the official download sites, this is a false alarm. You might experience problems with secure websites when this happens. To fix the issue, instruct your anti-virus software to ignore these files (and move them out of quarantine) and/or switch to another anti-virus software and reinstall SeaMonkey. Linux: The cursor may change to "drag & drop" mode in the mail window, causing a hang (bug 736811). Mac: When hardware acceleration is off, background colors in the UI (toolbar, status bar etc.) might not update correctly when you switch focus from/to a window. Users running Macs with certain older hardware (e.g. Intel GMA 950) will experience this even if they haven't turned off hardware acceleration in Preferences (Appearance/Content) (bug 626096). Troubleshooting Some questions are asked more frequently than others. Have a look at the SeaMonkey FAQ. Maybe your particular problem has already been solved. Some anti-virus software keeps detectine installer so that its contents can run and install SeaMonkey. That technology is widely used and probably can be used to compress bad as well as good software, but the 7-Zip code itself is perfectly safe. Mozilla scans all our files routinely when putticanned by the same mechanisms. Poorly designed or incompatible extensions can cause problems with SeaMonkey, including make it crash, slow down page display, etc. If you encounter strange problems relating to parts of SeaMonkey no longer working, the etc, you may be suffering from Extension or Theme trouble. Restart SeaMonkey in Safe Mode. On Windows, start using the "Safe Mode" shortcut created in your Start menu or by running seamonkey.exe -safe-mode. On Linux, start with ./seamonkey -safe-mode and on Mac OS X, run: cd /Applications/SeaMonkey.app/Contents/MacOS/ ./seamonkey-bin -safe-mode When started in Safe Mode all extensions are disabled and the Default theme is used. Disable the Extension/Theme that is causing trouble and then start normally. If you uninstall an extension that is installed with your user profile (i.e. you installed it from a Web page) and then wish to install it for all user profiles using the -install-global-extension command line flag, you must restart SeaMonkey once to cleanse the profile extensions datasource of traces of that extension before installing with the switch. If you do not do this you may end up with a jammed entry in the Extensions list and will be unable to install the extension globally. If you encounter strange problems relating to bookmarks, downloads, window placement, toolbars, history, or other settings, it is recommended that you try creating a new profile and attempting to reproduce the problem before filing bugs. Create a new profile by running SeaMonkey with the -P command line argument, choose the "Manage Profiles" button and then choose "Create Profile...". Migrate your settings files (Bookmarks, Saved Passwords, etc) over one by one, checking each time to see if the problems resurface. If you do find a particular profile data file is causing a problem, file a bug and attach the file.
2015-09-21 07:03:45 +02:00
SHA1 (patch-mozilla_js_xpconnect_src_XPCConvert.cpp) = d866b89d5d741125430c0e3ac900c7ead401a495
SHA1 (patch-mozilla_js_xpconnect_src_xpcprivate.h) = 56e9de48605f2310fdc2777b4fcab8ce2de50d0a
SHA1 (patch-mozilla_media_libcubeb_src_cubeb.c) = fa96f94f3a694e6c6c039e57ab328ac6e2394eec
SHA1 (patch-mozilla_media_libcubeb_src_cubeb__alsa.c) = 8b2057417bf3b95c371c7e3be435e8a654800d9f
SHA1 (patch-mozilla_media_libcubeb_src_cubeb__oss.c) = f6f46933ebf82d756b8df464035c790aaea41f66
SHA1 (patch-mozilla_media_libcubeb_src_moz.build) = c4ff272f2ba91221e19b7d88df670c92ab4cd23a
Update to 2.26.1 Changelog: SeaMonkey-specific changes The delimiter for forwarded messages can now be configured. An option to not strip signatures on reply has been added to prevent top signatures from deleting the body. Add to Searchbar (search-engine autodiscovery) was implemented. The location bar tooltip now shows the complete current URL in case it is displayed only partially. See the changes page for a more complete overview. Mozilla platform changes The Gamepad API has been finalized and enabled (learn more). navigator.plugins is no longer enumerable, for user privacy. ECMAScript Internationalization API has been enabled. 'box-sizing' (dropping the -moz- prefix) has been implemented. SharedWorker is now enabled by default. CSS3 variables have been implemented. Console object is now available in Web Workers. Promises have been enabled by default. <input type="number"> has been implemented and enabled. <input type="color"> has been implemented and enabled. Fixed several stability issues. Fixed in SeaMonkey 2.26.1 MFSA 2014-54 Buffer overflow in Gamepad API MFSA 2014-53 Buffer overflow in Web Audio Speex resampler MFSA 2014-52 Use-after-free with SMIL Animation Controller MFSA 2014-51 Use-after-free in Event Listener Manager MFSA 2014-49 Use-after-free and out of bounds issues found using Address Sanitizer MFSA 2014-48 Miscellaneous memory safety hazards (rv:30.0 / rv:24.6) Fixed in SeaMonkey 2.26 MFSA 2014-47 Debugger can bypass XrayWrappers with JavaScript MFSA 2014-46 Use-after-free in nsHostResolve MFSA 2014-45 Incorrect IDNA domain name matching for wildcard certificates MFSA 2014-44 Use-after-free in imgLoader while resizing images MFSA 2014-43 Cross-site scripting (XSS) using history navigations MFSA 2014-42 Privilege escalation through Web Notification API MFSA 2014-41 Out-of-bounds write in Cairo MFSA 2014-39 Use-after-free in the Text Track Manager for HTML video MFSA 2014-38 Buffer overflow when using non-XBL object as XBL MFSA 2014-37 Out of bounds read while decoding JPG images MFSA 2014-36 Web Audio memory corruption issues MFSA 2014-34 Miscellaneous memory safety hazards (rv:29.0 / rv:24.5)
2014-06-22 10:54:39 +02:00
SHA1 (patch-mozilla_media_libsoundtouch_src_cpu__detect__x86.cpp) = 1029bc985d6eadf3f030492a8aa51d008fa27740
SHA1 (patch-mozilla_media_libstagefright_frameworks_av_include_media_stagefright_foundation_AString.h) = 854b76ecdee119899e2684bdc5a3c439fc63deac
SHA1 (patch-mozilla_media_libstagefright_frameworks_av_media_libstagefright_foundation_AString.cpp) = b2c5e3e0c90c0c103448d39b1fbd155354d2a25d
SHA1 (patch-mozilla_media_libstagefright_system_core_liblog_fake__log__device.c) = 9c88ea6472cb86e958dfc883f06be7bdfbc3c46c
SHA1 (patch-mozilla_media_libstagefright_system_core_liblog_logprint.c) = c1af77a08ec9c651fa0d83eed4c4347dcb5dd56b
SHA1 (patch-mozilla_media_libtheora_lib_arm_armcpu.c) = 544bbb808bbecb24b519a96358c956dcacdfd5be
SHA1 (patch-mozilla_media_libtheora_lib_info.c) = f533e75730d5afa51b4ebd04c54bff02b70b03b0
SHA1 (patch-mozilla_media_libtheora_moz.build) = f6e6e0dab92ffd98f7d64a7ef893104fb3e59a32
SHA1 (patch-mozilla_media_libtremor_Makefile.in) = 3f0d2eabc749f71d6d6bd21ec6054cc2af0baa36
SHA1 (patch-mozilla_media_libtremor_moz.build) = ef54f4c6361595f5149057061aaba00974d7b42a
SHA1 (patch-mozilla_media_libvorbis_Makefile.in) = 3829b827eec2e0513c3b07a7d89ec6c5aaa39e24
SHA1 (patch-mozilla_media_libvorbis_lib_vorbis__info.c) = 8e622c5e54c504fca1f420160a694f749e2a0766
SHA1 (patch-mozilla_media_libvorbis_moz.build) = bcee4098749341900dd9c039218967e296005b7f
SHA1 (patch-mozilla_media_libyuv_include_libyuv_scale__row.h) = c61f35af1a6cf9f71041c8871cff3a0b22e6593b
SHA1 (patch-mozilla_media_mtransport_third__party_nrappkit_src_port_generic_include_sys_queue.h) = 9e3198f44e9689d98b538efd62c9bfb66a10277e
SHA1 (patch-mozilla_media_openmax__dl_dl_api_armCOMM__s.h) = bc6d27e0dbf5c03742c76db7fc793f7dd715913f
SHA1 (patch-mozilla_memory_build_mozjemalloc__compat.c) = ec7f31b833ccd283bc07c4e93f15fb3c46c3eb96
SHA1 (patch-mozilla_memory_mozalloc_mozalloc__abort.cpp) = fea12a1511a0d59b862cc5a5435506504f0b7fc6
SHA1 (patch-mozilla_mfbt_Attributes.h) = d868f1810f88e5e058efbd074217bcad663cfe9b
SHA1 (patch-mozilla_mfbt_Poison.cpp) = 8a45775687244c6d1d6e422dbaa2364862fb33b7
Update to 2.20 * Merge SunOS patches from www/firefox. Changelog: SeaMonkey-specific changes The Content Security Policy (CSP) 1.0 parser has been enabled. The Mixed Content Blocker has been enabled, blocking insecure active content loads on HTTPS pages. New mail alert information can be customized now (Preferences/Mail & Newsgroups/Notifications). A confirmation prompt has been introduced to protect against accidental permanent data loss when force-deleting messages using Shift+Del. MailNews Save As Template supports multiple selections now. The size on disk is now shown for newsgroup folders. See the changes page for a more complete overview. Mozilla platform changes Added support for scrollbar style in Mac OS X 10.7 and newer. Enabled mixed content blocking to protects users from man-in-the-middle attacks and eavesdroppers on HTTPS pages (learn more). Improved about:memory's functional UI. Enabled DXVA2 on Windows Vista+ to accelerate H.264 video decoding. Simplified interface for notifications of plugin installation. Enabled users to switch the search provider across the entire browser. CSP policies using the standard syntax and semantics will now be enforced. Implemented the HTML5 <input type="range"> form control. Added unprefixed requestAnimationFrame. Dropped blink effect from CSS rule text-decoration:blink and completely removed <blink> element. Fixed several stability issues. Fixed in SeaMonkey 2.20 MFSA 2013-75 Local Java applets may read contents of local file system MFSA 2013-74 Firefox full and stub installer DLL hijacking MFSA 2013-73 Same-origin bypass with web workers and XMLHttpRequest MFSA 2013-72 Wrong principal used for validating URI for some Javascript components MFSA 2013-71 Further Privilege escalation through Mozilla Updater MFSA 2013-70 Bypass of XrayWrappers using XBL Scopes MFSA 2013-69 CRMF requests allow for code execution and XSS attacks MFSA 2013-68 Document URI misrepresentation and masquerading MFSA 2013-67 Crash during WAV audio file decoding MFSA 2013-66 Buffer overflow in Mozilla Maintenance Service and Mozilla Updater MFSA 2013-65 Buffer underflow when generating CRMF requests MFSA 2013-64 Use after free mutating DOM during SetBody MFSA 2013-63 Miscellaneous memory safety hazards (rv:23.0 / rv:17.0.8)
2013-08-11 05:18:46 +02:00
SHA1 (patch-mozilla_modules_libjar_nsZipArchive.cpp) = a399e0bd0e83c47938bbee077eaa79fc52386241
SHA1 (patch-mozilla_modules_libpref_init_all.js) = f366d7acf841117bf8c896d355f04e9549ebf17f
SHA1 (patch-mozilla_mozglue_build_arm.cpp) = 592ae5ce1a404227cc2ab6a06418cc813c5743c9
SHA1 (patch-mozilla_mozglue_build_arm.h) = 94e2b1a1a9ebf20bfa8a542066aa0dad475db320
SHA1 (patch-mozilla_netwerk_protocol_http_Http2Session.cpp) = 7d7556575028ef4ee5fccbcb712d5c9f2827f7e6
SHA1 (patch-mozilla_old-configure.in) = 865300929353ffbd31ae01793dd496352e2ccb70
SHA1 (patch-mozilla_python_mozbuild_mozbuild_configure_options.py) = c95e9ffa8bae63b6e68c8363903dadef93ce7d75
SHA1 (patch-mozilla_toolkit_components_protobuf_src_google_protobuf_stubs_atomicops.h) = 0b5cad33bc9a90f4ae2d6346065707b642aba3a9
SHA1 (patch-mozilla_toolkit_components_protobuf_src_google_protobuf_stubs_platform__macros.h) = 0708a43577e786da4588bf318802ea035a9c1d52
SHA1 (patch-mozilla_toolkit_components_terminator_nsTerminator.cpp) = c54660b4699925c49bd2a98ef8915d49960fbd13
SHA1 (patch-mozilla_toolkit_library_libxul.mk) = e7c052d055a54f9fedad38b06b25c53eb0136403
SHA1 (patch-mozilla_toolkit_library_moz.build) = 84756933232b32d7ced566c405e5f2b78d98cb8c
SHA1 (patch-mozilla_toolkit_modules_GMPUtils.jsm) = 4cfec16c0ec538ac80d590291db1eebd378e0b1a
SHA1 (patch-mozilla_toolkit_moz.configure) = 9d36404eee27549cc13b62d199e7491319586192
SHA1 (patch-mozilla_toolkit_mozapps_extensions_test_browser_browser__gmpProvider.js) = 85f482aecaf5bd971775c6fbf35d3d6bfd04a296
SHA1 (patch-mozilla_toolkit_xre_glxtest.cpp) = a8f6653760e33014c5e6f104b19fce8a0f331d24
Update to 2.20 * Merge SunOS patches from www/firefox. Changelog: SeaMonkey-specific changes The Content Security Policy (CSP) 1.0 parser has been enabled. The Mixed Content Blocker has been enabled, blocking insecure active content loads on HTTPS pages. New mail alert information can be customized now (Preferences/Mail & Newsgroups/Notifications). A confirmation prompt has been introduced to protect against accidental permanent data loss when force-deleting messages using Shift+Del. MailNews Save As Template supports multiple selections now. The size on disk is now shown for newsgroup folders. See the changes page for a more complete overview. Mozilla platform changes Added support for scrollbar style in Mac OS X 10.7 and newer. Enabled mixed content blocking to protects users from man-in-the-middle attacks and eavesdroppers on HTTPS pages (learn more). Improved about:memory's functional UI. Enabled DXVA2 on Windows Vista+ to accelerate H.264 video decoding. Simplified interface for notifications of plugin installation. Enabled users to switch the search provider across the entire browser. CSP policies using the standard syntax and semantics will now be enforced. Implemented the HTML5 <input type="range"> form control. Added unprefixed requestAnimationFrame. Dropped blink effect from CSS rule text-decoration:blink and completely removed <blink> element. Fixed several stability issues. Fixed in SeaMonkey 2.20 MFSA 2013-75 Local Java applets may read contents of local file system MFSA 2013-74 Firefox full and stub installer DLL hijacking MFSA 2013-73 Same-origin bypass with web workers and XMLHttpRequest MFSA 2013-72 Wrong principal used for validating URI for some Javascript components MFSA 2013-71 Further Privilege escalation through Mozilla Updater MFSA 2013-70 Bypass of XrayWrappers using XBL Scopes MFSA 2013-69 CRMF requests allow for code execution and XSS attacks MFSA 2013-68 Document URI misrepresentation and masquerading MFSA 2013-67 Crash during WAV audio file decoding MFSA 2013-66 Buffer overflow in Mozilla Maintenance Service and Mozilla Updater MFSA 2013-65 Buffer underflow when generating CRMF requests MFSA 2013-64 Use after free mutating DOM during SetBody MFSA 2013-63 Miscellaneous memory safety hazards (rv:23.0 / rv:17.0.8)
2013-08-11 05:18:46 +02:00
SHA1 (patch-mozilla_toolkit_xre_nsEmbedFunctions.cpp) = 70030e59b2ed09b9bc9827d35e17b12be7f0cd71
SHA1 (patch-mozilla_xpcom_base_nscore.h) = a69c532d2891ac2a2227445e85e581749685153e
SHA1 (patch-mozilla_xpcom_components_Module.h) = 9f1655ec851eef9cb113ffba291d2ca4f1e8bb19
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_Makefile.in) = fa77d69500f1436e05c677723e485ccea213f4f4
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_moz.build) = 149d1e111d52c595e7d5249cea751342fbb0f2a6
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_xptcinvoke__arm__netbsd.cpp) = cb2a4769f04351e92580e3daaca88fc7f1dfedbd
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_xptcinvoke__asm__mips.S) = fd7da8e0a424030e5a4a129d6dda521459d8ab73
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_xptcinvoke__asm__ppc__netbsd.s) = 4ba8ce148b5cd8df3dd02ec623a7da4ac5309473
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_xptcinvoke__gcc__x86__unix.cpp) = d473ae98e1193af41ab201889863673d8fda701a
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_xptcinvoke__netbsd__m68k.cpp) = 748c333df16bbe9c7b909a62ff0a0ddacad0ab57
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_xptcinvoke__ppc__netbsd.cpp) = 5680faa66f63f3e7baf49670b747b18ad39d7a00
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_xptcinvoke__sparc64__netbsd.cpp) = 7edfce709ff9a56f339dc1ee38355b852138b96d
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_xptcstubs__arm__netbsd.cpp) = 005c6b6b0e349e8d027c0d82a08b2e3885fab0b6
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_xptcstubs__asm__mips.S) = 40231c0cbd4694f375211c21fe0473fd5fb9f483
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_xptcstubs__asm__sparc64__netbsd.s) = 219bdb7ef05d156642dd4124e444696c744badfd
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_xptcstubs__gcc__x86__unix.cpp) = ff90d5dc4d4b286f21e0899d0ba96782e8771d37
SHA1 (patch-mozilla_xpcom_reflect_xptcall_md_unix_xptcstubs__netbsd__m68k.cpp) = 09b4833061face404731f2ec99a7fd2b3f313f70
SHA1 (patch-rc) = bf98fe87c83c322dcdfe3d7aff3ca8e6f273a567
SHA1 (patch-suite_installer_Makefile.in) = ec8d455118fa3f64762f91c32027d712b58f5ea5