pkgsrc/www/seamonkey/distinfo

90 lines
6.2 KiB
Text
Raw Normal View History

Update to 2.15 * Use Lightning in seamonkey tar ball, 2.0pre. Changelog: SeaMonkey-specific changes SeaMonkey can be set as default client/browser on Mac and Linux now. See the changes page for minor changes. Mozilla platform changes The new IonMonkey compiler improves JavaScript performance. Preliminary support for WebRTC has been added. Image quality has been improved through a new HTML scaling algorithm. CSS3 Flexbox has been implemented. Support for new DOM property window.devicePixelRatio has been added. Support for @supports has been added (disabled for now). Startup time has been improved through smart handling of signed extension certificates. HTML5: Support for W3C touch events has been implemented, taking the place of MozTouch events Insecure content loading has been disabled on HTTPS pages (see bug 62178). Responsiveness for users on proxies has been improved. Fixed several stability issues. Fixed in SeaMonkey 2.15 MFSA 2013-20 Mis-issued TURKTRUST certificates MFSA 2013-19 Use-after-free in Javascript Proxy objects MFSA 2013-18 Use-after-free in Vibrate MFSA 2013-17 Use-after-free in ListenerManager MFSA 2013-16 Use-after-free in serializeToStream MFSA 2013-15 Privilege escalation through plugin objects MFSA 2013-14 Chrome Object Wrapper (COW) bypass through changing prototype MFSA 2013-13 Memory corruption in XBL with XML bindings containing SVG MFSA 2013-12 Buffer overflow in Javascript string concatenation MFSA 2013-11 Address space layout leaked in XBL objects MFSA 2013-10 Event manipulation in plugin handler to bypass same-origin policy MFSA 2013-09 Compartment mismatch with quickstubs returned values MFSA 2013-08 AutoWrapperChanger fails to keep objects alive during garbage collection MFSA 2013-07 Crash due to handling of SSL on threads MFSA 2013-06 Touch events are shared across iframes MFSA 2013-05 Use-after-free when displaying table with many columns and column groups MFSA 2013-04 URL spoofing in addressbar during page loads MFSA 2013-03 Buffer Overflow in Canvas MFSA 2013-02 Use-after-free and buffer overflow issues found using Address Sanitizer MFSA 2013-01 Miscellaneous memory safety hazards (rv:18.0/ rv:10.0.12 / rv:17.0.2)
2013-01-20 09:33:13 +01:00
$NetBSD: distinfo,v 1.92 2013/01/20 08:33:13 ryoon Exp $
SHA1 (enigmail-1.4.5.tar.gz) = 16d0450a9f5fb4de0e9cc5b9f8091dce4b070aaf
RMD160 (enigmail-1.4.5.tar.gz) = 860a1ca813fd2ccae69ac0afe07affd39611e56a
Size (enigmail-1.4.5.tar.gz) = 1269207 bytes
Update to 2.15 * Use Lightning in seamonkey tar ball, 2.0pre. Changelog: SeaMonkey-specific changes SeaMonkey can be set as default client/browser on Mac and Linux now. See the changes page for minor changes. Mozilla platform changes The new IonMonkey compiler improves JavaScript performance. Preliminary support for WebRTC has been added. Image quality has been improved through a new HTML scaling algorithm. CSS3 Flexbox has been implemented. Support for new DOM property window.devicePixelRatio has been added. Support for @supports has been added (disabled for now). Startup time has been improved through smart handling of signed extension certificates. HTML5: Support for W3C touch events has been implemented, taking the place of MozTouch events Insecure content loading has been disabled on HTTPS pages (see bug 62178). Responsiveness for users on proxies has been improved. Fixed several stability issues. Fixed in SeaMonkey 2.15 MFSA 2013-20 Mis-issued TURKTRUST certificates MFSA 2013-19 Use-after-free in Javascript Proxy objects MFSA 2013-18 Use-after-free in Vibrate MFSA 2013-17 Use-after-free in ListenerManager MFSA 2013-16 Use-after-free in serializeToStream MFSA 2013-15 Privilege escalation through plugin objects MFSA 2013-14 Chrome Object Wrapper (COW) bypass through changing prototype MFSA 2013-13 Memory corruption in XBL with XML bindings containing SVG MFSA 2013-12 Buffer overflow in Javascript string concatenation MFSA 2013-11 Address space layout leaked in XBL objects MFSA 2013-10 Event manipulation in plugin handler to bypass same-origin policy MFSA 2013-09 Compartment mismatch with quickstubs returned values MFSA 2013-08 AutoWrapperChanger fails to keep objects alive during garbage collection MFSA 2013-07 Crash due to handling of SSL on threads MFSA 2013-06 Touch events are shared across iframes MFSA 2013-05 Use-after-free when displaying table with many columns and column groups MFSA 2013-04 URL spoofing in addressbar during page loads MFSA 2013-03 Buffer Overflow in Canvas MFSA 2013-02 Use-after-free and buffer overflow issues found using Address Sanitizer MFSA 2013-01 Miscellaneous memory safety hazards (rv:18.0/ rv:10.0.12 / rv:17.0.2)
2013-01-20 09:33:13 +01:00
SHA1 (seamonkey-2.15.source.tar.bz2) = bfdd7596f45d950b0e2e2dbf4a91b2c8811aa81f
RMD160 (seamonkey-2.15.source.tar.bz2) = 38640758afd8c2dcccc26c6fa2926e5aac2debe5
Size (seamonkey-2.15.source.tar.bz2) = 120128259 bytes
SHA1 (patch-aa) = 01abb03b890db1b4c69cdc0851fc4004fe25306c
SHA1 (patch-aa-toplevel) = 74648cc7c80310aa506fe8196730cac25dd64c9e
SHA1 (patch-ab) = 9cca7b0b97c4c38b30a125a6daf116b4064d451e
SHA1 (patch-ac) = 7f8ebe176cc3674a659c0c9b84bc4c84bb15f7b1
SHA1 (patch-ae) = bc047f107ecc4f57d6f0073c6d86061280ba54f3
SHA1 (patch-ag) = 6df9db65468528bf58ed175260469c0d60361187
SHA1 (patch-ai) = 6ba66c4ba4134f4b59f4eb09e321e205b4f2f222
SHA1 (patch-ak) = a36dd36a037a76a40955316200b1f4603b9ed8e9
SHA1 (patch-al) = 06ddb5f0f55ca02bee0d55ddb5316ddd9099f2d9
SHA1 (patch-am) = 3c1343b4e71dd2ffa66ed0d4b59f9e7a1c5be2e0
SHA1 (patch-an) = a76456ccf059756b6582c0586cbf76c1cdabf1c3
Update to 2.15 * Use Lightning in seamonkey tar ball, 2.0pre. Changelog: SeaMonkey-specific changes SeaMonkey can be set as default client/browser on Mac and Linux now. See the changes page for minor changes. Mozilla platform changes The new IonMonkey compiler improves JavaScript performance. Preliminary support for WebRTC has been added. Image quality has been improved through a new HTML scaling algorithm. CSS3 Flexbox has been implemented. Support for new DOM property window.devicePixelRatio has been added. Support for @supports has been added (disabled for now). Startup time has been improved through smart handling of signed extension certificates. HTML5: Support for W3C touch events has been implemented, taking the place of MozTouch events Insecure content loading has been disabled on HTTPS pages (see bug 62178). Responsiveness for users on proxies has been improved. Fixed several stability issues. Fixed in SeaMonkey 2.15 MFSA 2013-20 Mis-issued TURKTRUST certificates MFSA 2013-19 Use-after-free in Javascript Proxy objects MFSA 2013-18 Use-after-free in Vibrate MFSA 2013-17 Use-after-free in ListenerManager MFSA 2013-16 Use-after-free in serializeToStream MFSA 2013-15 Privilege escalation through plugin objects MFSA 2013-14 Chrome Object Wrapper (COW) bypass through changing prototype MFSA 2013-13 Memory corruption in XBL with XML bindings containing SVG MFSA 2013-12 Buffer overflow in Javascript string concatenation MFSA 2013-11 Address space layout leaked in XBL objects MFSA 2013-10 Event manipulation in plugin handler to bypass same-origin policy MFSA 2013-09 Compartment mismatch with quickstubs returned values MFSA 2013-08 AutoWrapperChanger fails to keep objects alive during garbage collection MFSA 2013-07 Crash due to handling of SSL on threads MFSA 2013-06 Touch events are shared across iframes MFSA 2013-05 Use-after-free when displaying table with many columns and column groups MFSA 2013-04 URL spoofing in addressbar during page loads MFSA 2013-03 Buffer Overflow in Canvas MFSA 2013-02 Use-after-free and buffer overflow issues found using Address Sanitizer MFSA 2013-01 Miscellaneous memory safety hazards (rv:18.0/ rv:10.0.12 / rv:17.0.2)
2013-01-20 09:33:13 +01:00
SHA1 (patch-ao) = 77d53f485da4fce8495198550bb7e8976326927a
SHA1 (patch-as) = 58869b1896d0927e2801f3c3d3d69e686b84de78
SHA1 (patch-at) = 97980a58f0b2f3b2f81e9ce6373ce947941ae942
SHA1 (patch-au) = fbe3e8a0bbf0048ae8a394807ba87ae6ec7d4e6e
SHA1 (patch-av) = 7bd426be930e2a9670cffdc37fd4e5290a8091f2
SHA1 (patch-aw) = 4e3927a66c7f78ffba3b2079ef2263b91395330e
SHA1 (patch-ax) = b2e968aa9e31c49b22d18568f23522f6e856fcbd
SHA1 (patch-ay) = 303f226d44ef7ddf87b634e66b0bd6d18dfdf52b
SHA1 (patch-az) = 74191395f7cae0914111e86af390b8d115c3b93d
SHA1 (patch-ba) = 453e13f23c8935a6d6edb4a12f6f128558227257
SHA1 (patch-bd) = d148a08d6aa03c559d9250cf9a30ca66f1a76859
SHA1 (patch-bf) = 12253405416bd1b56cec028e5c47a345deb54a44
SHA1 (patch-bg) = 1b4da74724d24693d863392e1963fa674d34b72e
SHA1 (patch-bi) = 904ec1a966d6224f873836d8cbee2eb80eb2d2a9
SHA1 (patch-config_baseconfig.mk) = 3fdb27d227ef0d858b56023b9c709117d5cc5e00
SHA1 (patch-directory_c-sdk_ldap_include_portable.h) = 4ce9e1a0e8f0d05367243e8d2b5118606a35da94
SHA1 (patch-ldap_sdks_c-sdk_build.mk) = 541604f0f63f5c1b3ce5509260517f68f417eb73
SHA1 (patch-mail_app_Makefile.in) = d66563480442a43e70715ecabf54ffeda5e5cf79
SHA1 (patch-mail_app_nsMailApp.cpp) = 6641427f5a9a2c2e4065abb331d983798e41d91c
SHA1 (patch-mb) = 0fc8918e665c618ef922601b19100b52f565c2a9
SHA1 (patch-md) = 48e172fdf3ec12765e674a4a2ba8ac1b53f2f15b
SHA1 (patch-me) = 4c5f293574e9bdbe3ad8fa2abd7649622750f24f
Update to 2.15 * Use Lightning in seamonkey tar ball, 2.0pre. Changelog: SeaMonkey-specific changes SeaMonkey can be set as default client/browser on Mac and Linux now. See the changes page for minor changes. Mozilla platform changes The new IonMonkey compiler improves JavaScript performance. Preliminary support for WebRTC has been added. Image quality has been improved through a new HTML scaling algorithm. CSS3 Flexbox has been implemented. Support for new DOM property window.devicePixelRatio has been added. Support for @supports has been added (disabled for now). Startup time has been improved through smart handling of signed extension certificates. HTML5: Support for W3C touch events has been implemented, taking the place of MozTouch events Insecure content loading has been disabled on HTTPS pages (see bug 62178). Responsiveness for users on proxies has been improved. Fixed several stability issues. Fixed in SeaMonkey 2.15 MFSA 2013-20 Mis-issued TURKTRUST certificates MFSA 2013-19 Use-after-free in Javascript Proxy objects MFSA 2013-18 Use-after-free in Vibrate MFSA 2013-17 Use-after-free in ListenerManager MFSA 2013-16 Use-after-free in serializeToStream MFSA 2013-15 Privilege escalation through plugin objects MFSA 2013-14 Chrome Object Wrapper (COW) bypass through changing prototype MFSA 2013-13 Memory corruption in XBL with XML bindings containing SVG MFSA 2013-12 Buffer overflow in Javascript string concatenation MFSA 2013-11 Address space layout leaked in XBL objects MFSA 2013-10 Event manipulation in plugin handler to bypass same-origin policy MFSA 2013-09 Compartment mismatch with quickstubs returned values MFSA 2013-08 AutoWrapperChanger fails to keep objects alive during garbage collection MFSA 2013-07 Crash due to handling of SSL on threads MFSA 2013-06 Touch events are shared across iframes MFSA 2013-05 Use-after-free when displaying table with many columns and column groups MFSA 2013-04 URL spoofing in addressbar during page loads MFSA 2013-03 Buffer Overflow in Canvas MFSA 2013-02 Use-after-free and buffer overflow issues found using Address Sanitizer MFSA 2013-01 Miscellaneous memory safety hazards (rv:18.0/ rv:10.0.12 / rv:17.0.2)
2013-01-20 09:33:13 +01:00
SHA1 (patch-mm) = 3c0f229c2a029d9d68e2330a68a9170da0b17157
SHA1 (patch-mozilla_build_autoconf_nss.m4) = 3b05127e72a76ac2f87c8362cbde13ce76485a19
SHA1 (patch-mozilla_config_baseconfig.mk) = 22135e1dd081529afc217009b2f2e860d8c51cd9
Update to 2.15 * Use Lightning in seamonkey tar ball, 2.0pre. Changelog: SeaMonkey-specific changes SeaMonkey can be set as default client/browser on Mac and Linux now. See the changes page for minor changes. Mozilla platform changes The new IonMonkey compiler improves JavaScript performance. Preliminary support for WebRTC has been added. Image quality has been improved through a new HTML scaling algorithm. CSS3 Flexbox has been implemented. Support for new DOM property window.devicePixelRatio has been added. Support for @supports has been added (disabled for now). Startup time has been improved through smart handling of signed extension certificates. HTML5: Support for W3C touch events has been implemented, taking the place of MozTouch events Insecure content loading has been disabled on HTTPS pages (see bug 62178). Responsiveness for users on proxies has been improved. Fixed several stability issues. Fixed in SeaMonkey 2.15 MFSA 2013-20 Mis-issued TURKTRUST certificates MFSA 2013-19 Use-after-free in Javascript Proxy objects MFSA 2013-18 Use-after-free in Vibrate MFSA 2013-17 Use-after-free in ListenerManager MFSA 2013-16 Use-after-free in serializeToStream MFSA 2013-15 Privilege escalation through plugin objects MFSA 2013-14 Chrome Object Wrapper (COW) bypass through changing prototype MFSA 2013-13 Memory corruption in XBL with XML bindings containing SVG MFSA 2013-12 Buffer overflow in Javascript string concatenation MFSA 2013-11 Address space layout leaked in XBL objects MFSA 2013-10 Event manipulation in plugin handler to bypass same-origin policy MFSA 2013-09 Compartment mismatch with quickstubs returned values MFSA 2013-08 AutoWrapperChanger fails to keep objects alive during garbage collection MFSA 2013-07 Crash due to handling of SSL on threads MFSA 2013-06 Touch events are shared across iframes MFSA 2013-05 Use-after-free when displaying table with many columns and column groups MFSA 2013-04 URL spoofing in addressbar during page loads MFSA 2013-03 Buffer Overflow in Canvas MFSA 2013-02 Use-after-free and buffer overflow issues found using Address Sanitizer MFSA 2013-01 Miscellaneous memory safety hazards (rv:18.0/ rv:10.0.12 / rv:17.0.2)
2013-01-20 09:33:13 +01:00
SHA1 (patch-mozilla_config_system-headers) = 379ef94cf49804a0ebb0d7a517a8c3f755304610
SHA1 (patch-mozilla_dom_system_OSFileConstants.cpp) = fae216f075aa0643ee310ce5f40b808fd7cedc0e
SHA1 (patch-mozilla_gfx_skia_Makefile.in) = 9adc38011a2186d8671360f6635a6c83dc758c9a
SHA1 (patch-mozilla_gfx_skia_src_sfnt_SkOTTable__head.h) = 75a54359e2ebc4a019e4b5ed027df654b612ea34
SHA1 (patch-mozilla_gfx_skia_src_sfnt_SkOTTable__name.h) = f8ef35f6d4ede4d02baee2c2905089b307724b95
SHA1 (patch-mozilla_gfx_skia_src_sfnt_SkSFNTHeader.h) = eab1973eb9cee2440d59147b40fc861ccdae2fb5
SHA1 (patch-mozilla_gfx_thebes_gfxPlatform.cpp) = e5d5aa6e8919226c9249693334c2c54b843bd627
SHA1 (patch-mozilla_ipc_chromium_src_base_dir__reader__bsd.h) = 3b69cda097c3c01d9977e27da3693265d60c436a
SHA1 (patch-mozilla_ipc_glue_GeckoChildProcessHost.cpp) = abdf8ee597ec867b63c8274911ff6c162d30835b
SHA1 (patch-mozilla_ipc_ipdl_ipdl_lower.py) = 2bf473a505692adc68c9cdc75a23d53d61c0fc8b
SHA1 (patch-mozilla_js_src_config_system-headers) = f1f76c79081cb7ea0c81eb1759d4138e170af8b0
SHA1 (patch-mozilla_js_src_jscpucfg.h) = 733ac4f0bac5205cf3ea16b1ed909c2eb5d82e8b
SHA1 (patch-mozilla_js_src_jsgc.cpp) = 79710d555551f62ac3510eede3cbc9aa314c1809
SHA1 (patch-mozilla_js_src_methodjit_MethodJIT.cpp) = ba789e9206f830d4925eb377627eb113be52351c
Update to 2.15 * Use Lightning in seamonkey tar ball, 2.0pre. Changelog: SeaMonkey-specific changes SeaMonkey can be set as default client/browser on Mac and Linux now. See the changes page for minor changes. Mozilla platform changes The new IonMonkey compiler improves JavaScript performance. Preliminary support for WebRTC has been added. Image quality has been improved through a new HTML scaling algorithm. CSS3 Flexbox has been implemented. Support for new DOM property window.devicePixelRatio has been added. Support for @supports has been added (disabled for now). Startup time has been improved through smart handling of signed extension certificates. HTML5: Support for W3C touch events has been implemented, taking the place of MozTouch events Insecure content loading has been disabled on HTTPS pages (see bug 62178). Responsiveness for users on proxies has been improved. Fixed several stability issues. Fixed in SeaMonkey 2.15 MFSA 2013-20 Mis-issued TURKTRUST certificates MFSA 2013-19 Use-after-free in Javascript Proxy objects MFSA 2013-18 Use-after-free in Vibrate MFSA 2013-17 Use-after-free in ListenerManager MFSA 2013-16 Use-after-free in serializeToStream MFSA 2013-15 Privilege escalation through plugin objects MFSA 2013-14 Chrome Object Wrapper (COW) bypass through changing prototype MFSA 2013-13 Memory corruption in XBL with XML bindings containing SVG MFSA 2013-12 Buffer overflow in Javascript string concatenation MFSA 2013-11 Address space layout leaked in XBL objects MFSA 2013-10 Event manipulation in plugin handler to bypass same-origin policy MFSA 2013-09 Compartment mismatch with quickstubs returned values MFSA 2013-08 AutoWrapperChanger fails to keep objects alive during garbage collection MFSA 2013-07 Crash due to handling of SSL on threads MFSA 2013-06 Touch events are shared across iframes MFSA 2013-05 Use-after-free when displaying table with many columns and column groups MFSA 2013-04 URL spoofing in addressbar during page loads MFSA 2013-03 Buffer Overflow in Canvas MFSA 2013-02 Use-after-free and buffer overflow issues found using Address Sanitizer MFSA 2013-01 Miscellaneous memory safety hazards (rv:18.0/ rv:10.0.12 / rv:17.0.2)
2013-01-20 09:33:13 +01:00
SHA1 (patch-mozilla_media_libcubeb_src_Makefile.in) = 2643dc7265d38a51cfcd98fd121bd65369957f18
SHA1 (patch-mozilla_media_libsydneyaudio_src_sydney__audio__pulseaudio.c) = 0d6d5ce3e3f996fad4426755739c36fccce16279
SHA1 (patch-mozilla_netwerk_protocol_http_HttpChannelParent.cpp) = ac5d74490f5ba3bfd0c9862f1131730a24251370
SHA1 (patch-mozilla_storage_src_Makefile.in) = 31414ae8661378083547172ffb55783cf79411ba
Update to 2.15 * Use Lightning in seamonkey tar ball, 2.0pre. Changelog: SeaMonkey-specific changes SeaMonkey can be set as default client/browser on Mac and Linux now. See the changes page for minor changes. Mozilla platform changes The new IonMonkey compiler improves JavaScript performance. Preliminary support for WebRTC has been added. Image quality has been improved through a new HTML scaling algorithm. CSS3 Flexbox has been implemented. Support for new DOM property window.devicePixelRatio has been added. Support for @supports has been added (disabled for now). Startup time has been improved through smart handling of signed extension certificates. HTML5: Support for W3C touch events has been implemented, taking the place of MozTouch events Insecure content loading has been disabled on HTTPS pages (see bug 62178). Responsiveness for users on proxies has been improved. Fixed several stability issues. Fixed in SeaMonkey 2.15 MFSA 2013-20 Mis-issued TURKTRUST certificates MFSA 2013-19 Use-after-free in Javascript Proxy objects MFSA 2013-18 Use-after-free in Vibrate MFSA 2013-17 Use-after-free in ListenerManager MFSA 2013-16 Use-after-free in serializeToStream MFSA 2013-15 Privilege escalation through plugin objects MFSA 2013-14 Chrome Object Wrapper (COW) bypass through changing prototype MFSA 2013-13 Memory corruption in XBL with XML bindings containing SVG MFSA 2013-12 Buffer overflow in Javascript string concatenation MFSA 2013-11 Address space layout leaked in XBL objects MFSA 2013-10 Event manipulation in plugin handler to bypass same-origin policy MFSA 2013-09 Compartment mismatch with quickstubs returned values MFSA 2013-08 AutoWrapperChanger fails to keep objects alive during garbage collection MFSA 2013-07 Crash due to handling of SSL on threads MFSA 2013-06 Touch events are shared across iframes MFSA 2013-05 Use-after-free when displaying table with many columns and column groups MFSA 2013-04 URL spoofing in addressbar during page loads MFSA 2013-03 Buffer Overflow in Canvas MFSA 2013-02 Use-after-free and buffer overflow issues found using Address Sanitizer MFSA 2013-01 Miscellaneous memory safety hazards (rv:18.0/ rv:10.0.12 / rv:17.0.2)
2013-01-20 09:33:13 +01:00
SHA1 (patch-mozilla_toolkit_components_osfile_osfileutils.cpp) = d72f7aadc9f447acf43dd98ea7baaadc51db2bc4
SHA1 (patch-mozilla_toolkit_xre_nsAppRunner.cpp) = f64002003e185d87cb44bf92e6a5c04e89aa25d7
SHA1 (patch-mozilla_xpcom_Makefile.in) = fcd068eb5c2c96e9bf9ba275689e99ce5f6e5034
SHA1 (patch-mozilla_xpcom_ds_TimeStamp.h) = 3f751a097ec60ad743a3fa2d6ba9c3b36d633176
SHA1 (patch-mozilla_xpcom_reflect_xptcall_src_md_unix_xptcinvoke__ppc__netbsd.cpp) = e6bdc6adc373dab89bd1ab9546db8fffd41cb38c
Update to 2.15 * Use Lightning in seamonkey tar ball, 2.0pre. Changelog: SeaMonkey-specific changes SeaMonkey can be set as default client/browser on Mac and Linux now. See the changes page for minor changes. Mozilla platform changes The new IonMonkey compiler improves JavaScript performance. Preliminary support for WebRTC has been added. Image quality has been improved through a new HTML scaling algorithm. CSS3 Flexbox has been implemented. Support for new DOM property window.devicePixelRatio has been added. Support for @supports has been added (disabled for now). Startup time has been improved through smart handling of signed extension certificates. HTML5: Support for W3C touch events has been implemented, taking the place of MozTouch events Insecure content loading has been disabled on HTTPS pages (see bug 62178). Responsiveness for users on proxies has been improved. Fixed several stability issues. Fixed in SeaMonkey 2.15 MFSA 2013-20 Mis-issued TURKTRUST certificates MFSA 2013-19 Use-after-free in Javascript Proxy objects MFSA 2013-18 Use-after-free in Vibrate MFSA 2013-17 Use-after-free in ListenerManager MFSA 2013-16 Use-after-free in serializeToStream MFSA 2013-15 Privilege escalation through plugin objects MFSA 2013-14 Chrome Object Wrapper (COW) bypass through changing prototype MFSA 2013-13 Memory corruption in XBL with XML bindings containing SVG MFSA 2013-12 Buffer overflow in Javascript string concatenation MFSA 2013-11 Address space layout leaked in XBL objects MFSA 2013-10 Event manipulation in plugin handler to bypass same-origin policy MFSA 2013-09 Compartment mismatch with quickstubs returned values MFSA 2013-08 AutoWrapperChanger fails to keep objects alive during garbage collection MFSA 2013-07 Crash due to handling of SSL on threads MFSA 2013-06 Touch events are shared across iframes MFSA 2013-05 Use-after-free when displaying table with many columns and column groups MFSA 2013-04 URL spoofing in addressbar during page loads MFSA 2013-03 Buffer Overflow in Canvas MFSA 2013-02 Use-after-free and buffer overflow issues found using Address Sanitizer MFSA 2013-01 Miscellaneous memory safety hazards (rv:18.0/ rv:10.0.12 / rv:17.0.2)
2013-01-20 09:33:13 +01:00
SHA1 (patch-mp) = 2356c291ef3f29402bab30d301b54c24a179084e
SHA1 (patch-pa) = ef0de20c7c189e6f44b03df0e6d46eda23eee35b
SHA1 (patch-pb) = 71d34b0854260f01b887bd2dfa3e7be762bd7c70
SHA1 (patch-pc) = b0537273e1ffe3bb5cd7c9e1fd8f375201d9c087
Update to 2.15 * Use Lightning in seamonkey tar ball, 2.0pre. Changelog: SeaMonkey-specific changes SeaMonkey can be set as default client/browser on Mac and Linux now. See the changes page for minor changes. Mozilla platform changes The new IonMonkey compiler improves JavaScript performance. Preliminary support for WebRTC has been added. Image quality has been improved through a new HTML scaling algorithm. CSS3 Flexbox has been implemented. Support for new DOM property window.devicePixelRatio has been added. Support for @supports has been added (disabled for now). Startup time has been improved through smart handling of signed extension certificates. HTML5: Support for W3C touch events has been implemented, taking the place of MozTouch events Insecure content loading has been disabled on HTTPS pages (see bug 62178). Responsiveness for users on proxies has been improved. Fixed several stability issues. Fixed in SeaMonkey 2.15 MFSA 2013-20 Mis-issued TURKTRUST certificates MFSA 2013-19 Use-after-free in Javascript Proxy objects MFSA 2013-18 Use-after-free in Vibrate MFSA 2013-17 Use-after-free in ListenerManager MFSA 2013-16 Use-after-free in serializeToStream MFSA 2013-15 Privilege escalation through plugin objects MFSA 2013-14 Chrome Object Wrapper (COW) bypass through changing prototype MFSA 2013-13 Memory corruption in XBL with XML bindings containing SVG MFSA 2013-12 Buffer overflow in Javascript string concatenation MFSA 2013-11 Address space layout leaked in XBL objects MFSA 2013-10 Event manipulation in plugin handler to bypass same-origin policy MFSA 2013-09 Compartment mismatch with quickstubs returned values MFSA 2013-08 AutoWrapperChanger fails to keep objects alive during garbage collection MFSA 2013-07 Crash due to handling of SSL on threads MFSA 2013-06 Touch events are shared across iframes MFSA 2013-05 Use-after-free when displaying table with many columns and column groups MFSA 2013-04 URL spoofing in addressbar during page loads MFSA 2013-03 Buffer Overflow in Canvas MFSA 2013-02 Use-after-free and buffer overflow issues found using Address Sanitizer MFSA 2013-01 Miscellaneous memory safety hazards (rv:18.0/ rv:10.0.12 / rv:17.0.2)
2013-01-20 09:33:13 +01:00
SHA1 (patch-pd) = 4b4e8df33f26f6964daa5dabb100dc000ed8c3cc
SHA1 (patch-pg) = a92b11fa3250ef3bc630746a9cfa38859b42fc0d
SHA1 (patch-rc) = e4dbdbb142869c84cc9a79d54b72352db4afdfc0
SHA1 (patch-suite_installer_Makefile.in) = ec8d455118fa3f64762f91c32027d712b58f5ea5
SHA1 (patch-suite_installer_package-manifest.in) = 8e8b999bd7eca81da50e658eec584199522aee66
SHA1 (patch-toolkit_toolkit-tiers.mk) = 97c076180f7d481696af0a6951d5c3b5b5805945
SHA1 (patch-xa) = 8f4d16b72140d3687eae12326afd082f43b37c53
SHA1 (patch-xb) = 7573f9f27db06621a591958e44bd78122488365e
SHA1 (patch-xc) = 6fb07a53443c6a762ff279cd4712c9f1450eccbd
SHA1 (patch-xd) = d33f7bc6fe73cea1177e7b202211e2d8d62f512b
SHA1 (patch-xe) = ab873bf1358b01fdd7975170fef4f4d17f041593
SHA1 (patch-xf) = 926c283c7b189dcfc04be366906cb26b746f3156
SHA1 (patch-xg) = 759652e4aa26da1a2115f79e322b49a95e112eb6
SHA1 (patch-xj) = 90e066101b25144c45fe5239ff35df64cdec7458
SHA1 (patch-xk) = 56d8f4026c80f84a5a391239644805b02579ea02
SHA1 (patch-xl) = 607a8ea44c7a514868cbbf3bc1a4097bf80bf11c
SHA1 (patch-xn) = b3d545a5bfbddac56331375b0aac894573491fe1
SHA1 (patch-xo) = c52650e79b164477619dd37f7957fb94deddb296