Commit graph

70 commits

Author SHA1 Message Date
sketch
12ae10ab46 Add checksums for Solaris 10 binary, package still doesn't build but at
least bulk builds are not left retrying the distfile for hours and hours.
2009-09-30 09:35:56 +00:00
obache
88de5cdc1f Update firefox-bin to 2.0.0.20.
Firefox 2.0.0.20 includes an additional security fix over Firefox 2.0.0.19 for
users of the Windows platform.
So no significant changes for Linux edition, but 2.0.0.19 is not available.
2009-06-06 14:08:38 +00:00
ghen
8736b8bdbc Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.19.
Security fixes in this version:

MFSA 2008-69 XSS vulnerabilities in SessionStore
MFSA 2008-68 XSS and JavaScript privilege escalation
MFSA 2008-67 Escaped null characters ignored by CSS parser
MFSA 2008-66 Errors parsing URLs with leading whitespace and control characters
MFSA 2008-65 Cross-domain data theft via script redirect error message
MFSA 2008-64 XMLHttpRequest 302 response disclosure
MFSA 2008-62 Additional XSS attack vectors in feed preview
MFSA 2008-61 Information stealing via loadBindingDocument
MFSA 2008-60 Crashes with evidence of memory corruption (rv:1.9.0.5/1.8.1.19)

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.19/releasenotes/
2008-12-17 17:05:52 +00:00
tron
29648f5b32 Set the default maintainer for Mozilla related binary packages to
<pkgsrc-users@NetBSD.org> and only assign the "firefox-bin" package
to <grant@NetBSD.org> because that is the package he really created.
2008-11-20 13:11:18 +00:00
ghen
8145fb4d02 Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.18.
Security fixes in this version:

MFSA 2008-58 Parsing error in E4X default namespace
MFSA 2008-57 -moz-binding property bypasses security checks on codebase principals
MFSA 2008-56 nsXMLHttpRequest::NotifyEventListeners() same-origin violation
MFSA 2008-55 Crash and remote code execution in nsFrameManager
MFSA 2008-54 Buffer overflow in http-index-format parser
MFSA 2008-53 XSS and JavaScript privilege escalation via session restore
MFSA 2008-52 Crashes with evidence of memory corruption (rv:1.9.0.4/1.8.1.18)
MFSA 2008-50 Crash and remote code execution via __proto__ tampering
MFSA 2008-49 Arbitrary code execution via Flash Player dynamic module unloading
MFSA 2008-48 Image stealing via canvas and HTTP redirect
MFSA 2008-47 Information stealing via local shortcut files

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.18/releasenotes/
2008-11-13 10:11:45 +00:00
ghen
65d097fa9a Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.17.
(ok during freeze agc@)

Security fixes in this version:

MFSA 2008-45 XBM image uninitialized memory reading
MFSA 2008-44 resource: traversal vulnerabilities
MFSA 2008-43 BOM characters stripped from JavaScript before execution
MFSA 2008-42 Crashes with evidence of memory corruption (rv:1.9.0.2/1.8.1.17)
MFSA 2008-41 Privilege escalation via XPCnativeWrapper pollution
MFSA 2008-40 Forced mouse drag
MFSA 2008-39 Privilege escalation using feed preview page and XSS flaw
MFSA 2008-38 nsXMLDocument::OnChannelRedirect() same-origin violation
MFSA 2008-37 UTF-8 URL stack buffer overflow

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.17/releasenotes/
2008-09-24 14:34:36 +00:00
ghen
1a3ae5f2bf Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.16.
Security fixes in this version:

MFSA 2008-35 Command-line URLs launch multiple tabs when Firefox not running
MFSA 2008-34 Remote code execution by overflowing CSS reference counter

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.16/releasenotes/
2008-07-16 09:52:56 +00:00
ghen
4f2e9d5b4c Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.15.
Part of patch-af has been fixed upstream.

Security fixes in this version:

MFSA 2008-33 Crash and remote code execution in block reflow
MFSA 2008-32 Remote site run as local file via Windows URL shortcut
MFSA 2008-31 Peer-trusted certs can use alt names to spoof
MFSA 2008-30 File location URL in directory listings not escaped properly
MFSA 2008-29 Faulty .properties file results in uninitialized memory being used
MFSA 2008-28 Arbitrary socket connections with Java LiveConnect on Mac OS X
MFSA 2008-27 Arbitrary file upload via originalTarget and DOM Range
MFSA 2008-25 Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript()
MFSA 2008-24 Chrome script loading from fastload file
MFSA 2008-23 Signed JAR tampering
MFSA 2008-22 XSS through JavaScript same-origin violation
MFSA 2008-21 Crashes with evidence of memory corruption (rv:1.8.1.15)

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.15/releasenotes/
2008-07-02 09:03:35 +00:00
ghen
8756384c76 Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.14.
Security fixes in this version:

MFSA 2008-20 Crash in JavaScript garbage collector

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.14/releasenotes/
2008-04-17 07:39:20 +00:00
tron
9ebc67dd6a Update "firefox-bin" package to version 2.0.0.13. This update fixes the
following security issues:
- MFSA 2008-19 XUL popup spoofing variant (cross-tab popups)
- MFSA 2008-18 Java socket connection to any local port via LiveConnect
- MFSA 2008-17 Privacy issue with SSL Client Authentication
- MFSA 2008-16 HTTP Referrer spoofing with malformed URLs
- MFSA 2008-15 Crashes with evidence of memory corruption (rv:1.8.1.13)
- MFSA 2008-14 JavaScript privilege escalation and arbitrary code execution
2008-03-27 13:17:21 +00:00
jlam
65404edba4 Add support for user-destdir installation -- seamonkey-bin/Makefile.common
has already been altered to support user-destdir, so we just need to turn
it on in these packages.
2008-03-07 05:14:04 +00:00
ghen
175915d583 Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.12.
Security fixes in this version:

MFSA 2008-11 Web forgery overwrite with div overlay
MFSA 2008-10 URL token stealing via stylesheet redirect
MFSA 2008-09 Mishandling of locally-saved plain text files
MFSA 2008-08 File action dialog tampering
MFSA 2008-06 Web browsing history and forward navigation stealing
MFSA 2008-05 Directory traversal via chrome: URI
MFSA 2008-04 Stored password corruption
MFSA 2008-03 Privilege escalation, XSS, Remote Code Execution
MFSA 2008-02 Multiple file input focus stealing vulnerabilities
MFSA 2008-01 Crashes with evidence of memory corruption (rv:1.8.1.12)

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.12/releasenotes/
2008-02-08 11:28:30 +00:00
ghen
849bc2247a Add distinfo for solaris10 binaries (weren't available yet when the 2.0.0.11
release was announced).
2007-12-02 21:28:36 +00:00
ghen
d1a431b3d0 Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.11.
This update fixes a bug introduced by the 2.0.0.10 update in the <canvas>
feature that affected some web pages and extensions.

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.11/releasenotes/
2007-12-01 21:43:23 +00:00
ghen
c5e52e6ab8 Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.10.
Security fixes in this version:

MFSA 2007-39 Referer-spoofing via window.location race condition
MFSA 2007-38 Memory corruption vulnerabilities (rv:1.8.1.10)
MFSA 2007-37 jar: URI scheme XSS hazard

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.10/releasenotes/
2007-11-28 01:36:09 +00:00
ghen
29abd097f4 Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.9.
Fixes a number of regressions introduced in 2.0.0.8:

* Bug 400406 - Firefox will ignore the clear CSS property when used beneath a
  box that is using the float property. There is a temporary workaround JS/CSS
  code available for web developers with affected layouts.
* Bug 400467 - Windows Vista users will get Java not found or Java not working
  errors when trying to load Java applets after updating. To fix this, users
  can right-click the Firefox icon and Run as administrator, then browse to a
  page with a Java applet  doing this once will fix the problem and permanently
  restore Java functionality.
* Bug 396695 - Add-ons are disabled after updating. Users can fix this problem
  by opening their profile folder and removing three files (extensions.rdf,
  extensions.ini and extensions.cache)
* Bug 400421 - Removing a single area element from an image map will cause the
  entire map to disappear. There is no workaround available at this time.
* Bug 400735 - Some Windows users may experience crashes at startup. There is
  no workaround available at this time.

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.9/releasenotes/
2007-11-02 21:46:38 +00:00
jlam
b5e6ca3a7e Move code that generates a dynamic PLIST from the {pre,do,post}-install
targets and into a GENERATE_PLIST variable definition.  Remove some
unnecessary empty PLISTs as a result of properly setting GENERATE_PLIST.
2007-10-25 21:04:21 +00:00
jlam
38c496d6c0 Re-add "intentionally empty" PLISTs for meta-packages and other packages
that directly manipulate empty PLISTs.

Modify plist/plist.mk so that if the PLIST files are missing and no
GENERATE_PLIST is defined, then the package fails to build.
2007-10-25 17:49:45 +00:00
jlam
56ba4d2690 Remove empty PLISTs from pkgsrc since revision 1.33 of plist/plist.mk
can handle packages having no PLIST files.
2007-10-25 16:54:26 +00:00
ghen
b662225e64 Remove empty lines to get rid of warnings in weekly pkgsrc checks on babylon5.
Suggested by veego.
2007-10-20 10:42:36 +00:00
ghen
f6b568b31b Add distinfo entries for Solaris {8,10}/{i386,sparc} as well.
Noted by dmcmahill.
2007-10-19 19:47:43 +00:00
ghen
37e91daf4d Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.8.
Security fixes in this version:

MFSA 2007-36 URIs with invalid %-encoding mishandled by Windows
MFSA 2007-35 XPCNativeWrapper pollution using Script object
MFSA 2007-34 Possible file stealing through sftp protocol
MFSA 2007-33 XUL pages can hide the window titlebar
MFSA 2007-32 File input focus stealing vulnerability
MFSA 2007-31 Browser digest authentication request splitting
MFSA 2007-30 onUnload Tailgating
MFSA 2007-29 Crashes with evidence of memory corruption (rv:1.8.1.8)

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.8/releasenotes/
2007-10-19 08:59:55 +00:00
martti
bd986edbc7 Remove trailing spaces. 2007-10-09 19:19:08 +00:00
dmcmahill
55fb9ac3fe add a bunch of missing distfile checksums (for solaris8, solaris10, sparc and x86
for each of those).
2007-10-07 19:58:45 +00:00
ghen
01f5bd0122 Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.7.
This version only fixes a Windows-specific security issue, but update
nevertheless so we start the freeze with the latest available version.
(People will start asking about this update anyway?)

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.7/releasenotes/
2007-09-20 07:17:31 +00:00
jlam
081c0f8957 Allow a nicer syntax for expressing needing at least a certain version
of an emulated operating system.  Instead of proliferating things like
SUSE_VERSION_REQD, NETBSD_VERSION_REQD, SOLARIS_VERSION_REQD, etc., a
package can say:

	EMUL_REQD=	suse>=9.1 netbsd>=2.0 solaris>=10

all in one, succinct line.
2007-08-23 18:20:30 +00:00
tron
4a4ac9483d Bump revision number after dependence fix. 2007-08-06 08:52:04 +00:00
ghen
d55bb88622 Add distinfo for solaris-i386 and solaris-sparc (using "make emul-fetch" and
"make emul-distinfo", thanks jlam!).
2007-07-31 13:51:22 +00:00
ghen
bf542e379a Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.6.
Security fixes in this version:

MFSA 2007-27 Unescaped URIs passed to external programs
MFSA 2007-26 Privilege escalation through chrome-loaded about:blank windows

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.6/releasenotes/
2007-07-31 10:06:47 +00:00
jlam
33f30156fb * Add new emulator framework in pkgsrc/mk/emulator that handles all
binary-only packages that require binary "emulation" on the native
  operating system.  Please see pkgsrc/mk/emulator/README for more
  details.

* Teach the plist framework to automatically use any existing
  PLIST.${EMUL_PLATFORM} as part of the default PLIST_SRC definition.

* Convert all of the binary-only packages in pkgsrc to use the
  emulator framework.  Most of them have been tested to install and
  deinstall correctly.  This involves the following cleanup actions:

    * Remove use of custom PLIST code and use PLIST.${EMUL_PLATFORM}
      more consistently.

    * Simplify packages by using default INSTALL and DEINSTALL scripts
      instead of custom INSTALL/DEINSTALL code.

    * Remove "SUSE_COMPAT32" and "PKG_OPTIONS.suse" from pkgsrc.
      Packages only need to state exactly which emulations they support,
      and the framework handles any i386-on-x86_64 or sparc-on-sparc64
      uses.

    * Remove "USE_NATIVE_LINUX" from pkgsrc.  The framework will
      automatically detect when the package is installing on Linux.

  Specific changes to packages include:

    * Bump the PKGREVISIONs for all of the suse100* and suse91* packages
      due to changes in the +INSTALL/+DEINSTALL scripts used in all
      of the packages.

    * Remove pkgsrc/emulators/suse_linux, which is unused by any
      packages.

    * cad/lc -- remove custom code to create the distinfo file for
	all supported platforms; just use "emul-fetch" and "emul-distinfo"
	instead.

    * lang/Cg-compiler -- install the shared libraries under ${EMULDIR}
	instead of ${PREFIX}/lib so that compiled programs will find
	the shared libraries.

    * mail/thunderbird-bin-nightly -- update to latest binary
	distributions for supported platforms.

    * multimedia/ns-flash -- update Linux version to 9.0.48 as the
	older version is no longer available for interactive fetch.

    * security/uvscan -- set LD_LIBRARY_PATH explicitly so that
	it's not necessary to install library symlinks into
	${EMULDIR}/usr/local/lib.

    * www/firefox-bin-flash -- update Linux version to 9.0.48 as the
	older version is no longer available for interactive fetch.
2007-07-29 05:18:36 +00:00
xtraeme
c23ca350ef Update to 2.0.0.5:
MFSA 2007-25 XPCNativeWrapper pollution
MFSA 2007-24 Unauthorized access to wyciwyg:// documents
MFSA 2007-23 Remote code execution by launching Firefox from
		Internet Explorer
MFSA 2007-22 File type confusion due to %00 in name
MFSA 2007-21 Privilege escalation using an event handler attached to an
		element not in the document
MFSA 2007-20 Frame spoofing while window is loading
MFSA 2007-19 XSS using addEventListener and setTimeout
MFSA 2007-18 Crashes with evidence of memory corruption
2007-07-19 18:20:58 +00:00
ghen
3aefa46904 Update firefox, firefox-bin and firefox-gtk1 to 2.0.0.4.
Security fixes in this version:

MFSA 2007-17 XUL Popup Spoofing
MFSA 2007-16 XSS using addEventListener
MFSA 2007-14 Path Abuse in Cookies
MFSA 2007-13 Persistent Autocomplete Denial of Service
MFSA 2007-12 Crashes with evidence of memory corruption

For more info, see http://www.mozilla.com/en-US/firefox/2.0.0.4/releasenotes/
2007-05-31 07:25:07 +00:00
ghen
800ce59e41 Update to Firefox 2.0.0.3 (nb1), from www/firefox2* (see there for history
and change notes).  Firefox 1.5.0.x will be maintained in www/firefox15*,
as discussed on tech-pkg.
2007-05-12 13:53:07 +00:00
ghen
f705172d8a Add an EOL note here as well. 2007-05-12 07:35:13 +00:00
ghen
5988dc0ebe Update firefox, firefox-bin and firefox-gtk1 to 1.5.0.11. Fixed in this version:
* Security update: MFSA 2007-11 (FTP PASV port-scanning) has been fixed.
* Website Compatibility: Fixed various web compatibility regressions.

For more info, see http://www.mozilla.com/en-US/firefox/releases/1.5.0.11.html
2007-03-21 13:33:04 +00:00
ghen
69d5c1827d Update firefox, firefox-bin and firefox-gtk1 to 1.5.0.10. Fixed in this version:
Fixed in Firefox 1.5.0.10
MFSA 2007-07 Embedded nulls in location.hostname confuse same-domain checks
MFSA 2007-06 Mozilla Network Security Services (NSS) SSLv2 buffer overflow
MFSA 2007-05 XSS and local file access by opening blocked popups
MFSA 2007-04 Spoofing using custom cursor and CSS3 hotspot
MFSA 2007-03 Information disclosure through cache collisions
MFSA 2007-02 Improvements to help protect against Cross-Site Scripting attacks
MFSA 2007-01 Crashes with evidence of memory corruption (rv:1.8.0.10/1.8.1.2)

For more info, see http://www.mozilla.com/en-US/firefox/releases/1.5.0.10.html
2007-02-25 00:43:23 +00:00
wiz
601583c320 Whitespace cleanup, courtesy of pkglint.
Patch provided by Sergey Svishchev in private mail.
2007-02-22 19:26:05 +00:00
ghen
23da21a6fc Update firefox, firefox-bin and firefox-gtk1 to 1.5.0.9. Fixed in this version:
MFSA 2006-75 RSS Feed-preview referrer leak
MFSA 2006-73 Mozilla SVG Processing Remote Code Execution
MFSA 2006-72 XSS by setting img.src to javascript: URI
MFSA 2006-71 LiveConnect crash finalizing JS objects
MFSA 2006-70 Privilege escallation using watch point
MFSA 2006-68 Crashes with evidence of memory corruption (rv:1.8.0.9/1.8.1.1)

For more info, see http://www.mozilla.com/en-US/firefox/releases/1.5.0.9.html
2006-12-20 11:01:26 +00:00
jdolecek
049c9ab1bb seamonkey-bin/Makefile.common - allow override of MOZ_DIR
update firefox-bin and firefox2-bin to override MOZ_DIR to point
to the binary Linux distribution; kill their own MASTER_SITES

now firefox-bin and firefox2-bin automaticaly pick up mirror
changes in the master script
2006-11-25 21:38:51 +00:00
ghen
2d171b37e2 Update firefox, firefox-bin and firefox-gtk1 to 1.5.0.8. Fixed in this version:
MFSA 2006-67 Running Script can be recompiled
MFSA 2006-66 RSA signature forgery (variant)
MFSA 2006-65 Crashes with evidence of memory corruption (rv:1.8.0.8)

For more info, see http://www.mozilla.com/en-US/firefox/releases/1.5.0.8.html
2006-11-08 09:50:15 +00:00
salo
fc4846dc04 Use Makefile.common from seamonkey-bin dir instead of mozilla-bin. 2006-09-24 16:36:29 +00:00
ghen
0c848d4c18 Update firefox-bin to 1.5.0.7 and seamonkey-bin to 1.0.5. Source package
updates will follow later.

Fixed in Firefox 1.5.0.7:
MFSA 2006-64 Crashes with evidence of memory corruption (rv:1.8.0.7)
MFSA 2006-62 Popup-blocker cross-site scripting (XSS)
MFSA 2006-61 Frame spoofing using document.open()
MFSA 2006-60 RSA Signature Forgery
MFSA 2006-59 Concurrency-related vulnerability
MFSA 2006-58 Auto-Update compromise through DNS and SSL spoofing
MFSA 2006-57 JavaScript Regular Expression Heap Corruption

Fixed in SeaMonkey 1.0.5:
MFSA 2006-64 Crashes with evidence of memory corruption (rv:1.8.0.7)
MFSA 2006-63 JavaScript execution in mail via XBL
MFSA 2006-61 Frame spoofing using document.open()
MFSA 2006-60 RSA Signature Forgery
MFSA 2006-59 Concurrency-related vulnerability
MFSA 2006-57 JavaScript Regular Expression Heap Corruption

For more info, see http://www.mozilla.com/firefox/releases/1.5.0.7.html and
http://www.mozilla.org/projects/seamonkey/releases/seamonkey1.0.5/
2006-09-15 09:24:30 +00:00
tron
9d35cf0e34 Update "firefox-bin" package to version 1.5.0.6. Changes since 1.5.0.5:
- Fixed an issue with playing Windows Media content
2006-08-03 08:31:28 +00:00
tron
b503cf1a87 Update "firefox-bin" package to version 1.5.0.5. Changes since 1.5.0.4:
- Improvements to product stability
- Several security fixes:
  MFSA 2006-56 chrome: scheme loading remote content
  MFSA 2006-55 Crashes with evidence of memory corruption (rv:1.8.0.5)
  MFSA 2006-54 XSS with XPCNativeWrapper(window).Function(...)
  MFSA 2006-53 UniversalBrowserRead privilege escalation
  MFSA 2006-52 PAC privilege escalation using Function.prototype.call
  MFSA 2006-51 Privilege escalation using named-functions and redefined
               "new Object()"
  MFSA 2006-50 JavaScript engine vulnerabilities
  MFSA 2006-48 JavaScript new Function race condition
  MFSA 2006-47 Native DOM methods can be hijacked across domains
  MFSA 2006-46 Memory corruption with simultaneous events
  MFSA 2006-45 Javascript navigator Object Vulnerability
  MFSA 2006-44 Code execution through deleted frame reference
2006-07-27 10:34:33 +00:00
salo
de3adebec2 firefox-bin requires libraries from suse_compat when using SUSE 10.0 2006-06-09 16:37:18 +00:00
salo
c58f1b1dbb Updated to version 1.5.0.4
Changes:

Fixes for security issues:
 MFSA 2006-43 Privilege escalation using addSelectionListener
 MFSA 2006-42 Web site XSS using BOM on UTF-8 pages
 MFSA 2006-41 File stealing by changing input type (variant)
 MFSA 2006-39 "View Image" local resource linking (Windows)
 MFSA 2006-38 Buffer overflow in crypto.signText()
 MFSA 2006-37 Remote compromise via content-defined setter on object prototypes
 MFSA 2006-36 PLUGINSPAGE privileged JavaScript execution 2
 MFSA 2006-35 Privilege escalation through XUL persist
 MFSA 2006-34 XSS viewing javascript: frames or images from context menu
 MFSA 2006-33 HTTP response smuggling
 MFSA 2006-32 Fixes for crashes with potential memory corruption
 MFSA 2006-31 EvalInSandbox escape (Proxy Autoconfig, Greasemonkey)
2006-06-02 12:27:49 +00:00
jdolecek
a0735bd19b use http CZ mirror 2006-05-03 19:47:36 +00:00
jdolecek
ed8bad60b1 add cz mirror
XXX why this has special MASTER_SITES setting? it should make use of
XXX list in mozilla-bin/Makefile.common
2006-05-03 19:44:47 +00:00
tron
a15aea5d18 Update "firefox-bin" package to version 1.5.0.3. Changes since 1.5.0.2:
- Security fix for denial of service vulnerability reported in
  Mozilla Foundation Security Advisory 2006-30
2006-05-03 08:29:19 +00:00
xtraeme
85a1b0ae10 Update to 1.5.0.2:
* Universal Binary support for Mac OS X which provides native support
      for Macintosh with Intel Core processors. Firefox supports the
      enhancements to performance introduced by the new MacIntel chipsets.
    * Improvements to product stability.
    * Several security fixes.
2006-04-14 14:06:56 +00:00