343a9aec48
mail/thunderbird-gtk1 to 1.5.0.4, and www/seamonkey, www/seamonkey-gtk1 and www/seamonkey-bin to 1.0.2 (salo has already updated www/firefox-bin). Note that thunderbird skipped one release number (again) to stay on par with firefox. These updates provide: * improvements to product stability, * several important security fixes (see below). Fixed in Firefox 1.5.0.4: MFSA 2006-43 Privilege escalation using addSelectionListener MFSA 2006-42 Web site XSS using BOM on UTF-8 pages MFSA 2006-41 File stealing by changing input type (variant) MFSA 2006-39 "View Image" local resource linking (Windows) MFSA 2006-38 Buffer overflow in crypto.signText() MFSA 2006-37 Remote compromise via content-defined setter on object prototypes MFSA 2006-36 PLUGINSPAGE privileged JavaScript execution 2 MFSA 2006-35 Privilege escalation through XUL persist MFSA 2006-34 XSS viewing javascript: frames or images from context menu MFSA 2006-33 HTTP response smuggling MFSA 2006-32 Fixes for crashes with potential memory corruption MFSA 2006-31 EvalInSandbox escape (Proxy Autoconfig, Greasemonkey) Fixed in Thunderbird 1.5.0.4: MFSA 2006-42 Web site XSS using BOM on UTF-8 pages MFSA 2006-40 Double-free on malformed VCard MFSA 2006-38 Buffer overflow in crypto.signText() MFSA 2006-37 Remote compromise via content-defined setter on object prototypes MFSA 2006-35 Privilege escalation through XUL persist MFSA 2006-33 HTTP response smuggling MFSA 2006-32 Fixes for crashes with potential memory corruption MFSA 2006-31 EvalInSandbox escape (Proxy Autoconfig, Greasemonkey) Fixed in SeaMonkey 1.0.2: MFSA 2006-43 Privilege escalation using addSelectionListener MFSA 2006-42 Web site XSS using BOM on UTF-8 pages MFSA 2006-41 File stealing by changing input type (variant) MFSA 2006-40 Double-free on malformed VCard MFSA 2006-39 "View Image" local resource linking (Windows) MFSA 2006-38 Buffer overflow in crypto.signText() MFSA 2006-37 Remote compromise via content-defined setter on object prototypes MFSA 2006-35 Privilege escalation through XUL persist MFSA 2006-34 XSS viewing javascript: frames or images from context menu MFSA 2006-33 HTTP response smuggling MFSA 2006-32 Fixes for crashes with potential memory corruption MFSA 2006-31 EvalInSandbox escape (Proxy Autoconfig, Greasemonkey)
46 lines
2.6 KiB
Text
46 lines
2.6 KiB
Text
$NetBSD: distinfo,v 1.3 2006/06/03 08:04:36 ghen Exp $
|
|
|
|
SHA1 (seamonkey-source-1.0.2.tar.bz2) = 966e9a57269cd54f40312e5fdaa42e9f2c3fbcea
|
|
RMD160 (seamonkey-source-1.0.2.tar.bz2) = b6ff9bcb1289ae9190a1934dcc3f6eea3f6d716c
|
|
Size (seamonkey-source-1.0.2.tar.bz2) = 35473635 bytes
|
|
SHA1 (patch-aa) = 2d117311991c4c71803f3c446334d7b6f1e1067a
|
|
SHA1 (patch-ab) = 1d5d19a6f87c7d76de6f787b5492d347668245b7
|
|
SHA1 (patch-ac) = 9bcc2601283b0f8e4a86fa6663127c707d299590
|
|
SHA1 (patch-ad) = 2210b695a2eedefb82c16698a51f4f0f6b2e53e4
|
|
SHA1 (patch-ae) = f3c8ffcdfc8c0d5cc75413602c97c731721d751e
|
|
SHA1 (patch-af) = 4844013ad49c77b87be7c30931ca786f246b40f3
|
|
SHA1 (patch-ag) = eaebefa81d03b2ebc8a32465f59889d92944d750
|
|
SHA1 (patch-ah) = 8f92f4294ead04ddc5b719ff66b4aada912dcc01
|
|
SHA1 (patch-ai) = 89b0fb6fb691a6d40e7f1a5bdc8335d63e491c7b
|
|
SHA1 (patch-aj) = 951b5ea63116d876a6fcef586256a5728a2df2cf
|
|
SHA1 (patch-ak) = f867ca0973fb4d0ca325b25f83586f10f6e85e32
|
|
SHA1 (patch-al) = d916f38de2fa0ca1993ec75c457fccc60ee6d612
|
|
SHA1 (patch-an) = 99ac2da44322db96f8d65fbfdb380727b9da96fe
|
|
SHA1 (patch-ao) = 617d232bd335bc988388f2004ca919c829e371da
|
|
SHA1 (patch-ap) = 856f74f774b4db7df9b4453aea4d849893ee6bf1
|
|
SHA1 (patch-aq) = 02913aeb1f32eac4ffa64cdafd89fba53a390138
|
|
SHA1 (patch-aw) = db73e21e67dc4200312285973faaaed308ea436e
|
|
SHA1 (patch-ax) = b32483c5259cbe95202944683889bf20a7c1650e
|
|
SHA1 (patch-ba) = add9ecd6cff002525b2bc63aad7eb142e610b190
|
|
SHA1 (patch-bb) = 02739e33cc1f35294257125c39a1223e0e1b07a6
|
|
SHA1 (patch-bm) = 3e297a2dece8dcad7bde86f79f944a98d09174a7
|
|
SHA1 (patch-bo) = b1960ca29c6275c2547c5e61348e51b036dabb9b
|
|
SHA1 (patch-bq) = 9df1f0cf423ca2935df79c9f2b4b32ffedd2af58
|
|
SHA1 (patch-br) = 17c64ca592a5482a780ad3bc6d5f835ed2c91588
|
|
SHA1 (patch-bs) = 3263560fed55d5c7075f28d405d9d705608bfb67
|
|
SHA1 (patch-bu) = db33b8651e3cb1fbf9a18dbe78e1e8288cfda0ee
|
|
SHA1 (patch-bv) = 4f23dfd885131ea866f31370f1421e7c19706860
|
|
SHA1 (patch-bw) = a9924b3db72bcf6949c9a6fc36d56220c8f68d4e
|
|
SHA1 (patch-bx) = 046e19c9c4b431369411658373b14c1822841d85
|
|
SHA1 (patch-by) = 643185af7a0df7030b2b96447ee4031dc9c82f88
|
|
SHA1 (patch-bz) = 6f854d74a9d1d1174ce8eff7d65f8024a7da4711
|
|
SHA1 (patch-ca) = 479ef14631ae019ae5ca1c08a2f786294f3e972b
|
|
SHA1 (patch-cb) = fd0f033d63be066ce5c47057d72c48a085718908
|
|
SHA1 (patch-cg) = bea25d1ca341407fe6100f16c88f2c19b4fddc24
|
|
SHA1 (patch-ch) = 313308df929c4b40b9d453ce8815af081312eab0
|
|
SHA1 (patch-ci) = 225043e92bca992737ac1065dd806e1463ac2cd3
|
|
SHA1 (patch-cj) = 8716afb433a9cab1202cd39db1611ec784859c43
|
|
SHA1 (patch-ck) = 157fad436bb71795e5ff4b6b8efb26f7f6a84e90
|
|
SHA1 (patch-cl) = 0c6d7f86739ec8cb805d8ddc0034a421488274bc
|
|
SHA1 (patch-cm) = f3de952dd8eedfb5e4a11a2b05500d37890b13f5
|
|
SHA1 (patch-cn) = 67b5ed52ffe09eb083ee30d9916c231666e0507c
|