f724bacbb3
- stability fixes - security fixes - MFSA 2006-27 Table Rebuilding Code Execution Vulnerability - MFSA 2006-25 Privilege escalation through Print Preview - MFSA 2006-24 Privilege escalation using crypto.generateCRMFRequest - MFSA 2006-23 File stealing by changing input type - MFSA 2006-22 CSS Letter-Spacing Heap Overflow Vulnerability - MFSA 2006-21 JavaScript execution in mail when forwarding in-line - MFSA 2006-19 Cross-site scripting using .valueOf.call() - MFSA 2006-18 Mozilla Firefox Tag Order Vulnerability - MFSA 2006-17 cross-site scripting through window.controllers - MFSA 2006-16 Accessing XBL compilation scope via valueOf.call() - MFSA 2006-15 Privilege escalation using a JavaScript function's cloned parent - MFSA 2006-14 Privilege escalation via XBL.method.eval - MFSA 2006-13 Downloading executables with "Save Image As..." - MFSA 2006-12 Secure-site spoof (requires security warning dialog) - MFSA 2006-11 Crashes with evidence of memory corruption (rv:1.8) - MFSA 2006-10 JavaScript garbage-collection hazard audit - MFSA 2006-09 Cross-site JavaScript injection using event handlers - MFSA 2006-05 Localstore.rdf XML injection through XULDocument.persist() - MFSA 2006-03 Long document title causes startup denial of Service - MFSA 2006-01 JavaScript garbage-collection hazards - additional patch to fix pr#33333 Shin'ichiro TAYA told me that i can do this update.
21 lines
525 B
Makefile
21 lines
525 B
Makefile
# $NetBSD: Makefile,v 1.158 2006/04/24 16:52:58 veego Exp $
|
|
|
|
MOZILLA= mozilla
|
|
MOZILLA_BIN= mozilla-bin
|
|
MOZ_VER= 1.7.13
|
|
EXTRACT_SUFX= .tar.bz2
|
|
|
|
DISTFILES= ${DISTNAME}${EXTRACT_SUFX}
|
|
#DISTFILES+= mozilla-source-1.7.3-libart_lgpl.tar.bz2
|
|
#SITES_mozilla-source-1.7.3-libart_lgpl.tar.bz2=${MASTER_SITE_LOCAL}
|
|
|
|
DIST_SUBDIR= mozilla-1.7.13
|
|
|
|
COMMENT= Full featured gecko-based browser
|
|
|
|
BUILD_SVG= # yes
|
|
BUILD_MATHML= # yes
|
|
BUILD_CALENDAR= # yes
|
|
|
|
.include "../../www/mozilla/Makefile.common"
|
|
.include "../../mk/bsd.pkg.mk"
|