Репозитории ALT
S: | 2.53.17.1-alt1 |
5.1: | 1.1.18-alt2 |
4.1: | 1.1.16-alt0.M41.1 |
+updates: | 1.1.13-alt0.M41.1 |
4.0: | 1.1.12-alt0.M40.1 |
Группа :: Сети/WWW
Пакет: seamonkey
Главная Изменения Спек Патчи Sources Загрузить Gear Bugs and FR Repocop
26 сентября 2023 Andrey Cherepanov <cas at altlinux.org> 1:2.53.17.1-alt1
- New version.
- New version.
- Built only for x86_64.
- New version.
- New version.
- New version.
- New version.
- NMU: use %_rpmmacrosdir instead of /etc/rpm
- split rpm-macros-seamonkey from rpm-build-seamonkey
- New version.
- New version.
- New version.
- New version.
- New version.
- New version.
- New version.
- New version.
- New version.
- New version.
- FTBFS: Update cbindgen-vendor to 0.18.0 for rust 1.52.0.
- Build with bundled libvpx.
- New version.
- New version.
- New version.
- Update packed_simd for rust 1.48.
- Update cbindgen-vendor.tar.
- New version.
- New version.
- Fix build with NSS 3.58.
- Include seamonkey-ru.
- New version.
- Fix build with Rust 1.45 (see https://bugzilla.mozilla.org/show_bug.cgi?id=1617782).
- New version.
- New stable version.
- Remove deprecated lbzip2.
- 2.53.2 Beta 1 compatible with Rust 1.41.0 (ALT #38169).
- Do not package deprecated seamonkey-devel package.
- Use Clang for build.
- Fix License tag according to SPDX.
- 2.53.1
- build with gtk3
- 2.49.4
- 2.49.3
- 2.49.2
- move off gstreamer-0.10
- 2.49.1
+ NB: lightning no more included in upstream tarball
- 2.48
- dropped patch9
- %install: set SHELL environment variable explicitly too
- 2.46 released
- 2.46 (candidate build6 tarball)
- 2.46 (candidate build5 tarball)
- 2.40 released
- 2.40 (candidate build4 tarball)
- 2.39
- Enabled logging, see https://bugzilla.mozilla.org/1129718
- New version
- New version
- New version
- Security fixes:
+ MFSA 2015-29 Code execution through incorrect JavaScript bounds
checking elimination
+ MFSA 2015-28 Privilege escalation through SVG navigation
- New version
- New version
- New version
- Security fixes:
+ MFSA 2015-09 XrayWrapper bypass through DOM objects
+ MFSA 2015-08 Delegated OCSP responder certificates failure with
id-pkix-ocsp-nocheck extension
+ MFSA 2015-06 Read-after-free in WebRTC
+ MFSA 2015-05 Read of uninitialized memory in Web Audio
+ MFSA 2015-04 Cookie injection through Proxy Authenticate responses
+ MFSA 2015-03 sendBeacon requests lack an Origin header
+ MFSA 2015-02 Uninitialized memory use during bitmap rendering
- New version
- Build from src.rpm contains upstream tarball
- New version
- New version with security fix:
+ MFSA 2014-73 RSA Signature Forgery in NSS
- NMU: applied fedora patch to disable baseline jit
working around a segfault on i586 (closes: #30322)
- New version
- New version
- Security fixes:
+ MFSA 2014-54 Buffer overflow in Gamepad API
+ MFSA 2014-53 Buffer overflow in Web Audio Speex resampler
+ MFSA 2014-52 Use-after-free with SMIL Animation Controller
+ MFSA 2014-51 Use-after-free in Event Listener Manager
+ MFSA 2014-49 Use-after-free and out of bounds issues found using Address Sanitizer
+ MFSA 2014-48 Miscellaneous memory safety hazards
- New version
- Security fixes:
+ MFSA 2014-47 Debugger can bypass XrayWrappers with JavaScript
+ MFSA 2014-46 Use-after-free in nsHostResolve
+ MFSA 2014-45 Incorrect IDNA domain name matching for wildcard certificates
+ MFSA 2014-44 Use-after-free in imgLoader while resizing images
+ MFSA 2014-43 Cross-site scripting (XSS) using history navigations
+ MFSA 2014-42 Privilege escalation through Web Notification API
+ MFSA 2014-41 Out-of-bounds write in Cairo
+ MFSA 2014-39 Use-after-free in the Text Track Manager for HTML video
+ MFSA 2014-38 Buffer overflow when using non-XBL object as XBL
+ MFSA 2014-37 Out of bounds read while decoding JPG images
+ MFSA 2014-36 Web Audio memory corruption issues
+ MFSA 2014-34 Miscellaneous memory safety hazards
- New version
- Security fixes:
+ MFSA 2014-32 Out-of-bounds write through TypedArrayObject after neutering
+ MFSA 2014-31 Out-of-bounds read/write through neutering ArrayBuffer objects
+ MFSA 2014-30 Use-after-free in TypeObject
+ MFSA 2014-29 Privilege escalation using WebIDL-implemented APIs
+ MFSA 2014-28 SVG filters information disclosure through feDisplacementMap
+ MFSA 2014-27 Memory corruption in Cairo during PDF font rendering
+ MFSA 2014-26 Information disclosure through polygon rendering in MathML
+ MFSA 2014-23 Content Security Policy for data: documents not preserved by session restore
+ MFSA 2014-22 WebGL content injection from one domain to rendering in another
+ MFSA 2014-20 onbeforeunload and Javascript navigation DOS
+ MFSA 2014-19 Spoofing attack on WebRTC permission prompt
+ MFSA 2014-18 crypto.generateCRMFRequest does not validate type of key
+ MFSA 2014-17 Out of bounds read during WAV file decoding
+ MFSA 2014-16 Files extracted during updates are not always read only
+ MFSA 2014-15 Miscellaneous memory safety hazards
- New version
- Security fixes:
+ MFSA 2014-13 Inconsistent JavaScript handling of access to Window objects
+ MFSA 2014-12 NSS ticket handling issues
+ MFSA 2014-11 Crash when using web workers with asm.js
+ MFSA 2014-09 Cross-origin information leak through web workers
+ MFSA 2014-08 Use-after-free with imgRequestProxy and image proccessing
+ MFSA 2014-07 XSLT stylesheets treated as styles in Content Security Policy
+ MFSA 2014-05 Information disclosure with *FromPoint on iframes
+ MFSA 2014-04 Incorrect use of discarded images by RasterImage
+ MFSA 2014-03 UI selection timeout missing on download prompts
+ MFSA 2014-02 Clone protected content with XBL scopes
+ MFSA 2014-01 Miscellaneous memory safety hazards - Disable firstrun page show
- New version of Seamonkey 2.23
- Security fixes since 2.21:
+ MFSA 2013-117 Mis-issued ANSSI/DCSSI certificate
+ MFSA 2013-116 JPEG information leak
+ MFSA 2013-115 GetElementIC typed array stubs can be generated outside observed typesets
+ MFSA 2013-114 Use-after-free in synthetic mouse movement
+ MFSA 2013-113 Trust settings for built-in roots ignored during EV certificate validation
+ MFSA 2013-112 Linux clipboard information disclosure though selection paste
+ MFSA 2013-111 Segmentation violation when replacing ordered list elements
+ MFSA 2013-110 Potential overflow in JavaScript binary search algorithms
+ MFSA 2013-109 Use-after-free during Table Editing
+ MFSA 2013-108 Use-after-free in event listeners
+ MFSA 2013-107 Sandbox restrictions not applied to nested object elements
+ MFSA 2013-106 Character encoding cross-origin XSS attack
+ MFSA 2013-104 Miscellaneous memory safety hazards
+ MFSA 2013-102 Use-after-free in HTML document templates
+ MFSA 2013-101 Memory corruption in workers
+ MFSA 2013-100 Miscellaneous use-after-free issues found through ASAN fuzzing
+ MFSA 2013-98 Use-after-free when updating offline cache
+ MFSA 2013-97 Writing to cycle collected object during image decoding
+ MFSA 2013-96 Improperly initialized memory and overflows in some JavaScript functions
+ MFSA 2013-95 Access violation with XSLT and uninitialized data
+ MFSA 2013-94 Spoofing addressbar though SELECT element
+ MFSA 2013-93 Miscellaneous memory safety hazards - Disable Enigmail extension (ALT #29678)
- New version 2.21
- Security fixes:
+ MFSA 2013-92 GC hazard with default compartments and frame chain restoration
+ MFSA 2013-91 User-defined properties on DOM proxies get the wrong "this" object
+ MFSA 2013-90 Memory corruption involving scrolling
+ MFSA 2013-89 Buffer overflow with multi-column, lists, and floats
+ MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes
+ MFSA 2013-85 Uninitialized data in IonMonkey
+ MFSA 2013-83 Mozilla Updater does not lock MAR file after signature verification
+ MFSA 2013-82 Calling scope for new Javascript objects can lead to memory corruption
+ MFSA 2013-81 Use-after-free with select element
+ MFSA 2013-80 NativeKey continues handling key messages after widget is destroyed
+ MFSA 2013-79 Use-after-free in Animation Manager during stylesheet cloning
+ MFSA 2013-78 Integer overflow in ANGLE library
+ MFSA 2013-77 Improper state in HTML5 Tree Builder with templates
+ MFSA 2013-76 Miscellaneous memory safety hazards - Add build requires of Gstreamer
- New version 2.20
- Security fixes:
- MFSA 2013-75 Local Java applets may read contents of local file system
- MFSA 2013-73 Same-origin bypass with web workers and XMLHttpRequest
- MFSA 2013-72 Wrong principal used for validating URI for some Javascript components
- MFSA 2013-70 Bypass of XrayWrappers using XBL Scopes
- MFSA 2013-69 CRMF requests allow for code execution and XSS attacks
- MFSA 2013-68 Document URI misrepresentation and masquerading
- MFSA 2013-67 Crash during WAV audio file decoding
- MFSA 2013-65 Buffer underflow when generating CRMF requests
- MFSA 2013-64 Use after free mutating DOM during SetBody
- MFSA 2013-63 Miscellaneous memory safety hazards
- Drop deprecated seamonkey-disable-cairo.patch
- New version 2.19
- Set SHELL environment variable explicitly
- Update Enigmail to 1.5.2
- New version 2.17.1
- Security fixes:
- MFSA 2013-40 Out-of-bounds array read in CERT_DecodeCertPackage
- MFSA 2013-39 Memory corruption while rendering grayscale PNG images
- MFSA 2013-38 Cross-site scripting (XSS) using timed history navigations
- MFSA 2013-37 Bypass of tab-modal dialog origin disclosure
- MFSA 2013-36 Bypass of SOW protections allows cloning of protected nodes
- MFSA 2013-35 WebGL crash with Mesa graphics driver on Linux
- MFSA 2013-34 Privilege escalation through Mozilla Updater
- MFSA 2013-31 Out-of-bounds write in Cairo library
- MFSA 2013-30 Miscellaneous memory safety hazards
- MFSA 2013-29 Use-after-free in HTML Editor
- MFSA 2013-28 Use-after-free, out of bounds read, and buffer overflow issues found using Address Sanitizer
- MFSA 2013-27 Phishing on HTTPS connection through malicious proxy
- MFSA 2013-26 Use-after-free in nsImageLoadingContent
- MFSA 2013-25 Privacy leak in JavaScript Workers
- MFSA 2013-24 Web content bypass of COW and SOW security wrappers
- MFSA 2013-23 Wrapped WebIDL objects can be wrapped again
- MFSA 2013-22 Out-of-bounds read in image rendering
- MFSA 2013-21 Miscellaneous memory safety hazards
- Build with libarchive-devel instead of libarchive
- New version 2.15.2
- Fix build.
- Add to seamonkey-lightning, seamonkey-devel a strict dependency on seamonkey.
- Remove recursive build dependency.
- New version seamonkey (2.15.1)
- New version enigmail (1.5.0)
- New version seamonkey (2.14.1)
- New version seamonkey (2.14)
- New version enigmail (1.4.6)
- New version seamonkey (2.13.2) (Closes: 27764)
- New version seamonkey (2.13.1) (tnx legion@)
- New version enigmail (1.4.5)
- Build with rpm-build-seamonkey (external build macros)
- Added devel packages
- NMU (by repocop). See http://www.altlinux.org/Tools/Repocop
- applied repocop fixes:
* beehive-log-dependency-needs-epoch-x86_64 for seamonkey
* postclean-03-private-rpm-macros for the spec file
- New version seamonkey (2.8)
- Fixed automatic install from specific locations (tnx legion@)
- New version enigmail (1.4)
- New version seamonkey (2.7)
- New version enigmail (1.3.5)
- Added seamonkey-lightning package
- Rebuilt with libvpx.so.1.
- New version seamonkey (2.5)
- New version enigmail (1.3.3)
- New version (2.4.1)
- New version (2.3.3)
- New version (2.3.2)
- New version (2.3.1)
- Provides: seamonkey-devel
- New version (2.3)
- New version (2.2)
- New version (2.0.14)
- Thanks legion@!