Commit Graph

73 Commits

Author SHA1 Message Date
landry
fd01387962 Switch www/mozilla-firefox to www/mozilla MODULE. Makefile is now much
more sane : 31 insertions(+), 141 deletions(-)
Switch pkg/PLIST to MOZILLA_PROJECT, and correctly patch
config/autoconf.mk.in.
2010-07-09 15:43:54 +00:00
landry
4d98df5567 Update to mozilla-firefox 3.6.6. Fixes a bunch of MFSA, see
http://www.mozilla.org/security/known-vulnerabilities/firefox36.html
The new plugin sandboxing code is disabled because :
- it only supports binary blobs plugins we don't have
- it is an horrible maze of #ifdef linux-apple-win32 coming straight
  from an old version of chromium. Future versions should have better BSD
support..
tested by several on ports@, thanks!
2010-06-28 21:24:22 +00:00
landry
a0e9c9baf1 Remove all patches applying to local copy of nss/nspr, as we now use the
systemwide on (which have all those patches). Don't call autoconf in
nsprpub/ while here, and bump PKGNAME to be on the safe side.
2010-06-16 19:05:40 +00:00
landry
9115e98919 Switch mozilla-firefox to use systemwide nss/nspr, and remove the
corresponding libs from SHARED_LIBS/PLIST. Bump minor and PKGNAME.
Bring in a pair of patches from xulrunner, and add a DIRECTORY variable
as done in xulrunner that is subst'ed in config/autoconf.mk.in.
sthen@ likes.
2010-06-12 15:00:12 +00:00
espie
8666776b2e gcc3 and gcc4 disagree, so put a common cast to make them compile.
(also compile some file with -O1 in moz)
2010-05-10 12:36:09 +00:00
landry
bcce369765 Various cleanups, as done in www/firefox35 :
- use SUBST_CMD instead of perl -pi -e
- use ${LOCALBASE}/${TRUEPREFIX}/${X11BASE} instead of the handpatched
  _XXX_ ones
- harmonize default systemwide plugins/extensions search path to
  lib/mozilla/{plugins,extensions} as done in other mozilla ports
2010-04-28 06:56:38 +00:00
landry
de100a1ff9 Firefox uses its own libpng (for animated png support), and apparently
it breaks loading png icons through gdk_pixbuf_new_from_file as gtk is
linked with systemwide png. This went unnoticed so far as firefox always
shipped a fallback xpm icon, but this is not the case anymore, so now
gtk_window_set_icon_list() is not called anymore, and the window manager
shows the default icon for firefox windows in taskbar/tasklists..
So add graphics/netpbm as a build dependency, do the necessary netpbm
magic in do-install to create the default.xpm from mozicon128.png, and
patch widget/src/gtk2/nsWindow.cpp to not try to load png icons.
While here fix icon path in desktop file, and add a comment about why we
don't use systemwide png.
2010-04-26 22:14:37 +00:00
landry
ad076fd40f Update www/mozilla-firefox from 3.0.19 to 3.6.3, merging the wip done in
www/firefox36 mostly by martynas@ and naddy@.
Note that the java plugin from devel/jdk currently doesn't work with this
version of firefox, in the meantime users really needed it will have to
use www/firefox35.
ok naddy@
2010-04-26 19:55:58 +00:00
naddy
846bed1120 SECURITY update to 3.0.19:
MFSA 2010-20 Chrome privilege escalation via forced URL drag and drop
MFSA 2010-19 Dangling pointer vulnerability in nsPluginArray
MFSA 2010-18 Dangling pointer vulnerability in nsTreeContentView
MFSA 2010-17 Remote code execution with use-after-free in nsTreeSelection
MFSA 2010-16 Crashes with evidence of memory corruption
2010-03-31 15:46:12 +00:00
martynas
84856b7c61 - create downloads dir with mode 0700 instead
- pass --disable-crashreporter
2009-09-18 20:35:27 +00:00
martynas
a21dd6625c - create downloads dir with mode 0700 instead
- pass --disable-crashreporter
2009-09-10 21:34:55 +00:00
martynas
67f1ca01e0 security update to mozilla-firefox-3.0.14. MFSA 2009-51, MFSA
2009-50, MFSA 2009-49, MFSA 2009-48, MFSA 2009-47
http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.14
2009-09-10 21:28:25 +00:00
martynas
f6879d3eef mozilla-firefox-3.0.11 2009-06-11 14:10:37 +00:00
martynas
927ded3beb implement sndio backend and get rid of esound. ok jakemsr@ 2009-05-01 22:53:25 +00:00
martynas
c256bdc4a7 turn off Ignore Scaling and Shrink to fit page width. fixes printing
for beck@.  ok kurt@, "no objections" naddy@
2009-04-22 21:00:23 +00:00
martynas
6dfe2634be security update to mozilla-firefox-3.0.5. MFSA 2008-69; MFSA
2008-68; MFSA 2008-67; MFSA 2008-66; MFSA 2008-65; MFSA 2008-64;
MFSA 2008-63; MFSA 2008-60.
tested by sthen@ and naddy@.  ok naddy@
2008-12-18 19:27:13 +00:00
martynas
9944b0d1c5 it is the right time to update to mozilla-firefox-3.0.4, which has
been tested good enough, and i've fixed all the issues i'm aware
of.  furthermore 2.0 branch has basically reached eol, since there
will be only one minor update (2.0.0.19)
discussed with kurt@, naddy@ and porters
pkgname change handling help naddy@
ok naddy@
2008-11-20 23:41:32 +00:00
martynas
c5067e1a5b security update to mozilla-firefox-2.0.0.18. MFSA 2008-58; MFSA
2008-57; MFSA 2008-56; MFSA 2008-55; MFSA 2008-54; MFSA 2008-53;
MFSA 2008-52; MFSA 2008-50; MFSA 2008-49; MFSA 2008-48; MFSA 2008-47.
http://www.mozilla.org/security/known-vulnerabilities/firefox20.html#firefox2.0.0.18
ok naddy@
2008-11-13 16:57:14 +00:00
martynas
96836d3bb7 use system libm. was ok naddy@, kurt@ 2008-08-19 23:53:45 +00:00
claudio
8c7cca2dc8 Don't overwrite MOZ_PLUGIN_PATH in the startup script if it has been already
been set. This allows to load plugins on demand, especially interesting when
using multiple profiles with the -no-remote option.
OK martynas@
2008-07-20 09:49:00 +00:00
martynas
22f1813fee security update to mozilla-firefox-2.0.0.16. MFSA 2008-35, MFSA 2008-34
ok kurt@, naddy@, bernd@
2008-07-17 16:47:39 +00:00
martynas
9a3396b096 security update to mozilla-firefox-2.0.0.15, fixes MFSA 2008-33,
MFSA 2008-32, MFSA 2008-31, MFSA 2008-30, MFSA 2008-29, MFSA 2008-28,
MFSA 2008-27, MFSA 2008-25, MFSA 2008-24, MFSA 2008-23, MFSA 2008-22,
MFSA 2008-21
http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox2.0.0.15
ok kurt@, naddy@
2008-07-04 13:47:25 +00:00
bernd
1d00ee6e88 Security update to mozilla-firefox-2.0.0.12.
Fixes multiple vulnerabilities:

CVE-2008-0412
CVE-2008-0413
CVE-2008-0414
CVE-2008-0415
CVE-2008-0419
CVE-2008-0591
CVE-2008-0593

More infos:
http://secunia.com/advisories/28758/

Tested by some people on ports@. Thanks!

ok martynas@, laurent@, steven@
2008-02-11 18:13:44 +00:00
martynas
0f165eda60 - security update to mozilla-firefox-2.0.0.10:
http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.10
- fix canvas.drawImage regression.
ok kurt@, kili@
2007-11-28 20:22:25 +00:00
martynas
dd58cf6c31 security update to mozilla-firefox-2.0.0.8:
http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.8
ok kurt@, naddy@
2007-10-23 20:13:26 +00:00
kurt
9e80ec3311 - fix a 64-bit problem with the LiveConnect feature. From mozilla
bug report: https://bugzilla.mozilla.org/show_bug.cgi?id=345866
  Eventually the java plugin will need this on amd64. okay martynas@
2007-10-14 18:33:09 +00:00
martynas
17c3fae17a - set fd soft limit to 128 if it's lower: helps for people who
upgraded and didn't use mergemaster;
- remove lines, related to debug build and fd in README.OpenBSD;
help from sturm@, kurt@, espie@, naddy@
ok kurt@, sturm@
2007-06-12 16:45:37 +00:00
martynas
819930f960 security update to mozilla-firefox-2.0.0.4
http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.4

- WANTLIB for xenocara;
- use the combination of find(1) and install(1) to install the
{DATA,DIST}FILES, as suggested by kurt@;
- remove the two patches that are already upstream;
- fmt;

ok kurt@, naddy@
2007-06-01 08:03:42 +00:00
martynas
2aab7d2ee3 - make it check LOCALBASE/share/mozilla-dicts, the global dictionaries
location for all mozilla ports;
- regen patches (due to the current changes);
- bump pkgname;
discussed with naddy@, kurt@, ajacoutot@
ok naddy@
2007-04-06 14:33:36 +00:00
martynas
84e3b38b98 remove patch-widget_src_gtk_nsSound_cpp, because
patch-widget_src_gtk2_nsSound_cpp does the job.
no pkgname bump -- the file was not being compiled.
ok wilfried@
2007-04-03 10:56:13 +00:00
martynas
076c6a6f95 - update to 2.0.0.3;
- don't force -Os;
ok naddy@, kurt@
2007-03-27 16:04:37 +00:00
robert
d3d161c7d9 - update to version 2.0.0.2 and apply several security fixes,
therefore bump the PKGNAME to p0 now;
- enable official branding by default
- fix some WANTLIB markers

work done by Martynas Venckus; thanks.

tested by many many people; ok pvalchev@
2007-03-01 22:46:06 +00:00
robert
c3922e86f6 implement xptcinvoke and xptcstubs for arm based on the linux code,
and fix an endianess issue that makes minimo work on arm based
architectures; bump PKGNAME
2007-02-26 14:21:26 +00:00
sturm
dfae7fe22c fix live bookmarks on sparc64
from Martynas Venckus <martynas at altroot.org>
2007-02-20 20:06:56 +00:00
naddy
6f3f4607cc add man page; from Martynas Venckus <martynas@altroot.org>, ok kurt@ 2007-02-14 22:44:32 +00:00
espie
57b2d0439a resurrect COREXFONTS, so that GDK_USE_XFT works again. Needs linking fixes
(+pangox-1.0).
Adjust README.OpenBSD, and provide a debug flavor
2007-02-05 00:11:55 +00:00
kurt
c07becdd02 - update to 2.0.0.1 from Martynas Venckus <martynas at altroot.org>
- add a -devel sub-package for vlc plugin
input and testing from many - thanks! okay naddy@ pvalchev@
2007-01-12 21:46:17 +00:00
bernd
fa5982a5ac Security update to firefox 1.5.0.9.
More info:
http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox

ok steven@
2006-12-21 09:53:43 +00:00
kurt
adffbb61ca use devel/nspr instead of internal nspr. now using libc strtod and __dtoa
via devel/nspr. okay pvalchev@
2006-11-17 19:14:51 +00:00
wilfried
f6e93594db SECURITY update to 1.5.0.8
see http://www.mozilla.org/projects/security/known-vulnerabilities.html
for details
2006-11-10 14:15:49 +00:00
steven
4b337b355c SECURITY update to firefox 1.5.0.7
see http://www.mozilla.org/projects/security/known-vulnerabilities.html
for details

ok bernd@
2006-09-17 21:02:58 +00:00
bernd
1498df97f8 Security update to mozilla-firefox-1.5.0.5.
This update fixes multiple security vulnerabilities.

For detailed information see:

http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox1.5.0.5

ok steven@
2006-07-31 09:32:19 +00:00
bernd
682eb24b83 Security update to mozilla-firefox-1.5.0.4.
Fixes multiple security vulnerabilities. For detailed information see:

http://secunia.com/advisories/20376/
http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox1.5.0.4

ok steven@
2006-06-05 09:30:06 +00:00
bernd
3bbe03aff4 Update to 1.5.0.3. Security fixes inside...
More info:

CVE-2006-1993
http://secunia.com/advisories/19802/

tested by many
"go ahead" jolan@
2006-05-05 10:14:21 +00:00
pvalchev
9cbf189d5c check XftLockFace() for NULL return to avoid a crash, see
https://bugzilla.mozilla.org/show_bug.cgi?id=331077
from Tobias Ulmer <tobiasu@tmux.org>
2006-03-27 04:23:28 +00:00
wilfried
4c685774b5 Firefox 1.5.0.1 is a stability-and-security update to Firefox 1.5.
It also includes a number of low-risk fixes for other types of bugs.
2006-02-06 08:21:53 +00:00
kurt
5454dfe735 - Fix startup DoS. overlong document.title setting can corrupt history
data, causing non-responsive temporary hang on subsequent startups
patches from https://bugzilla.mozilla.org/show_bug.cgi?id=319004
- Fix use after free segfault after printing reported by Andy Wingate.
FT_Done_Face was being called twice on the same mFace.
2005-12-21 15:33:00 +00:00
bernd
1ea3eea498 Update to Firefox 1.5.
Team work by wilfried@, kurt@ and me.

Tested by many. Thanks a lot!

ok kurt@ krw@ jolan@ ian@ pvalchev@
2005-12-20 23:44:00 +00:00
pvalchev
63607b50b1 Fix a crash in prdtoa.c:mult() where there is an off-by-some bytes
in memory accessed during some very fucked up pointer acrobatics.
Allocate 2 bytes extra for that case, which seems to be a
sufficient hack to keep this working.

Debugged by me with minimo on zaurus/arm (pain!), seen also by krw@
and others on amd64, who helped with testing.  Due to random malloc
this of course did not show up everywhere all the time.
2005-11-03 00:59:43 +00:00
naddy
79f5804452 Mozilla.org bug 210658:
Fix hanging with non-standard HTML elements parsererror, sourcetext.
ok wilfried@
2005-10-19 13:08:12 +00:00