openbsd-ports/www/firefox35/patches/patch-browser_app_profile_firefox_js
naddy 939a18fbbc SECURITY update to 3.5.9:
MFSA 2010-24  XMLDocument::load() doesn't check nsIContentPolicy
MFSA 2010-23 Image src redirect to mailto: URL opens email editor
MFSA 2010-22 Update NSS to support TLS renegotiation indication
MFSA 2010-20 Chrome privilege escalation via forced URL drag and drop
MFSA 2010-19 Dangling pointer vulnerability in nsPluginArray
MFSA 2010-18 Dangling pointer vulnerability in nsTreeContentView
MFSA 2010-17 Remote code execution with use-after-free in nsTreeSelection
MFSA 2010-16 Crashes with evidence of memory corruption
2010-03-31 15:56:44 +00:00

47 lines
2.2 KiB
Plaintext

$OpenBSD: patch-browser_app_profile_firefox_js,v 1.3 2010/03/31 15:56:45 naddy Exp $
--- browser/app/profile/firefox.js.orig Mon Mar 15 15:53:41 2010
+++ browser/app/profile/firefox.js Tue Mar 30 23:35:40 2010
@@ -92,7 +92,7 @@ pref("browser.dictionaries.download.url", "https://%LO
// App-specific update preferences
// Whether or not app updates are enabled
-pref("app.update.enabled", true);
+pref("app.update.enabled", false);
// This preference turns on app.update.mode and allows automatic download and
// install to take place. We use a separate boolean toggle for this to make
@@ -546,7 +546,7 @@ pref("plugin.default_plugin_disabled", true);
pref("pfs.datasource.url", "https://pfs.mozilla.org/plugins/PluginFinderService.php?mimetype=%PLUGIN_MIMETYPE%&appID=%APP_ID%&appVersion=%APP_VERSION%&clientOS=%CLIENT_OS%&chromeLocale=%CHROME_LOCALE%&appRelease=%APP_RELEASE%");
// by default we show an infobar message when pages require plugins the user has not installed
-pref("plugins.hide_infobar_for_missing_plugin", false);
+pref("plugins.hide_infobar_for_missing_plugin", true);
#ifdef XP_WIN
pref("browser.preferences.instantApply", false);
@@ -661,10 +661,10 @@ pref("gecko.handlerService.allowRegisterFromDifferentH
#ifdef MOZ_SAFE_BROWSING
// Safe browsing does nothing unless this pref is set
-pref("browser.safebrowsing.enabled", true);
+pref("browser.safebrowsing.enabled", false);
// Prevent loading of pages identified as malware
-pref("browser.safebrowsing.malware.enabled", true);
+pref("browser.safebrowsing.malware.enabled", false);
// Non-enhanced mode (local url lists) URL list to check for updates
pref("browser.safebrowsing.provider.0.updateURL", "http://safebrowsing.clients.google.com/safebrowsing/downloads?client={moz:client}&appver={moz:version}&pver=2.2");
@@ -727,10 +727,8 @@ pref("browser.EULA.version", 3);
pref("browser.rights.version", 3);
pref("browser.rights.3.shown", false);
-#ifdef DEBUG
-// Don't show the about:rights notification in debug builds.
+// Don't show the about:rights notification
pref("browser.rights.override", true);
-#endif
pref("browser.sessionstore.resume_from_crash", true);
pref("browser.sessionstore.resume_session_once", false);