This is the current release of the Seamonkey open source web browser. It should
be fully compliant with all W3C standards, including HTML, CSS, XML, XSL,
JavaScript, MathML, SSL encryption, SVG and RDF. Also supports Java with
the use of the FreeBSD native Java plug-in.
This is the latest bleeding edge release. Beware that you'll probably find
bugs here, so if you value stability, try www/mozilla.
WWW: http://www.mozilla.org/projects/seamonkey/
Repocopied by: marcus
- Add Makefile.common
o A new build/install system for gecko ports, Makefile.common
includes many generic routines and common tasks.
o Fix ld-run-path in all gecko's by using -Wl,-rpath,${moz_libdir}
thus removing the need to have a startup script for ports that
depend on gecko. [2]
o Use system libm, nss, nspr in all gecko ports
- Add bsd.gecko.mk
o This is the predecessor to WITH_MOZILLA=[mozilla|firefox|...]
with a more robust way of detecting a gecko a end user wishs to
use.
o bsd.gecko.mk abstracts the selection of gecko-based backends. It
allows users and porters to support any available gecko backend
without needing to build many conditional tests. ${USE_GECKO} is the
list of backends that your port can handle, and ${GECKO} is set by
bsd.gecko.mk to be the chosen backend. Users set ${WITH_GECKO} to the
list of gecko backends they want on their system.
Port Makefile example:
USE_GECKO=firefox mozilla seamonkey thunderbird
.include <bsd.port.pre.mk>
.include "${.CURDIR}/../../www/mozilla/bsd.gecko.mk"
End user example:
WITH_GECKO=seamonkey firefox
We highly recommend moving away from using WITH_MOZILLA and switching to
USE/WITH_GECKO.
PR: 89052 [2]
Submitted by: vs [2]
Obtained from: www/firefox
Thanks to: adamw, marcus, and mezz for ideas, bug squashing, and more
sajd from irc.freenode.org/#FreeBSD-Gnome for
pointing out many bugs
- Fix detection of OpenSSL if world is build with NO_OPENSSL [2]
Submitted by: delphij [1], Artis Caune <Artis.Caune@latnet.lv> [2]
PR: ports/89709 [1], ports/89370 [2]
Approved by: Hendrik Scholz <hscholz@raisdorf.net> (maintainer) [1, 2]
It fixes 6 Security Vunerabilities:
Critical Level Threats
Potentional XSS injection through GET and other variables
- Affects all previous versions of Joomla! and Mambo 4.5.2.3
Hardened SEF against XSS injection
- Affects all previous versions of Joomla! and Mambo 4.5.2.3
Low Level Threats
Potential SQL injection in Polls modules through the Itemid variable
- Affects all previous versions of Joomla! and Mambo 4.5.2.x series
Potential SQL injection in several methods in mosDBTable class
- Affects all previous versions of Joomla! and Mambo 4.5.2.x series
Potential misuse of Media component file management functions
- Affects all previous versions of Joomla! and Mambo 4.5.2.x series
Add search limit param (default of 50) to `Search` Mambots to prevent search flooding
- Affects all previous versions of Joomla! and Mambo 4.5.2.x series
PR: ports/89596
Submitted by: Francisco Alves Cabrita (maintainer)
- from Changes
! Changed method of setting content_type [cpan #13854] which broke between
Spiffy 0.22 and 0.24.
! Code reformatted using perltidy.
- add SHA256 checksum