Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

seamonkey-2.49.4-lp152.2.71 RPM for x86_64

From OpenSuSE Leap 15.2 for x86_64

Name: seamonkey Distribution: openSUSE Leap 15.2
Version: 2.49.4 Vendor: openSUSE
Release: lp152.2.71 Build date: Tue Jun 9 10:50:16 2020
Group: Productivity/Networking/Web/Browsers Build host: lamb61
Size: 112339981 Source RPM: seamonkey-2.49.4-lp152.2.71.src.rpm
Packager: https://bugs.opensuse.org
Url: https://www.seamonkey-project.org/
Summary: An integrated web browser, composer, mail/news client, and IRC client
SeaMonkey is an all-in-one Internet application suite containing a
web browser, an e-mail and newsgroup client with an included web feed
reader, an HTML editor and web development tools, and an IRC client.
SeaMonkey is a successor to the popular Netscape Communicator and
Mozilla Application Suite, and (unlike its siblings, Firefox and
Thunderbird) retains Mozilla's more traditional-looking interface.
Many Firefox and Thunderbird extensions are compatible with SeaMonkey.

Provides

Requires

License

MPL-2.0

Changelog

* Fri Jul 13 2018 wr@rosenauer.org
  - update to Seamonkey 2.49.4
    * Gecko 52.9.1esr (bsc#1098998)
    MFSA 2018-16 (bsc#1098998)
    * CVE-2018-12359 (bmo#1459162)
      Buffer overflow using computed size of canvas element
    * CVE-2018-12360 (bmo#1459693)
      Use-after-free when using focus()
    * CVE-2018-12362 (bmo#1452375)
      Integer overflow in SSSE3 scaler
    * CVE-2018-5156 (bmo#1453127)
      Media recorder segmentation fault when track type is changed during capture
    * CVE-2018-12363 (bmo#1464784)
      Use-after-free when appending DOM nodes
    * CVE-2018-12364 (bmo#1436241)
      CSRF attacks through 307 redirects and NPAPI plugins
    * CVE-2018-12365 (bmo#1459206)
      Compromised IPC child process can list local filenames
    * CVE-2018-12366 (bmo#1464039)
      Invalid data handling during QCMS transformations
    * CVE-2018-5188 (bmo#1456189,bmo#1456975,bmo#1465898,bmo#1392739,
      bmo#1451297,bmo#1464063,bmo#1437842,bmo#1442722,bmo#1452576,
      bmo#1450688,bmo#1458264,bmo#1458270,bmo#1465108,bmo#1464829,
      bmo#1464079,bmo#1463494,bmo#1458048)
      Memory safety bugs fixed in Firefox 60, Firefox ESR 60.1, and Firefox ESR 52.9
  - localizations finally included again (boo#1062195)
* Thu Jun 07 2018 bjorn.lie@gmail.com
  - Add conditional for pkgconfig(gconf-2.0) BuildRequires, and pass
    conditional --disable-gconf to configure: no longer pull in
    obsolete gconf2 for Tumbleweed.
* Tue Jun 05 2018 psychonaut@nothingisreal.com
  - update spec file summary and description to more accurately
    reflect what SeaMonkey is, giving less prominence to the long-
    discontinued Mozilla Application Suite that many users may no
    longer be familiar with
  - update project URL in spec file
* Sat Mar 03 2018 wr@rosenauer.org
  - update to Seamonkey 2.49.2
    * Gecko 52.6esr (including security relevant fixes) (bsc#1077291)
    * fix issue in Composer
    * With some themes, the menulist- and history-dropmarker didn't show
    * Scrollbars didn't show the buttons
    * WebRTC has been disabled by default. It needs an add-on to enable it per site
    * The active title bar was not visually emphasized
  - correct requires and provides handling (boo#1076907)
* Tue Jan 09 2018 wr@rosenauer.org
  - Explicitly buildrequires python2-xml: The build system relies on
    it. We wrongly relied on other packages pulling it in for us.
  - use parallel compression in create-tar if available
  - use XZ instead of BZ2 for source archives
  - import upstream patch mozilla-bmo1338655.patch to fix failing
    build
* Thu Dec 07 2017 dimstar@opensuse.org
  - Escape the usage of %{VERSION} when calling out to rpm.
    RPM 4.14 has %{VERSION} defined as 'the main packages version'.
* Fri Nov 10 2017 zaitor@opensuse.org
  - Drop obsolete libgnomeui-devel BuildRequires: No longer needed.
  - Following the above, add explicit pkgconfig(gconf-2.0),
    pkgconfig(gobject-2.0)pkgconfig(gdk-x11-2.0), pkgconfig(gtk+-2.0)
    and pkgconfig(gtk+-unix-print-2.0) BuildRequires: previously
    pulled in by libgnomeui-devel, and is what configure really
    checks for.
* Fri Aug 04 2017 wr@rosenauer.org
  - update to Seamonkey 2.48
    * based on Gecko 51.0.3
    * requires NSPR 4.13.1 and NSS 3.28.5 (aligned with 52ESR)
  - removed obsolete (upstreamed) patches
    * mozilla-http2-ecdh-keybits.patch
    * mozilla-sed43.patch
    * mozilla-flex_buffer_overrun.patch
    * mozilla-shared-nss-db.patch (feature dropped from SM due to
      maintenance costs vs. usefulness)
    * mozilla-binutils-visibility.patch
    * mozilla-check_return.patch
    * mozilla-skia-overflow.patch
  - rebased patches
* Sun Feb 12 2017 wr@rosenauer.org
  - fix configure with for sed >= 4.3 (boo#1020631) (mozilla-sed43.patch)
* Tue Jan 24 2017 wr@rosenauer.org
  - improve recognition of LANGUAGE env variable (boo#1017174)
  - update minimum keybits in H2 so it allows a smaller value
    (e.g. for curve25519 as supported with NSS 3.28) (bmo#1290037)
    (boo#1021636) (mozilla-http2-ecdh-keybits.patch)
* Fri Dec 23 2016 wr@rosenauer.org
  - update to Seamonkey 2.46
    * based on Gecko 49.0.2
    * Chatzilla and DOM Inspector were removed/disabled and therefore
      those subpackages are not available at this moment
  - requires NSPR 4.12 and NSS 3.25
  - removed obsolete patches
    * mozilla-libproxy.patch
    * mozilla-gcc6.patch
    * mozilla-openaes-decl.patch
  - rebased patches
  - added patches imported from Firefox 49:
    * mozilla-check_return.patch
    * mozilla-flex_buffer_overrun.patch
    * mozilla-skia-overflow.patch
* Mon Oct 17 2016 wr@rosenauer.org
  - mozilla-binutils-visibility.patch to fix build issues with
    gcc/binutils combination used in Leap 42.2 (boo#984637)
* Sun Aug 21 2016 antoine.belvire@laposte.net
  - Build also with fno-lifetime-dse and fno-schedule-insns2 for GCC6
    (still boo#991027)
  - Check compiler version instead of openSUSE version for this
* Mon Aug 08 2016 wr@rosenauer.org
  - build with -fno-delete-null-pointer-checks for Tumbleweed/gcc6
    as long as underlying issues have been addressed upstream
    (boo#991027)
* Fri Aug 05 2016 pcerny@suse.com
  - Fix for possible buffer overrun (bsc#990856)
    CVE-2016-6354 (bmo#1292534)
    [mozilla-flex_buffer_overrun.patch]
* Tue Jul 26 2016 badshah400@gmail.com
  - Add appstream metainfo files as a tar.bz2 source
    (seamonkey-appdata.tar.bz2) and install these appdata.xml files
    to the appdata dir (/usr/share/appdata); with these appdata
    files installed, seamonkey shows up in appstores like GNOME
    software and KDE Discover.
* Sun Jul 17 2016 badshah400@gmail.com
  - Add mozilla-gcc6.patch to fix building with gcc >= 6.0.
* Sat Mar 05 2016 wr@rosenauer.org
  - fix build problems on i586, caused by too large unified compile
    units - adding mozilla-reduce-files-per-UnifiedBindings.patch
  - increased _constraints as required
* Tue Jan 19 2016 wr@rosenauer.org
  - update to Seamonkey 2.40 (bnc#959277)
    * requires NSS 3.20.2 to fix
      MFSA 2015-150/CVE-2015-7575 (bmo#1158489)
      MD5 signatures accepted within TLS 1.2 ServerKeyExchange in
      server signature
    * MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
      Miscellaneous memory safety hazards
    * MFSA 2015-135/CVE-2015-7204 (bmo#1216130)
      Crash with JavaScript variable assignment with unboxed objects
    * MFSA 2015-136/CVE-2015-7207 (bmo#1185256)
      Same-origin policy violation using perfomance.getEntries and
      history navigation
    * MFSA 2015-137/CVE-2015-7208 (bmo#1191423)
      Firefox allows for control characters to be set in cookies
    * MFSA 2015-138/CVE-2015-7210 (bmo#1218326)
      Use-after-free in WebRTC when datachannel is used after being
      destroyed
    * MFSA 2015-139/CVE-2015-7212 (bmo#1222809)
      Integer overflow allocating extremely large textures
    * MFSA 2015-140/CVE-2015-7215 (bmo#1160890)
      Cross-origin information leak through web workers error events
    * MFSA 2015-141/CVE-2015-7211 (bmo#1221444)
      Hash in data URI is incorrectly parsed
    * MFSA 2015-142/CVE-2015-7218/CVE-2015-7219 (bmo#1194818, bmo#1194820)
      DOS due to malformed frames in HTTP/2
    * MFSA 2015-143/CVE-2015-7216/CVE-2015-7217 (bmo#1197059, bmo#1203078)
      Linux file chooser crashes on malformed images due to flaws in
      Jasper library
    * MFSA 2015-144/CVE-2015-7203/CVE-2015-7220/CVE-2015-7221
      (bmo#1201183, bmo#1178033, bmo#1199400)
      Buffer overflows found through code inspection
    * MFSA 2015-145/CVE-2015-7205 (bmo#1220493)
      Underflow through code inspection
    * MFSA 2015-146/CVE-2015-7213 (bmo#1206211)
      Integer overflow in MP4 playback in 64-bit versions
    * MFSA 2015-147/CVE-2015-7222 (bmo#1216748)
      Integer underflow and buffer overflow processing MP4 metadata in
      libstagefright
    * MFSA 2015-148/CVE-2015-7223 (bmo#1226423)
      Privilege escalation vulnerabilities in WebExtension APIs
    * MFSA 2015-149/CVE-2015-7214 (bmo#1228950)
      Cross-site reading attack through data and view-source URIs
  - rebased patches
  - buildrequire xcomposite now explicitely
* Thu Nov 05 2015 wr@rosenauer.org
  - update to Seamonkey 2.39 (bnc#952810)
    * MFSA 2015-116/CVE-2015-4513/CVE-2015-4514
      Miscellaneous memory safety hazards
    * MFSA 2015-117/CVE-2015-4515 (bmo#1046421)
      Information disclosure through NTLM authentication
    * MFSA 2015-118/CVE-2015-4518 (bmo#1182778, bmo#1136692)
      CSP bypass due to permissive Reader mode whitelist
    * MFSA 2015-119/CVE-2015-7185 (bmo#1149000) (Android only)
      Firefox for Android addressbar can be removed after fullscreen mode
    * MFSA 2015-120/CVE-2015-7186 (bmo#1193027) (Android only)
      Reading sensitive profile files through local HTML file on Android
    * MFSA 2015-121/CVE-2015-7187 (bmo#1195735)
      disabling scripts in Add-on SDK panels has no effect
    * MFSA 2015-122/CVE-2015-7188 (bmo#1199430)
      Trailing whitespace in IP address hostnames can bypass same-origin policy
    * MFSA 2015-123/CVE-2015-7189 (bmo#1205900)
      Buffer overflow during image interactions in canvas
    * MFSA 2015-124/CVE-2015-7190 (bmo#1208520) (Android only)
      Android intents can be used on Firefox for Android to open privileged files
    * MFSA 2015-125/CVE-2015-7191 (bmo#1208956) (Android only)
      XSS attack through intents on Firefox for Android
    * MFSA 2015-126/CVE-2015-7192 (bmo#1210023) (OS X only)
      Crash when accessing HTML tables with accessibility tools on OS X
    * MFSA 2015-127/CVE-2015-7193 (bmo#1210302)
      CORS preflight is bypassed when non-standard Content-Type headers
      are received
    * MFSA 2015-128/CVE-2015-7194 (bmo#1211262)
      Memory corruption in libjar through zip files
    * MFSA 2015-129/CVE-2015-7195 (bmo#1211871)
      Certain escaped characters in host of Location-header are being
      treated as non-escaped
    * MFSA 2015-130/CVE-2015-7196 (bmo#1140616)
      JavaScript garbage collection crash with Java applet
    * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
      (bmo#1188010, bmo#1204061, bmo#1204155)
      Vulnerabilities found through code inspection
    * MFSA 2015-132/CVE-2015-7197 (bmo#1204269)
      Mixed content WebSocket policy bypass through workers
    * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
      (bmo#1202868, bmo#1205157)
      NSS and NSPR memory corruption issues
      (fixed in mozilla-nspr and mozilla-nss packages)
  - requires NSPR >= 4.10.10 and NSS >= 3.19.4
  - removed obsolete patches
    * mozilla-icu-strncat.patch
  - fixed build with enable-libproxy (bmo#1220399)
    * mozilla-libproxy.patch
* Thu Oct 01 2015 wr@rosenauer.org
  - update to SeaMonkey 2.38 (bnc#947003)
    * based on 41.0.1
    * MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
      Miscellaneous memory safety hazards
    * MFSA 2015-97/CVE-2015-4503 (bmo#994337)
      Memory leak in mozTCPSocket to servers
    * MFSA 2015-98/CVE-2015-4504 (bmo#1132467)
      Out of bounds read in QCMS library with ICC V4 profile attributes
    * MFSA 2015-100/CVE-2015-4505 (bmo#1177861) (Windows only)
      Arbitrary file manipulation by local user through Mozilla updater
    * MFSA 2015-101/CVE-2015-4506 (bmo#1192226)
      Buffer overflow in libvpx while parsing vp9 format video
    * MFSA 2015-102/CVE-2015-4507 (bmo#1192401)
      Crash when using debugger with SavedStacks in JavaScript
    * MFSA 2015-104/CVE-2015-4510 (bmo#1200004)
      Use-after-free with shared workers and IndexedDB
    * MFSA 2015-105/CVE-2015-4511 (bmo#1200148)
      Buffer overflow while decoding WebM video
    * MFSA 2015-106/CVE-2015-4509 (bmo#1198435)
      Use-after-free while manipulating HTML media content
    * MFSA 2015-107/CVE-2015-4512 (bmo#1170390)
      Out-of-bounds read during 2D canvas display on Linux 16-bit
      color depth systems
    * MFSA 2015-108/CVE-2015-4502 (bmo#1105045)
      Scripted proxies can access inner window
    * MFSA 2015-109/CVE-2015-4516 (bmo#904886)
      JavaScript immutable property enforcement can be bypassed
    * MFSA 2015-110/CVE-2015-4519 (bmo#1189814)
      Dragging and dropping images exposes final URL after redirects
    * MFSA 2015-111/CVE-2015-4520 (bmo#1200856, bmo#1200869)
      Errors in the handling of CORS preflight request headers
    * MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522/
      CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177/
      CVE-2015-7180
      Vulnerabilities found through code inspection
    * MFSA 2015-113/CVE-2015-7178/CVE-2015-7179 (bmo#1189860,
      bmo#1190526) (Windows only)
      Memory safety errors in libGLES in the ANGLE graphics library
    * MFSA 2015-114 (bmo#1167498, bmo#1153672) (Windows only)
      Information disclosure via the High Resolution Time API
  - removed obsolete patch
    * mozilla-add-glibcxx_use_cxx11_abi.patch
  - added mozilla-no-stdcxx-check.patch
* Sat Aug 29 2015 wr@rosenauer.org
  - update to SeaMonkey 2.35 (bnc#935979)
    * based on 38.1.1esr
    * requires NSPR 4.10.8 and NSS 3.19.2
  - removed obsolete patches
    * mozilla-visitSubstr.patch
    * mozilla-undef-CONST.patch
    * mozilla-reintroduce-pixman-code-path.patch
    * mozilla-fix-prototype.patch
    * mozilla-disable-JEMALLOC_STATIC_SIZES-on-ppc.patch
  - renamed mozilla-add-D_GLIBCXX_USE_CXX11_ABI-0-to-CXXFLAG.patch
    to mozilla-add-glibcxx_use_cxx11_abi.patch (sync with Firefox)
  - dropped mozilla-prefer_plugin_pref.patch as this feature is
    likely not worth maintaining further
* Sat Jun 27 2015 antoine.belvire@laposte.net
  - Fix compilation issues:
    * Add mozilla-add-D_GLIBCXX_USE_CXX11_ABI-0-to-CXXFLAG.patch (bmo#1153109)
    * Add mozilla-reintroduce-pixman-code-path.patch (bmo#1136958)
    * Add mozilla-visitSubstr.patch (bmo#1108834)
    * Add mozilla-undef-CONST.patch (bmo#1111395)
    * Add mozilla-disable-JEMALLOC_STATIC_SIZES-on-ppc.patch
* Sun Mar 22 2015 wr@rosenauer.org
  - update to SeaMonkey 2.33.1 (bnc#923534)
    * MFSA 2015-28/CVE-2015-0818 (bmo#1144988)
      Privilege escalation through SVG navigation
    * MFSA 2015-29/CVE-2015-0817 (bmo#1145255)
      Code execution through incorrect JavaScript bounds checking
      elimination
* Mon Mar 16 2015 wr@rosenauer.org
  - update to SeaMonkey 2.33 (bnc#917597)
    * MFSA 2015-11/CVE-2015-0835/CVE-2015-0836
      Miscellaneous memory safety hazards
    * MFSA 2015-12/CVE-2015-0833 (bmo#945192)
      Invoking Mozilla updater will load locally stored DLL files
      (Windows only)
    * MFSA 2015-13/CVE-2015-0832 (bmo#1065909)
      Appended period to hostnames can bypass HPKP and HSTS protections
    * MFSA 2015-14/CVE-2015-0830 (bmo#1110488)
      Malicious WebGL content crash when writing strings
    * MFSA 2015-15/CVE-2015-0834 (bmo#1098314)
      TLS TURN and STUN connections silently fail to simple TCP connections
    * MFSA 2015-16/CVE-2015-0831 (bmo#1130514)
      Use-after-free in IndexedDB
    * MFSA 2015-17/CVE-2015-0829 (bmo#1128939)
      Buffer overflow in libstagefright during MP4 video playback
    * MFSA 2015-18/CVE-2015-0828 (bmo#1030667, bmo#988675)
      Double-free when using non-default memory allocators with a
      zero-length XHR
    * MFSA 2015-19/CVE-2015-0827 (bmo#1117304)
      Out-of-bounds read and write while rendering SVG content
    * MFSA 2015-20/CVE-2015-0826 (bmo#1092363)
      Buffer overflow during CSS restyling
    * MFSA 2015-21/CVE-2015-0825 (bmo#1092370)
      Buffer underflow during MP3 playback
    * MFSA 2015-22/CVE-2015-0824 (bmo#1095925)
      Crash using DrawTarget in Cairo graphics library
    * MFSA 2015-23/CVE-2015-0823 (bmo#1098497)
      Use-after-free in Developer Console date with OpenType Sanitiser
    * MFSA 2015-24/CVE-2015-0822 (bmo#1110557)
      Reading of local files through manipulation of form autocomplete
    * MFSA 2015-25/CVE-2015-0821 (bmo#1111960)
      Local files or privileged URLs in pages can be opened into new tabs
    * MFSA 2015-26/CVE-2015-0819 (bmo#1079554)
      UI Tour whitelisted sites in background tab can spoof foreground
      tabs
    * MFSA 2015-27CVE-2015-0820 (bmo#1125398)
      Caja Compiler JavaScript sandbox bypass
  - rebased patches
  - requires NSS 3.17.4
  - removed obsolete seamonkey-fix-signed-char.patch
  - mozilla-xremote-client was removed upstream
* Sat Feb 07 2015 wr@rosenauer.org
  - update to SeaMonkey 2.32.1
    * fixed MailNews feeds not updating
    * fixed selected profile in Profile Manager not remembered
    * fixed opening a bookmark folder in tabs on Linux
    * fixed Troubleshooting Information (about:support) with the
      Modern theme
* Sat Jan 17 2015 wr@rosenauer.org
  - update to SeaMonkey 2.32 (bnc#910669)
    * MFSA 2015-01/CVE-2014-8634/CVE-2014-8635
      Miscellaneous memory safety hazards
    * MFSA 2015-02/CVE-2014-8637 (bmo#1094536)
      Uninitialized memory use during bitmap rendering
    * MFSA 2015-03/CVE-2014-8638 (bmo#1080987)
      sendBeacon requests lack an Origin header
    * MFSA 2015-04/CVE-2014-8639 (bmo#1095859)
      Cookie injection through Proxy Authenticate responses
    * MFSA 2015-05/CVE-2014-8640 (bmo#1100409)
      Read of uninitialized memory in Web Audio
    * MFSA 2015-06/CVE-2014-8641 (bmo#1108455)
      Read-after-free in WebRTC
    * MFSA 2015-07/CVE-2014-8643 (bmo#1114170) (Windows-only)
      Gecko Media Plugin sandbox escape
    * MFSA 2015-08/CVE-2014-8642 (bmo#1079658)
      Delegated OCSP responder certificates failure with
      id-pkix-ocsp-nocheck extension
    * MFSA 2015-09/CVE-2014-8636 (bmo#987794)
      XrayWrapper bypass through DOM objects
  - rebased patches
  - removed obsolete mozilla-seamonkey-sdk.patch
  - added mozilla-openaes-decl.patch to fix implicit declarations
* Thu Jan 01 2015 wr@rosenauer.org
  - use GStreamer 1.0 from 13.2 on
  - removed package support for distributions older than 12.3
    * removed mozilla-sle11.patch
* Mon Dec 08 2014 meissner@suse.com
  - seamonkey-fix-signed-char.patch: fix build on platforms
    where char is unsigned (power/arm). (bmo#1085151)
  - mozilla-fix-prototype.patch: add string.h includes
    for memcpy prototype (as used on bigendian architectures).
* Thu Dec 04 2014 pcerny@suse.com
  - enable some extensions using the addons sdk (e.g. Ghostery)
    (mozilla-seamonkey-sdk.patch) (bmo#1071048)
* Wed Dec 03 2014 wr@rosenauer.org
  - update to SeaMonkey 2.31 (bnc#908009)
    * requires NSS 3.17.2
    * MFSA 2014-83/CVE-2014-1587/CVE-2014-1588
      Miscellaneous memory safety hazards
    * MFSA 2014-84/CVE-2014-1589 (bmo#1043787)
      XBL bindings accessible via improper CSS declarations
    * MFSA 2014-85/CVE-2014-1590 (bmo#1087633)
      XMLHttpRequest crashes with some input streams
    * MFSA 2014-86/CVE-2014-1591 (bmo#1069762)
      CSP leaks redirect data via violation reports
    * MFSA 2014-87/CVE-2014-1592 (bmo#1088635)
      Use-after-free during HTML5 parsing
    * MFSA 2014-88/CVE-2014-1593 (bmo#1085175)
      Buffer overflow while parsing media content
    * MFSA 2014-89/CVE-2014-1594 (bmo#1074280)
      Bad casting from the BasicThebesLayer to BasicContainerLayer
  - rebased patches
* Fri Nov 21 2014 wr@rosenauer.org
  - use platform specific build flags as in Firefox
    (including _constraints)
  - define /usr/share/myspell as additional dictionary location
    and remove add-plugins.sh finally (bnc#900639)
* Wed Nov 19 2014 Led <ledest@gmail.com>
  - fix bashisms in mozilla.sh and add-plugins.sh scripts
* Tue Oct 14 2014 wr@rosenauer.org
  - update to SeaMonkey 2.30 (bnc#900941)
    * venkman debugger removed from application and therefore
      obsolete package seamonkey-venkman
    * MFSA 2014-74/CVE-2014-1574/CVE-2014-1575
      Miscellaneous memory safety hazards
    * MFSA 2014-75/CVE-2014-1576 (bmo#1041512)
      Buffer overflow during CSS manipulation
    * MFSA 2014-76/CVE-2014-1577 (bmo#1012609)
      Web Audio memory corruption issues with custom waveforms
    * MFSA 2014-77/CVE-2014-1578 (bmo#1063327)
      Out-of-bounds write with WebM video
    * MFSA 2014-78/CVE-2014-1580 (bmo#1063733)
      Further uninitialized memory use during GIF rendering
    * MFSA 2014-79/CVE-2014-1581 (bmo#1068218)
      Use-after-free interacting with text directionality
    * MFSA 2014-80/CVE-2014-1582/CVE-2014-1584 (bmo#1049095, bmo#1066190)
      Key pinning bypasses
    * MFSA 2014-81/CVE-2014-1585/CVE-2014-1586 (bmo#1062876, bmo#1062981)
      Inconsistent video sharing within iframe
    * MFSA 2014-82/CVE-2014-1583 (bmo#1015540)
      Accessing cross-origin objects via the Alarms API
      (only relevant for installed web apps)
  - requires NSPR 4.10.7
  - requires NSS 3.17.1
  - removed obsolete patches:
    * mozilla-ppc.patch
    * mozilla-libproxy-compat.patch

Files

/usr/bin/seamonkey
/usr/lib64/seamonkey
/usr/lib64/seamonkey/application.ini
/usr/lib64/seamonkey/blocklist.xml
/usr/lib64/seamonkey/chrome
/usr/lib64/seamonkey/chrome.manifest
/usr/lib64/seamonkey/chrome/icons
/usr/lib64/seamonkey/chrome/icons/default
/usr/lib64/seamonkey/chrome/icons/default/JSConsoleWindow.png
/usr/lib64/seamonkey/chrome/icons/default/JSConsoleWindow16.png
/usr/lib64/seamonkey/chrome/icons/default/JSConsoleWindow48.png
/usr/lib64/seamonkey/chrome/icons/default/abcardWindow.png
/usr/lib64/seamonkey/chrome/icons/default/abcardWindow16.png
/usr/lib64/seamonkey/chrome/icons/default/abcardWindow48.png
/usr/lib64/seamonkey/chrome/icons/default/ablistWindow.png
/usr/lib64/seamonkey/chrome/icons/default/ablistWindow16.png
/usr/lib64/seamonkey/chrome/icons/default/ablistWindow48.png
/usr/lib64/seamonkey/chrome/icons/default/addressbookWindow.png
/usr/lib64/seamonkey/chrome/icons/default/addressbookWindow16.png
/usr/lib64/seamonkey/chrome/icons/default/addressbookWindow48.png
/usr/lib64/seamonkey/chrome/icons/default/bookmarkproperties.png
/usr/lib64/seamonkey/chrome/icons/default/bookmarkproperties16.png
/usr/lib64/seamonkey/chrome/icons/default/bookmarkproperties48.png
/usr/lib64/seamonkey/chrome/icons/default/default.png
/usr/lib64/seamonkey/chrome/icons/default/default16.png
/usr/lib64/seamonkey/chrome/icons/default/default48.png
/usr/lib64/seamonkey/chrome/icons/default/downloadManager.png
/usr/lib64/seamonkey/chrome/icons/default/downloadManager16.png
/usr/lib64/seamonkey/chrome/icons/default/downloadManager48.png
/usr/lib64/seamonkey/chrome/icons/default/editorWindow.png
/usr/lib64/seamonkey/chrome/icons/default/editorWindow16.png
/usr/lib64/seamonkey/chrome/icons/default/editorWindow48.png
/usr/lib64/seamonkey/chrome/icons/default/findBookmarkWindow.png
/usr/lib64/seamonkey/chrome/icons/default/findBookmarkWindow16.png
/usr/lib64/seamonkey/chrome/icons/default/findBookmarkWindow48.png
/usr/lib64/seamonkey/chrome/icons/default/findHistoryWindow.png
/usr/lib64/seamonkey/chrome/icons/default/findHistoryWindow16.png
/usr/lib64/seamonkey/chrome/icons/default/findHistoryWindow48.png
/usr/lib64/seamonkey/chrome/icons/default/history-window.png
/usr/lib64/seamonkey/chrome/icons/default/history-window16.png
/usr/lib64/seamonkey/chrome/icons/default/history-window48.png
/usr/lib64/seamonkey/chrome/icons/default/main-window.png
/usr/lib64/seamonkey/chrome/icons/default/main-window16.png
/usr/lib64/seamonkey/chrome/icons/default/main-window48.png
/usr/lib64/seamonkey/chrome/icons/default/messengerWindow.png
/usr/lib64/seamonkey/chrome/icons/default/messengerWindow16.png
/usr/lib64/seamonkey/chrome/icons/default/messengerWindow48.png
/usr/lib64/seamonkey/chrome/icons/default/msgcomposeWindow.png
/usr/lib64/seamonkey/chrome/icons/default/msgcomposeWindow16.png
/usr/lib64/seamonkey/chrome/icons/default/msgcomposeWindow48.png
/usr/lib64/seamonkey/chrome/icons/default/places.png
/usr/lib64/seamonkey/chrome/icons/default/places16.png
/usr/lib64/seamonkey/chrome/icons/default/places48.png
/usr/lib64/seamonkey/chrome/icons/default/seamonkey.png
/usr/lib64/seamonkey/components
/usr/lib64/seamonkey/components/components.manifest
/usr/lib64/seamonkey/components/libsuite.so
/usr/lib64/seamonkey/defaults
/usr/lib64/seamonkey/defaults/messenger
/usr/lib64/seamonkey/defaults/messenger/mailViews.dat
/usr/lib64/seamonkey/defaults/pref
/usr/lib64/seamonkey/defaults/pref/all-openSUSE.js
/usr/lib64/seamonkey/defaults/pref/channel-prefs.js
/usr/lib64/seamonkey/defaults/pref/spellcheck.js
/usr/lib64/seamonkey/defaults/profile
/usr/lib64/seamonkey/defaults/profile/chrome
/usr/lib64/seamonkey/defaults/profile/chrome/userChrome-example.css
/usr/lib64/seamonkey/defaults/profile/chrome/userContent-example.css
/usr/lib64/seamonkey/defaults/profile/mimeTypes.rdf
/usr/lib64/seamonkey/defaults/profile/panels.rdf
/usr/lib64/seamonkey/dependentlibs.list
/usr/lib64/seamonkey/dictionaries
/usr/lib64/seamonkey/extensions
/usr/lib64/seamonkey/extensions/modern@themes.mozilla.org.xpi
/usr/lib64/seamonkey/extensions/{972ce4c6-7e08-4474-a285-3208198ce6fd}.xpi
/usr/lib64/seamonkey/fonts
/usr/lib64/seamonkey/fonts/EmojiOneMozilla.ttf
/usr/lib64/seamonkey/gtk2
/usr/lib64/seamonkey/gtk2/libmozgtk.so
/usr/lib64/seamonkey/icudt58l.dat
/usr/lib64/seamonkey/isp
/usr/lib64/seamonkey/isp/Bogofilter.sfd
/usr/lib64/seamonkey/isp/DSPAM.sfd
/usr/lib64/seamonkey/isp/POPFile.sfd
/usr/lib64/seamonkey/isp/SpamAssassin.sfd
/usr/lib64/seamonkey/isp/SpamPal.sfd
/usr/lib64/seamonkey/isp/movemail.rdf
/usr/lib64/seamonkey/isp/rss.rdf
/usr/lib64/seamonkey/libldap60.so
/usr/lib64/seamonkey/libldif60.so
/usr/lib64/seamonkey/liblgpllibs.so
/usr/lib64/seamonkey/libmozavcodec.so
/usr/lib64/seamonkey/libmozavutil.so
/usr/lib64/seamonkey/libmozgtk.so
/usr/lib64/seamonkey/libmozsandbox.so
/usr/lib64/seamonkey/libmozsqlite3.so
/usr/lib64/seamonkey/libprldap60.so
/usr/lib64/seamonkey/libxul.so
/usr/lib64/seamonkey/omni.ja
/usr/lib64/seamonkey/platform.ini
/usr/lib64/seamonkey/plugin-container
/usr/lib64/seamonkey/seamonkey-bin
/usr/lib64/seamonkey/seamonkey.sh
/usr/lib64/seamonkey/searchplugins
/usr/lib64/seamonkey/searchplugins/duckduckgo.xml
/usr/lib64/seamonkey/searchplugins/google.xml
/usr/lib64/seamonkey/searchplugins/wikipedia.xml
/usr/lib64/seamonkey/searchplugins/yahoo.xml
/usr/share/appdata
/usr/share/appdata/seamonkey-composer.appdata.xml
/usr/share/appdata/seamonkey-mail.appdata.xml
/usr/share/appdata/seamonkey.appdata.xml
/usr/share/applications/seamonkey-composer.desktop
/usr/share/applications/seamonkey-mail.desktop
/usr/share/applications/seamonkey.desktop
/usr/share/pixmaps/seamonkey-composer.png
/usr/share/pixmaps/seamonkey-mail.png
/usr/share/pixmaps/seamonkey-orig.png
/usr/share/pixmaps/seamonkey.png


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Apr 9 11:54:57 2024