The successor of the Mozilla Application Suite

Edit Package seamonkey

Originally based on the Netscape Communicator source, the SeaMonkey
project grew to be the most advanced web browser currently available.
It supports new techniques like CSS2, MathML, SVG, XML, transparent
PNGs, and its look is fully theme-able.

Refresh
Refresh
Source Files
Filename Size Changed
add-plugins.sh.in 0000001450 1.42 KB
compare-locales.tar.bz2 0000029911 29.2 KB
create-tar.sh 0000001492 1.46 KB
find-external-requires.sh 0000000275 275 Bytes
l10n-2.15.tar.bz2 0020417353 19.5 MB
mozilla-gstreamer-760140.patch 0000018299 17.9 KB
mozilla-gstreamer-803287.patch 0000008769 8.56 KB
mozilla-language.patch 0000001744 1.7 KB
mozilla-libproxy-compat.patch 0000001184 1.16 KB
mozilla-nongnome-proxies.patch 0000001949 1.9 KB
mozilla-ntlm-full-path.patch 0000000897 897 Bytes
mozilla-ppc.patch 0000004505 4.4 KB
mozilla-prefer_plugin_pref.patch 0000001977 1.93 KB
mozilla-shared-nss-db.patch 0000004938 4.82 KB
mozilla-sle11.patch 0000002689 2.63 KB
mozilla-ua-locale.patch 0000001128 1.1 KB
mozilla-webrtc.patch 0000002932 2.86 KB
mozilla.sh.in 0000004273 4.17 KB
seamonkey-2.15-source.tar.bz2 0121437449 116 MB
seamonkey-desktop.tar.bz2 0000022975 22.4 KB
seamonkey-rpmlintrc 0000000029 29 Bytes
seamonkey-shared-nss-db.patch 0000001292 1.26 KB
seamonkey-ua-locale.patch 0000000575 575 Bytes
seamonkey.changes 0000097095 94.8 KB
seamonkey.spec 0000013783 13.5 KB
search-addons.tar.bz2 0000002354 2.3 KB
suse-default-prefs.js 0000000681 681 Bytes
Latest Revision
Stefan Lijewski's avatar Stefan Lijewski (lijews) accepted request 147612 from Wolfgang Rosenauer's avatar Wolfgang Rosenauer (wrosenauer) (revision 23)
- update to SeaMonkey 2.15 /(bnc#796895)
  * MFSA 2013-01/CVE-2013-0749/CVE-2013-0769/CVE-2013-0770
    Miscellaneous memory safety hazards
  * MFSA 2013-02/CVE-2013-0760/CVE-2013-0762/CVE-2013-0766/CVE-2013-0767
    CVE-2013-0761/CVE-2013-0763/CVE-2013-0771/CVE-2012-5829
    Use-after-free and buffer overflow issues found using Address Sanitizer
  * MFSA 2013-03/CVE-2013-0768 (bmo#815795)
    Buffer Overflow in Canvas
  * MFSA 2013-04/CVE-2012-0759 (bmo#802026)
    URL spoofing in addressbar during page loads
  * MFSA 2013-05/CVE-2013-0744 (bmo#814713)
    Use-after-free when displaying table with many columns and column groups
  * MFSA 2013-06/CVE-2013-0751 (bmo#790454)
    Touch events are shared across iframes
  * MFSA 2013-07/CVE-2013-0764 (bmo#804237)
    Crash due to handling of SSL on threads
  * MFSA 2013-08/CVE-2013-0745 (bmo#794158)
    AutoWrapperChanger fails to keep objects alive during garbage collection
  * MFSA 2013-09/CVE-2013-0746 (bmo#816842)
    Compartment mismatch with quickstubs returned values
  * MFSA 2013-10/CVE-2013-0747 (bmo#733305)
    Event manipulation in plugin handler to bypass same-origin policy
  * MFSA 2013-11/CVE-2013-0748 (bmo#806031)
    Address space layout leaked in XBL objects
  * MFSA 2013-12/CVE-2013-0750 (bmo#805121)
    Buffer overflow in Javascript string concatenation
  * MFSA 2013-13/CVE-2013-0752 (bmo#805024)
    Memory corruption in XBL with XML bindings containing SVG
  * MFSA 2013-14/CVE-2013-0757 (bmo#813901)
    Chrome Object Wrapper (COW) bypass through changing prototype
Comments 0
openSUSE Build Service is sponsored by