Hello community,

here is the log from the commit of package seamonkey for openSUSE:Factory 
checked in at 2012-05-07 22:52:15
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/seamonkey (Old)
 and      /work/SRC/openSUSE:Factory/.seamonkey.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "seamonkey", Maintainer is "[email protected]"

Changes:
--------
--- /work/SRC/openSUSE:Factory/seamonkey/seamonkey.changes      2012-04-23 
16:13:21.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.seamonkey.new/seamonkey.changes 2012-05-07 
22:52:20.000000000 +0200
@@ -1,0 +2,51 @@
+Mon Apr 30 07:30:14 UTC 2012 - [email protected]
+
+- update to Seamonkey 2.9.1
+  * fix regressions
+    - POP3 filters (bmo#748090)
+    - Message Body not loaded when using "Fetch Headers Only"
+      (bmo#748865)
+    - Received messages contain parts of other messages with
+      movemail account (bmo#748726)
+    - New mail notification issue (bmo#748997)
+    - crash in nsMsgDatabase::MatchDbName (bmo#748432)
+
+-------------------------------------------------------------------
+Fri Apr 27 10:21:24 UTC 2012 - [email protected]
+
+- fixed build with gcc 4.7
+
+-------------------------------------------------------------------
+Mon Apr 23 14:28:50 UTC 2012 - [email protected]
+
+- update to Seamonkey 2.9 (bnc#758408)
+  * MFSA 2012-20/CVE-2012-0467/CVE-2012-0468
+    Miscellaneous memory safety hazards
+  * MFSA 2012-22/CVE-2012-0469 (bmo#738985)
+    use-after-free in IDBKeyRange
+  * MFSA 2012-23/CVE-2012-0470 (bmo#734288)
+    Invalid frees causes heap corruption in gfxImageSurface
+  * MFSA 2012-24/CVE-2012-0471 (bmo#715319)
+    Potential XSS via multibyte content processing errors
+  * MFSA 2012-25/CVE-2012-0472 (bmo#744480)
+    Potential memory corruption during font rendering using cairo-dwrite
+  * MFSA 2012-26/CVE-2012-0473 (bmo#743475)
+    WebGL.drawElements may read illegal video memory due to
+    FindMaxUshortElement error
+  * MFSA 2012-27/CVE-2012-0474 (bmo#687745, bmo#737307)
+    Page load short-circuit can lead to XSS
+  * MFSA 2012-28/CVE-2012-0475 (bmo#694576)
+    Ambiguous IPv6 in Origin headers may bypass webserver access
+    restrictions
+  * MFSA 2012-29/CVE-2012-0477 (bmo#718573)
+    Potential XSS through ISO-2022-KR/ISO-2022-CN decoding issues
+  * MFSA 2012-30/CVE-2012-0478 (bmo#727547)
+    Crash with WebGL content using textImage2D
+  * MFSA 2012-31/CVE-2011-3062 (bmo#739925)
+    Off-by-one error in OpenType Sanitizer
+  * MFSA 2012-32/CVE-2011-1187 (bmo#624621)
+    HTTP Redirections and remote content can be read by javascript errors
+  * MFSA 2012-33/CVE-2012-0479 (bmo#714631)
+    Potential site identity spoofing when loading RSS and Atom feeds
+
+-------------------------------------------------------------------

Old:
----
  l10n-2.8.99.tar.bz2
  seamonkey-2.8.99-source.tar.bz2

New:
----
  l10n-2.9.1.tar.bz2
  seamonkey-2.9.1-source.tar.bz2

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ seamonkey.spec ++++++
--- /var/tmp/diff_new_pack.9EWUnu/_old  2012-05-07 22:52:27.000000000 +0200
+++ /var/tmp/diff_new_pack.9EWUnu/_new  2012-05-07 22:52:27.000000000 +0200
@@ -42,9 +42,9 @@
 BuildRequires:  wireless-tools
 %endif
 Provides:       web_browser
-Version:        2.8.99
+Version:        2.9.1
 Release:        0
-%define releasedate 2012042000
+%define releasedate 2012042800
 Summary:        The successor of the Mozilla Application Suite
 License:        MPL-1.1 or GPL-2.0+ or LGPL-2.1+
 Group:          Productivity/Networking/Web/Browsers

++++++ compare-locales.tar.bz2 ++++++

++++++ create-tar.sh ++++++
--- /var/tmp/diff_new_pack.9EWUnu/_old  2012-05-07 22:52:28.000000000 +0200
+++ /var/tmp/diff_new_pack.9EWUnu/_new  2012-05-07 22:52:28.000000000 +0200
@@ -1,9 +1,9 @@
 #!/bin/bash
 
-CHANNEL="beta"
+CHANNEL="release"
 BRANCH="releases/comm-$CHANNEL"
-RELEASE_TAG="SEAMONKEY_2_9b4_RELEASE"
-VERSION="2.8.99"
+RELEASE_TAG="SEAMONKEY_2_9_1_RELEASE"
+VERSION="2.9.1"
 
 echo "cloning $BRANCH..."
 hg clone http://hg.mozilla.org/$BRANCH seamonkey

++++++ l10n-2.8.99.tar.bz2 -> l10n-2.9.1.tar.bz2 ++++++
/work/SRC/openSUSE:Factory/seamonkey/l10n-2.8.99.tar.bz2 
/work/SRC/openSUSE:Factory/.seamonkey.new/l10n-2.9.1.tar.bz2 differ: char 11, 
line 1

++++++ mailnews-literals.patch ++++++
--- /var/tmp/diff_new_pack.9EWUnu/_old  2012-05-07 22:52:28.000000000 +0200
+++ /var/tmp/diff_new_pack.9EWUnu/_new  2012-05-07 22:52:28.000000000 +0200
@@ -47,6 +47,25 @@
          // if blockOffset is set, we added x-mozilla-status headers so
          // file pointer is already past them.
          if (!blockOffset)
+@@ -1211,17 +1211,17 @@ nsOfflineStoreCompactState::OnDataAvaila
+     if (NS_SUCCEEDED(rv))
+     {
+       if (m_startOfMsg)
+       {
+         m_startOfMsg = false;
+         // check if there's an envelope header; if not, write one.
+         if (strncmp(m_dataBuffer, "From ", 5))
+         {
+-          m_fileStream->Write("From "CRLF, 7, &bytesWritten);
++          m_fileStream->Write("From " CRLF, 7, &bytesWritten);
+           m_offlineMsgSize += bytesWritten;
+         }
+       }
+       m_fileStream->Write(m_dataBuffer, readCount, &bytesWritten);
+       m_offlineMsgSize += bytesWritten;
+       writeCount += bytesWritten;
+       count -= readCount;
+       if (writeCount != readCount)
 diff --git a/mailnews/compose/src/nsMsgAppleEncode.cpp 
b/mailnews/compose/src/nsMsgAppleEncode.cpp
 --- a/mailnews/compose/src/nsMsgAppleEncode.cpp
 +++ b/mailnews/compose/src/nsMsgAppleEncode.cpp

++++++ seamonkey-2.8.99-source.tar.bz2 -> seamonkey-2.9.1-source.tar.bz2 ++++++
/work/SRC/openSUSE:Factory/seamonkey/seamonkey-2.8.99-source.tar.bz2 
/work/SRC/openSUSE:Factory/.seamonkey.new/seamonkey-2.9.1-source.tar.bz2 
differ: char 11, line 1

-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to