Accepted mozilla-thunderbird 1.0.8-0ubuntu05.10 (source)

Martin Pitt martin.pitt at ubuntu.com
Tue May 2 10:10:06 BST 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue,  2 May 2006 07:46:51 +0000
Source: mozilla-thunderbird
Binary: mozilla-thunderbird-dev mozilla-thunderbird-inspector mozilla-thunderbird mozilla-thunderbird-typeaheadfind mozilla-thunderbird-offline
Architecture: source
Version: 1.0.8-0ubuntu05.10
Distribution: breezy-updates
Urgency: low
Maintainer: Alexander Sack <asac at debian.org>
Changed-By: Martin Pitt <martin.pitt at ubuntu.com>
Description: 
 mozilla-thunderbird - Mozilla Thunderbird standalone mail client
 mozilla-thunderbird-dev - mozilla thunderbird development files
 mozilla-thunderbird-inspector - mozilla thunderbird dom inspector extension
 mozilla-thunderbird-offline - mozilla thunderbird offline extension
 mozilla-thunderbird-typeaheadfind - mozilla thunderbird typeaheadfind extension
Changes: 
 mozilla-thunderbird (1.0.8-0ubuntu05.10) breezy-updates; urgency=low
 .
   * New upstream release which fixes the following vulnerabilities:
     - MFSA 2006-27, CVE-2006-0748: Table Rebuilding Code Execution
       Vulnerability
     - MFSA 2006-26, CVE-2006-1045: Mail Multiple Information Disclosure
     - MFSA 2006-25, CVE-2006-1727: Privilege escalation through Print Preview
     - MFSA 2006-24, CVE-2006-1728: Privilege escalation using
       crypto.generateCRMFRequest
     - MFSA 2006-22, CVE-2006-1730: CSS Letter-Spacing Heap Overflow
       Vulnerability
     - MFSA 2006-21, CVE-2006-0884: JavaScript execution in mail when
       forwarding in-line
     - MFSA 2006-19, CVE-2006-1731: Cross-site scripting using .valueOf.call()
     - MFSA 2006-18, CVE-2006-0749: Mozilla Firefox Tag Order Vulnerability
     - MFSA 2006-17, CVE-2006-1732: cross-site scripting through
       window.controllers
     - MFSA 2006-16, CVE-2006-1733: Accessing XBL compilation scope via
       valueOf.call()
     - MFSA 2006-15, CVE-2006-1734: Privilege escalation using a JavaScript
       function's cloned parent
     - MFSA 2006-14, CVE-2006-1735: Privilege escalation via XBL.method.eval
     - MFSA 2006-11, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739,
       CVE-2006-1790: Crashes with evidence of memory corruption (rv:1.8)
     - MFSA 2006-10, CVE-2006-1742: JavaScript garbage-collection hazard audit
     - MFSA 2006-09, CVE-2006-1741: Cross-site JavaScript injection using event
       handlers
     - MFSA 2006-05, CVE-2006-0296: Localstore.rdf XML injection through
       XULDocument.persist()
     - MFSA 2006-01, CVE-2006-0292: JavaScript garbage-collection hazards
   * Removed debian/patches/20_run-mozilla_sh_306893_fix.dpatch: Fixed
     upstream.
   * debian/patches/90_gcc4_fix.dpatch: Adapted to new upstream version.
Files: 
 806e65a85f7a46aa259252bff2719372 914 mail optional mozilla-thunderbird_1.0.8-0ubuntu05.10.dsc
 ae345f1b722d8f3a977af4fd358d27b0 32849510 mail optional mozilla-thunderbird_1.0.8.orig.tar.gz
 b4621df18539f27cfbb53446e230fd60 78580 mail optional mozilla-thunderbird_1.0.8-0ubuntu05.10.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFEVxphDecnbV4Fd/IRAsvCAKD6Ljw4j2b+3x31PolInSqcO5DmmQCfVjr0
90yzuj2I+5/wqgapa4TTq74=
=nHoS
-----END PGP SIGNATURE-----


Accepted:
mozilla-thunderbird_1.0.8-0ubuntu05.10.diff.gz
  to pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.10.diff.gz
mozilla-thunderbird_1.0.8-0ubuntu05.10.dsc
  to pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8-0ubuntu05.10.dsc
mozilla-thunderbird_1.0.8.orig.tar.gz
  to pool/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.8.orig.tar.gz




More information about the breezy-changes mailing list