Accepted firefox 2.0.0.4+0dfsg-0ubuntu0.6.10 (source)

Ubuntu Installer archive at ubuntu.com
Fri Jun 1 20:59:03 BST 2007


Accepted:
 OK: firefox_2.0.0.4+0dfsg-0ubuntu0.6.10.dsc
     -> Component: main Section: web
 OK: firefox_2.0.0.4+0dfsg.orig.tar.gz
 OK: firefox_2.0.0.4+0dfsg-0ubuntu0.6.10.diff.gz

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 31 May 2007 12:11:03 +0200
Source: firefox
Binary: libnspr4 firefox-dom-inspector firefox-dev mozilla-firefox mozilla-firefox-dev mozilla-firefox-dom-inspector libnss3 libnspr-dev firefox-gnome-support firefox-dbg libnss-dev mozilla-firefox-gnome-support firefox
Architecture: source
Version: 2.0.0.4+0dfsg-0ubuntu0.6.10
Distribution: edgy-security
Urgency: low
Maintainer: Eric Dorland <eric at debian.org>
Changed-By: Alexander Sack <asac at ubuntu.com>
Description: 
 firefox    - lightweight web browser based on Mozilla
 firefox-dbg - debugging symbols for firefox
 firefox-dev - Development files for Mozilla Firefox
 firefox-dom-inspector - tool for inspecting the DOM of pages in Mozilla Firefox
 firefox-gnome-support - Support for Gnome in Mozilla Firefox
 libnspr-dev - Netscape Portable Runtime library - development files
 libnspr4   - Netscape Portable Runtime Library
 libnss-dev - Network Security Service Libraries - development
 libnss3    - Network Security Service Libraries - runtime
 mozilla-firefox - Transition package for firefox rename
 mozilla-firefox-dev - dummy transitional package
 mozilla-firefox-dom-inspector - Transition package for firefox rename
 mozilla-firefox-gnome-support - Transition package for firefox rename
Changes: 
 firefox (2.0.0.4+0dfsg-0ubuntu0.6.10) edgy-security; urgency=low
 .
   * New security/stability upstream updated (v2.0.0.4)
   * MFSA2007-17 aka CVE-2007-2871: XUL Popup Spoofing
   * MFSA2007-16 aka CVE-2007-2870: XSS using addEventListener
   * MFSA2007-14 aka CVE-2007-1362: Path Abuse in Cookies
   * MFSA2007-13 aka CVE-2007-2869: Persistent Autocomplete Denial of Service
   * MFSA2007-12 aka CVE-2007-2867 (layout engine) + CVE-2007-2868
     (javascript engine): Crashes with evidence of memory corruption
   * configure.in, configure: drop visibility hidden attribute patch
     as it has been applied upstream; regen configure accordingly
   * uriloader/exthandler/unix/nsOSHelperAppService.cpp: drop modifications
     we previously carried for bz273524; the helper part has been dealt with
     in landing of bz373955 attachment 260203
   * embedding/browser/gtk/src/EmbedWindow.cpp: drop patch since bz312998
     has been applied upstream
Files: 
 4a48aaf8d25965c4ae6652be499b1fa3 1856 web optional firefox_2.0.0.4+0dfsg-0ubuntu0.6.10.dsc
 4c090f3d24222acf7201ca46819f0ad8 46775295 web optional firefox_2.0.0.4+0dfsg.orig.tar.gz
 be400ccb6d77dc2ea59a56f94c3ce469 320879 web optional firefox_2.0.0.4+0dfsg-0ubuntu0.6.10.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
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=qOG+
-----END PGP SIGNATURE-----





More information about the edgy-changes mailing list