Accepted: xulrunner 1.8.1.13+nobinonly-0ubuntu1 (source)

Fabien Tassin fta at sofaraway.org
Wed Mar 26 22:47:03 GMT 2008


Accepted:
 OK: xulrunner_1.8.1.13+nobinonly.orig.tar.gz
 OK: xulrunner_1.8.1.13+nobinonly-0ubuntu1.diff.gz
 OK: xulrunner_1.8.1.13+nobinonly-0ubuntu1.dsc
     -> Component: universe Section: devel

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 26 Mar 2008 00:07:56 +0000
Source: xulrunner
Binary: xulrunner xulrunner-gnome-support libmozjs0d libmozjs-dev libmozjs0d-dbg spidermonkey-bin libxul0d libxul-common libxul-dev libxul0d-dbg libmozillainterfaces-java python-xpcom
Architecture: source
Version: 1.8.1.13+nobinonly-0ubuntu1
Distribution: hardy
Urgency: low
Maintainer: Ubuntu MOTU Developers <ubuntu-motu at lists.ubuntu.com>
Changed-By: Fabien Tassin <fta at sofaraway.org>
Description: 
 libmozillainterfaces-java - XPCOM bindings for Java
 libmozjs-dev - Development files for the Mozilla SpiderMonkey JavaScript library
 libmozjs0d - The Mozilla SpiderMonkey JavaScript library
 libmozjs0d-dbg - Development files for the Mozilla SpiderMonkey JavaScript library
 libxul-common - Gecko engine library - common files
 libxul-dev - Development files for the Gecko engine library
 libxul0d   - Gecko engine library
 libxul0d-dbg - Development files for the Gecko engine library
 python-xpcom - XPCOM bindings for Python
 spidermonkey-bin - standalone JavaScript/ECMAScript (ECMA-262) interpreter
 xulrunner  - XUL + XPCOM application runner
 xulrunner-gnome-support - Support for GNOME in xulrunner applications
Launchpad-Bugs-Fixed: 207171
Changes: 
 xulrunner (1.8.1.13+nobinonly-0ubuntu1) hardy; urgency=low
 .
   * New security upstream release: 1.8.1.13 (LP: #207171)
   * Security fixes:
     - MFSA 2008-19 XUL popup spoofing variant (cross-tab popups)
     - MFSA 2008-18 Java socket connection to any local port via LiveConnect
     - MFSA 2008-17 Privacy issue with SSL Client Authentication
     - MFSA 2008-16 HTTP Referrer spoofing with malformed URLs
     - MFSA 2008-15 Crashes with evidence of memory corruption
     - MFSA 2008-14 JavaScript privilege escalation and arbitrary code execution
   * Merge from debian unstable (1.8.1.12-5). Remaining ubuntu changes:
     - debian/patches/88_force-no-pragma-visibility-for-gcc-4.2_4.3.dpatch
     - xulrunner alternative in /usr/bin
   * Drop patches applied upstream:
     - drop debian/patches/10_SECAlgorithmIDTemplate.dpatch
     - update debian/patches/00list
   * Update diverged patches:
     - update debian/patches/99_configure.dpatch
Files: 
 b1b25ecb0e42f7591a16c9c26233af85 1340 devel optional xulrunner_1.8.1.13+nobinonly-0ubuntu1.dsc
 87ae7be78cda024ecd56259f31c685ed 41268870 devel optional xulrunner_1.8.1.13+nobinonly.orig.tar.gz
 74612e9b0a428fe5fe5da6a6d6f45068 132839 devel optional xulrunner_1.8.1.13+nobinonly-0ubuntu1.diff.gz
Original-Maintainer: Mike Hommey <glandium at debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFH6tDvAc+S8KckfcURAqWgAJwI6EcW52uE2oY2nE/S1/ZjLP37wACfdp8N
lNv8TS2Lm3VlcrW9lhjptI4=
=Dp3M
-----END PGP SIGNATURE-----





More information about the Hardy-changes mailing list