[ubuntu/intrepid] seamonkey 1.1.12+nobinonly-0ubuntu1 (Accepted)

Fabien Tassin fta at ubuntu.com
Wed Oct 1 09:58:08 BST 2008


seamonkey (1.1.12+nobinonly-0ubuntu1) intrepid; urgency=low

  * New security upstream release: 1.1.12 (LP: #276437)
    - CVE-2008-4070: Heap overflow when canceling newsgroup message
    - CVE-2008-4069: XBM image uninitialized memory reading
    - CVE-2008-4067..4068: resource: traversal vulnerabilities
    - CVE-2008-4065..4066: BOM characters stripped from JavaScript before execution
    - CVE-2008-4061..4064: Crashes with evidence of memory corruption
    - CVE-2008-4058..4060: Privilege escalation via XPCnativeWrapper pollution
    - CVE-2008-3837: Forced mouse drag
    - CVE-2008-3835: nsXMLDocument::OnChannelRedirect() same-origin violation
    - CVE-2008-0016: UTF-8 URL stack buffer overflow

Date: Tue, 30 Sep 2008 00:41:24 +0200
Changed-By: Fabien Tassin <fta at ubuntu.com>
Maintainer: Ubuntu Mozilla Team <ubuntu-mozillateam at lists.ubuntu.com>
https://edge.launchpad.net/ubuntu/intrepid/+source/seamonkey/1.1.12+nobinonly-0ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 30 Sep 2008 00:41:24 +0200
Source: seamonkey
Binary: seamonkey seamonkey-browser seamonkey-gnome-support seamonkey-dev seamonkey-dbg seamonkey-mailnews seamonkey-chatzilla seamonkey-dom-inspector mozilla mozilla-browser mozilla-dev mozilla-mailnews mozilla-chatzilla mozilla-psm mozilla-dom-inspector mozilla-js-debugger mozilla-calendar iceape iceape-browser iceape-gnome-support iceape-dev iceape-dbg iceape-mailnews iceape-chatzilla iceape-calendar iceape-dom-inspector
Architecture: source
Version: 1.1.12+nobinonly-0ubuntu1
Distribution: intrepid
Urgency: low
Maintainer: Ubuntu Mozilla Team <ubuntu-mozillateam at lists.ubuntu.com>
Changed-By: Fabien Tassin <fta at ubuntu.com>
Description: 
 iceape     - dummy upgrade package for the SeaMonkey Internet Suite
 iceape-browser - dummy upgrade package for SeaMonkey Navigator
 iceape-calendar - dummy upgrade package for SeaMonkey Navigator
 iceape-chatzilla - dummy upgrade package for SeaMonkey Chatzilla IRC client
 iceape-dbg - dummy upgrade package for SeaMonkey Debug package
 iceape-dev - dummy upgrade package for SeaMonkey SDK
 iceape-dom-inspector - dummy upgrade package for the DOM Inspector for the SeaMonkey Int
 iceape-gnome-support - dummy upgrade package for SeaMonkey Gnome Support
 iceape-mailnews - dummy upgrade package for SeaMonkey Mail & Newsgroups and Address
 mozilla    - dummy upgrade package for the SeaMonkey Internet Suite
 mozilla-browser - dummy upgrade package for SeaMonkey Navigator and Composer
 mozilla-calendar - dummy upgrade package for SeaMonkey Calendar
 mozilla-chatzilla - dummy upgrade package for SeaMonkey Chatzilla IRC client
 mozilla-dev - dummy upgrade package for development file for the SeaMonkey Inte
 mozilla-dom-inspector - dummy upgrade package for the DOM Inspector for the SeaMonkey Int
 mozilla-js-debugger - dummy upgrade package for venkman
 mozilla-mailnews - dummy upgrade package for SeaMonkey Mail & Newsgroups and Address
 mozilla-psm - dummy upgrade package for SeaMonkey Navigator
 seamonkey  - The Seamonkey Internet Suite
 seamonkey-browser - Seamonkey Navigator (Internet browser) and Composer
 seamonkey-chatzilla - Seamonkey Chatzilla IRC client
 seamonkey-dbg - Debugging symbols for the Seamonkey Internet Suite
 seamonkey-dev - Development files for the Seamonkey Internet Suite
 seamonkey-dom-inspector - DOM inspector for the Seamonkey Internet Suite
 seamonkey-gnome-support - Gnome support for the Seamonkey Internet Suite
 seamonkey-mailnews - Seamonkey Mail & Newsgroups and Address Book
Launchpad-Bugs-Fixed: 276437
Changes: 
 seamonkey (1.1.12+nobinonly-0ubuntu1) intrepid; urgency=low
 .
   * New security upstream release: 1.1.12 (LP: #276437)
     - CVE-2008-4070: Heap overflow when canceling newsgroup message
     - CVE-2008-4069: XBM image uninitialized memory reading
     - CVE-2008-4067..4068: resource: traversal vulnerabilities
     - CVE-2008-4065..4066: BOM characters stripped from JavaScript before execution
     - CVE-2008-4061..4064: Crashes with evidence of memory corruption
     - CVE-2008-4058..4060: Privilege escalation via XPCnativeWrapper pollution
     - CVE-2008-3837: Forced mouse drag
     - CVE-2008-3835: nsXMLDocument::OnChannelRedirect() same-origin violation
     - CVE-2008-0016: UTF-8 URL stack buffer overflow
Checksums-Sha1: 
 258e7f2f60b31794743facd618f212161f622786 2058 seamonkey_1.1.12+nobinonly-0ubuntu1.dsc
 133a2bab188301a81ca2f9fffd0e8802f71c5d21 45463099 seamonkey_1.1.12+nobinonly.orig.tar.gz
 eeb61d6ee0ac3e1295dbef38ca9f036bdd1fc9af 139612 seamonkey_1.1.12+nobinonly-0ubuntu1.diff.gz
Checksums-Sha256: 
 2515b70c2cd6a9b02df5503df426d9112eb177d9fcfaa4600b1347856e43056d 2058 seamonkey_1.1.12+nobinonly-0ubuntu1.dsc
 7844330566779c67e86a44590399b752baf2418e6e16146cbd3f339f4cf88383 45463099 seamonkey_1.1.12+nobinonly.orig.tar.gz
 a21a1ec1311a74613d3299c01bcaf74d94606ea8d822d11c3202aecca6e48b0b 139612 seamonkey_1.1.12+nobinonly-0ubuntu1.diff.gz
Files: 
 9ff6ea414c3b6860c5b4b6ee07cd7770 2058 net optional seamonkey_1.1.12+nobinonly-0ubuntu1.dsc
 4e6ba82ac2dcf7d6712888b0c2f42d50 45463099 net optional seamonkey_1.1.12+nobinonly.orig.tar.gz
 13bbef1c881cac83666e472c6c27057d 139612 net optional seamonkey_1.1.12+nobinonly-0ubuntu1.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkjii3EACgkQaOfNHbbuIOiE0wCfS8F7mENsFUk5seG6GmMY8fa0
w4IAn1RSzcZAmgGjP0tnszRL5BvS79n+
=M5OQ
-----END PGP SIGNATURE-----


More information about the Intrepid-changes mailing list