Your message dated Sat, 6 Dec 2008 10:10:41 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Re: Bug#505565: Mozilla SeaMonkey Multiple Vulnerabilities
has caused the Debian Bug report #505565,
regarding Mozilla SeaMonkey Multiple Vulnerabilities
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
505565: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505565
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: iceape
Severity: critical
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

The following SA (Secunia Advisory) id was published for SeaMonkey:

SA32714[1]

Description:
Some vulnerabilities have been reported in Mozilla SeaMonkey, which can
be exploited by malicious people to disclose sensitive information,
bypass certain security restrictions, or compromise a user's system.

For more information:
SA32693

The vulnerabilities are reported in versions prior to 1.1.13.

Solution:
Update to version 1.1.13.

Original Advisory:
http://www.mozilla.org/security/announce/2008/mfsa2008-47.html
http://www.mozilla.org/security/announce/2008/mfsa2008-48.html
http://www.mozilla.org/security/announce/2008/mfsa2008-49.html
http://www.mozilla.org/security/announce/2008/mfsa2008-50.html
http://www.mozilla.org/security/announce/2008/mfsa2008-52.html
http://www.mozilla.org/security/announce/2008/mfsa2008-54.html
http://www.mozilla.org/security/announce/2008/mfsa2008-55.html
http://www.mozilla.org/security/announce/2008/mfsa2008-56.html
http://www.mozilla.org/security/announce/2008/mfsa2008-57.html
http://www.mozilla.org/security/announce/2008/mfsa2008-58.html

Other References:
SA32693[2]

If you fix the vulnerability please also make sure to include the the
CVE id in the changelog entry.

[1]http://secunia.com/advisories/32714/
[2]http://secunia.com/advisories/32693/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkcRCgACgkQNxpp46476aonswCeMfUB5+j2+eLl1Z8P9u1QnqZo
yU0An3CqF9pgPfO6J/qI9fF/i0yIp+jt
=QbeL
-----END PGP SIGNATURE-----



--- End Message ---
--- Begin Message ---
Version: 1.1.13-1

On Thu, Nov 13, 2008 at 04:13:46PM +0100, Giuseppe Iuculano wrote:
> Solution:
> Update to version 1.1.13.


--- End Message ---

Reply via email to