Here is the full debdiff for hardy.

** Attachment added: 
"seamonkey_1.1.11+nobinonly-0ubuntu1--1.1.12+nobinonly-0ubuntu0.8.04.1.debdiff"
   
http://launchpadlibrarian.net/18096689/seamonkey_1.1.11%2Bnobinonly-0ubuntu1--1.1.12%2Bnobinonly-0ubuntu0.8.04.1.debdiff

** Changed in: seamonkey (Ubuntu Hardy)
       Status: New => Fix Committed

** Description changed:

  Binary package hint: seamonkey
  
  seamonkey (1.1.12+nobinonly-0ubuntu1) intrepid; urgency=low
  
    * New security upstream release: 1.1.12
      - CVE-2008-4070: Heap overflow when canceling newsgroup message
      - CVE-2008-4069: XBM image uninitialized memory reading
      - CVE-2008-4067..4068: resource: traversal vulnerabilities
      - CVE-2008-4065..4066: BOM characters stripped from JavaScript before 
execution
      - CVE-2008-4061..4064: Crashes with evidence of memory corruption
      - CVE-2008-4058..4060: Privilege escalation via XPCnativeWrapper pollution
      - CVE-2008-3837: Forced mouse drag
      - CVE-2008-3835: nsXMLDocument::OnChannelRedirect() same-origin violation
      - CVE-2008-0016: UTF-8 URL stack buffer overflow
  
   -- Fabien Tassin <[EMAIL PROTECTED]>  Tue, 30 Sep 2008 00:41:24 +0200
+ 
+ ===
+ 
+ seamonkey (1.1.12+nobinonly-0ubuntu0.8.04.1) hardy-security; urgency=low
+ 
+   * New security upstream release: 1.1.12 (LP: #276437)
+     - CVE-2008-4070: Heap overflow when canceling newsgroup message
+     - CVE-2008-4069: XBM image uninitialized memory reading
+     - CVE-2008-4067..4068: resource: traversal vulnerabilities
+     - CVE-2008-4065..4066: BOM characters stripped from JavaScript before 
execution
+     - CVE-2008-4061..4064: Crashes with evidence of memory corruption
+     - CVE-2008-4058..4060: Privilege escalation via XPCnativeWrapper pollution
+     - CVE-2008-3837: Forced mouse drag
+     - CVE-2008-3835: nsXMLDocument::OnChannelRedirect() same-origin violation
+     - CVE-2008-0016: UTF-8 URL stack buffer overflow
+   * Also includes security fixes from 1.1.11 and 1.1.10 (LP: #218534)
+     - CVE-2008-2785: Remote code execution by overflowing CSS reference 
counter
+     - CVE-2008-2811: Crash and remote code execution in block reflow
+     - CVE-2008-2810: Remote site run as local file via Windows URL shortcut
+     - CVE-2008-2809: Peer-trusted certs can use alt names to spoof
+     - CVE-2008-2808: File location URL in directory listings not escaped 
properly
+     - CVE-2008-2807: Faulty .properties file results in uninitialized memory 
being used
+     - CVE-2008-2806: Arbitrary socket connections with Java LiveConnect on 
Mac OS X
+     - CVE-2008-2805: Arbitrary file upload via originalTarget and DOM Range
+     - MFSA 2008-26 (follow-up of CVE-2008-0304): Buffer length checks in MIME 
processing
+     - CVE-2008-2803: Arbitrary code execution in 
mozIJSSubScriptLoader.loadSubScript()
+     - CVE-2008-2802: Chrome script loading from fastload file
+     - CVE-2008-2801: Signed JAR tampering
+     - CVE-2008-2800: XSS through JavaScript same-origin violation
+     - CVE-2008-2798..2799: Crashes with evidence of memory corruption
+     - CVE-2008-1380: Crash in JavaScript garbage collector
+   * Refresh diverged patch:
+     - update debian/patches/80_security_build.patch
+   * Fix FTBFS with missing -lfontconfig
+     - add debian/patches/11_fix_ftbfs_with_fontconfig.patch
+     - update debian/patches/series
+ 
+  -- Fabien Tassin <[EMAIL PROTECTED]>  Tue, 30 Sep 2008 22:44:30 +0200

-- 
security upgrade of seamonkey 1.1.12
https://bugs.launchpad.net/bugs/276437
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to