This bug was fixed in the package seamonkey - 2.0.5+build1+nobinonly-
0ubuntu0.10.04.1
---------------
seamonkey (2.0.5+build1+nobinonly-0ubuntu0.10.04.1) lucid-security; urgency=low
* New upstream release v2.0.5 (SEAMONKEY_2_0_5_BUILD1)
* MFSA 2010-25: Re-use of freed object due to scope confusion
- CVE-2010-1121
* MFSA 2010-26: Crashes with evidence of memory corruption
- CVE-2010-1200
- CVE-2010-1201
- CVE-2010-1202
* MFSA 2010-27: Use-after-free error in nsCycleCollector::MarkRoots()
- CVE-2010-0183
* MFSA 2010-28: Freed object reuse across plugin instances
- CVE-2010-1198
* MFSA 2010-29: Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal
- CVE-2010-1196
* MFSA 2010-30: Integer Overflow in XSLT Node Sorting
- CVE-2010-1199
* MFSA 2010-31: focus() behavior can be used to inject or steal keystrokes
- CVE-2010-1125
* MFSA 2010-32: Content-Disposition: attachment ignored if Content-Type:
multipart also present
- CVE-2010-1197
* MFSA 2010-33: User tracking across sites using Math.random()
- CVE-2008-5913
* Fix FTBFS on Sparc by disabling jit (LP: #523627)
- update debian/rules
-- Micah Gersten <[email protected]> Thu, 06 May 2010 11:18:16 -0500
** Changed in: seamonkey (Ubuntu Lucid)
Status: Fix Committed => Fix Released
--
Fix FTBFS on sparc
https://bugs.launchpad.net/bugs/523627
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs