Your message dated Sat, 20 Aug 2005 06:47:15 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#318061: fixed in mozilla-firefox 1.0.4-2sarge2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 13 Jul 2005 07:22:40 +0000
>From [EMAIL PROTECTED] Wed Jul 13 00:22:40 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mail.enyo.de [212.9.189.167] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DsbZo-0004UH-00; Wed, 13 Jul 2005 00:22:40 -0700
Received: from deneb.enyo.de ([2001:14b0:202:1::ab])
        by albireo.enyo.de with esmtp id 1DsbZn-00078y-Ag
        for [EMAIL PROTECTED]; Wed, 13 Jul 2005 09:22:39 +0200
Received: from fw by deneb.enyo.de with local (Exim 4.52)
        id 1DsbZX-0001EN-L8; Wed, 13 Jul 2005 09:22:23 +0200
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Florian Weimer <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: mozilla-firefox: version 1.0.5 fixes several security bugs
X-Mailer: reportbug 3.15
Date: Wed, 13 Jul 2005 09:22:23 +0200
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: mozilla-firefox
Version: 1.0.4-3
Severity: grave
Tags: security
Justification: user security hole

Firefox 1.0.5 fixes several security bugs, two of them rated critical.
Unfortunately, details for these bugs are embargoed until at least July
20, 2005, so no details so far.

http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox

---------------------------------------
Received: (at 318061-close) by bugs.debian.org; 20 Aug 2005 13:55:47 +0000
>From [EMAIL PROTECTED] Sat Aug 20 06:55:47 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1E6Tgp-0000fy-00; Sat, 20 Aug 2005 06:47:15 -0700
From: Eric Dorland <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#318061: fixed in mozilla-firefox 1.0.4-2sarge2
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sat, 20 Aug 2005 06:47:15 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: mozilla-firefox
Source-Version: 1.0.4-2sarge2

We believe that the bug you reported is fixed in the latest version of
mozilla-firefox, which is due to be installed in the Debian FTP archive:

mozilla-firefox-dom-inspector_1.0.4-2sarge2_i386.deb
  to 
pool/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge2_i386.deb
mozilla-firefox-gnome-support_1.0.4-2sarge2_i386.deb
  to 
pool/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge2_i386.deb
mozilla-firefox_1.0.4-2sarge2.diff.gz
  to pool/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge2.diff.gz
mozilla-firefox_1.0.4-2sarge2.dsc
  to pool/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge2.dsc
mozilla-firefox_1.0.4-2sarge2_i386.deb
  to pool/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Eric Dorland <[EMAIL PROTECTED]> (supplier of updated mozilla-firefox package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 12 Aug 2005 19:52:58 -0400
Source: mozilla-firefox
Binary: mozilla-firefox mozilla-firefox-gnome-support 
mozilla-firefox-dom-inspector
Architecture: source i386
Version: 1.0.4-2sarge2
Distribution: stable-security
Urgency: critical
Maintainer: Eric Dorland <[EMAIL PROTECTED]>
Changed-By: Eric Dorland <[EMAIL PROTECTED]>
Description: 
 mozilla-firefox - lightweight web browser based on Mozilla
 mozilla-firefox-dom-inspector - tool for inspecting the DOM of pages in 
Mozilla Firefox
 mozilla-firefox-gnome-support - Support for Gnome in Mozilla Firefox
Closes: 318061
Changes: 
 mozilla-firefox (1.0.4-2sarge2) stable-security; urgency=critical
 .
   * Fixes for various security vulnerabilities. (Closes: #318061)
   * The previous (unreleased) version fixes MFSA2005-51: "The return of
     frame-injection spoofing" aka CAN-2005-1937, which is really just the
     return of CAN-2004-0718.
   * accessible/src/base/nsBaseWidgetAccessible.cpp,
     content/base/public/nsContentUtils.h,
     content/base/src/nsContentUtils.cpp, content/base/src/nsDocument.cpp,
     content/base/src/nsDocument.h, content/base/src/nsDocumentViewer.cpp,
     content/base/src/nsGenericDOMDataNode.cpp,
     content/base/src/nsGenericElement.cpp,
     content/base/src/nsGenericElement.h,
     content/base/src/nsImageLoadingContent.cpp,
     content/base/src/nsSelection.cpp,
     content/events/public/nsIEventListenerManager.h,
     content/events/public/nsIPrivateDOMEvent.h,
     content/events/public/nsMutationEvent.h,
     content/events/src/nsDOMEvent.cpp,
     content/events/src/nsEventListenerManager.cpp,
     content/events/src/nsEventListenerManager.h,
     content/events/src/nsEventStateManager.cpp,
     content/html/content/src/nsGenericHTMLElement.cpp,
     content/html/content/src/nsHTMLButtonElement.cpp,
     content/html/content/src/nsHTMLFormElement.cpp,
     content/html/content/src/nsHTMLInputElement.cpp,
     content/html/content/src/nsHTMLScriptElement.cpp,
     content/html/content/src/nsHTMLSelectElement.cpp,
     content/html/content/src/nsHTMLTextAreaElement.cpp,
     content/svg/content/src/nsSVGElement.cpp,
     content/xbl/src/nsXBLBinding.cpp, content/xbl/src/nsXBLBinding.h,
     content/xbl/src/nsXBLPrototypeHandler.cpp,
     content/xml/content/src/nsXMLElement.cpp,
     content/xml/document/src/nsXMLDocument.cpp,
     content/xul/content/src/nsXULElement.cpp,
     content/xul/document/src/nsXULCommandDispatcher.cpp,
     content/xul/document/src/nsXULDocument.cpp,
     dom/public/idl/events/Makefile.in, dom/src/base/nsDOMClassInfo.cpp,
     dom/src/base/nsDOMClassInfo.h, dom/src/base/nsGlobalWindow.cpp,
     dom/src/base/nsGlobalWindow.h, dom/src/base/nsJSEnvironment.cpp,
     dom/src/base/nsWindowRoot.cpp, dom/src/base/nsWindowRoot.h,
     extensions/xmlextras/base/src/nsXMLHttpRequest.cpp,
     layout/html/base/src/nsGfxScrollFrame.cpp,
     layout/html/base/src/nsObjectFrame.cpp,
     layout/html/base/src/nsPresShell.cpp,
     layout/html/forms/public/nsIFormControlFrame.h,
     layout/html/forms/src/nsComboboxControlFrame.cpp,
     layout/html/forms/src/nsComboboxControlFrame.h,
     layout/html/forms/src/nsFileControlFrame.h,
     layout/html/forms/src/nsFormControlFrame.cpp,
     layout/html/forms/src/nsFormControlFrame.h,
     layout/html/forms/src/nsGfxButtonControlFrame.cpp,
     layout/html/forms/src/nsHTMLButtonControlFrame.cpp,
     layout/html/forms/src/nsHTMLButtonControlFrame.h,
     layout/html/forms/src/nsImageControlFrame.cpp,
     layout/html/forms/src/nsListControlFrame.cpp,
     layout/html/forms/src/nsListControlFrame.h,
     layout/html/forms/src/nsTextControlFrame.cpp,
     layout/html/forms/src/nsTextControlFrame.h,
     layout/xul/base/src/nsBoxFrame.cpp,
     layout/xul/base/src/nsButtonBoxFrame.cpp,
     layout/xul/base/src/nsButtonBoxFrame.h,
     layout/xul/base/src/nsImageBoxFrame.cpp,
     layout/xul/base/src/nsMenuFrame.cpp,
     layout/xul/base/src/nsPopupSetFrame.cpp,
     layout/xul/base/src/nsResizerFrame.cpp,
     layout/xul/base/src/nsResizerFrame.h,
     layout/xul/base/src/nsScrollBoxFrame.cpp,
     layout/xul/base/src/nsScrollbarButtonFrame.cpp,
     layout/xul/base/src/nsTitleBarFrame.cpp,
     layout/xul/base/src/nsTitleBarFrame.h,
     layout/xul/base/src/tree/src/nsTreeBodyFrame.cpp,
     layout/xul/base/src/tree/src/nsTreeSelection.cpp,
     toolkit/components/satchel/src/nsFormFillController.cpp,
     view/public/nsIViewObserver.h, view/src/nsViewManager.cpp,
     webshell/public/nsILinkHandler.h, widget/public/nsEvent.h,
     widget/public/nsGUIEvent.h, widget/public/nsIEventListener.h,
     widget/public/nsIWidget.h, widget/src/beos/nsWindow.cpp,
     widget/src/cocoa/nsChildView.mm, widget/src/cocoa/nsCocoaWindow.mm,
     widget/src/cocoa/nsMenuBarX.cpp, widget/src/cocoa/nsMenuItemX.cpp,
     widget/src/cocoa/nsMenuX.cpp, widget/src/gtk/nsGtkEventHandler.cpp,
     widget/src/gtk/nsWidget.cpp, widget/src/gtk/nsWindow.cpp,
     widget/src/gtk2/nsCommonWidget.cpp, widget/src/gtk2/nsWindow.cpp,
     widget/src/mac/nsMacControl.cpp, widget/src/mac/nsMacEventHandler.cpp,
     widget/src/mac/nsMacWindow.cpp, widget/src/mac/nsMenuBarX.cpp,
     widget/src/mac/nsMenuX.cpp, widget/src/mac/nsWindow.cpp,
     widget/src/os2/nsFrameWindow.cpp, widget/src/os2/nsWindow.cpp,
     widget/src/photon/nsWidget.cpp, widget/src/photon/nsWidget.h,
     widget/src/photon/nsWindow.cpp,
     widget/src/windows/nsNativeDragTarget.cpp,
     widget/src/windows/nsWindow.cpp, widget/src/xlib/nsAppShell.cpp,
     widget/src/xlib/nsWidget.cpp, widget/src/xlib/nsWindow.cpp,
     xpfe/appshell/src/nsWebShellWindow.cpp,
     xpfe/appshell/src/nsXULWindow.cpp: Huge patch from bz#289940 to fix
     MFSA2005-45: "Content-generated event vulnerabilities" aka
     CAN-2005-2260.
   * content/base/src/nsContentUtils.cpp,
     dom/public/idl/events/nsIDOMNSEventTarget.idl: Fixes for the above
     patch.
   * content/xbl/src/nsXBLBinding.cpp: Patch from bz#292591 to fix
     MFSA2005-46: "XBL scripts ran even when Javascript disabled" aka
     CAN-2005-2261.
   * browser/base/content/browser.js,
     browser/base/content/setWallpaper.xul: Patch from bz#292737 to fix
     MFSA2005-47: "Code execution via "Set as Wallpaper"", aka
     CAN-2005-2262.
   * xpinstall/src/nsJSInstallTriggerGlobal.cpp,
     xpinstall/src/nsXPITriggerInfo.h, xpinstall/src/nsXPITriggerInfo.cpp:
     Patch from bz#293331 to fix MFSA2005-48: "Same-origin violation with
     InstallTrigger callback" aka CAN-2005-2263.
   * browser/base/content/browser.js: Patch from bz#294074 to fix
     MFSA2005-49: "Script injection from Firefox sidebar panel using
     data:" aka CAN-2005-2264.
   * xpinstall/src/nsJSInstall.cpp, xpinstall/src/nsJSWinProfile.cpp,
     xpinstall/src/nsJSInstallTriggerGlobal.cpp,
     xpinstall/src/nsJSInstallVersion.cpp, xpinstall/src/nsJSFile.cpp,
     xpinstall/src/nsJSWinReg.cpp, xpinstall/src/nsJSFileSpecObj.cpp:
     Patches from bz#295854 to fix MFSA2005-50: "Possibly exploitable crash
     in InstallVersion.compareTo" aka CAN-2005-2265.
   * content/html/document/src/nsHTMLDocument.cpp: Patch from bz#296830 to
     fix MFSA2005-52: " Same origin violation: frame calling top.focus()"
     aka CAN-2005-2266.
   * browser/base/content/browser.js, docshell/base/nsDocShell.cpp,
     docshell/base/nsDocShell.h, docshell/base/nsIDocShellLoadInfo.idl,
     docshell/base/nsIWebNavigation.idl: Patch from bz#298255 for
     MFSA2005-53: "Standalone applications can run arbitrary code through
     the browser" aka CAN-2005-2267.
   * dom/src/base/nsGlobalWindow.cpp: Patch from bz#298934 for MFSA2005-54:
     "Javascript prompt origin spoofing" aka CAN-2005-2268.
   * browser/base/content/browser.js,
     browser/base/content/utilityOverlay.js,
     toolkit/components/help/content/help.js,
     xpfe/communicator/resources/content/contentAreaUtils.js,
     xpfe/communicator/resources/content/contentAreaClick.js,
     xpfe/communicator/resources/content/nsContextMenu.js: Patches from
     bz#298892 to fix MFSA2005-55: "XHTML node spoofing" aka CAN-2005-2269.
   * js/src/xpconnect/src/XPCDispObject.cpp,
     js/src/xpconnect/src/XPCIDispatchExtension.cpp,
     js/src/xpconnect/src/xpccomponents.cpp,
     js/src/xpconnect/src/xpcjsruntime.cpp,
     js/src/xpconnect/src/xpcprivate.h,
     js/src/xpconnect/src/xpcwrappednativeinfo.cpp,
     js/src/xpconnect/src/xpcwrappednativejsops.cpp,
     js/src/xpconnect/src/xpcwrappednativescope.cpp: Patch from bz#294795
     to partially fix MFSA2005-56: "Code execution through shared function
     objects" aka CAN-2005-2270.
   * js/src/jsobj.c, js/src/jsregexp.c: Apply patches from bz#296397 to fix
     the rest of CAN-2005-2270.
Files: 
 a5cf2fc8bc04662e6c192c15666011e4 1001 web optional 
mozilla-firefox_1.0.4-2sarge2.dsc
 45e66f5ddde0d5c016fd15268da0e522 285974 web optional 
mozilla-firefox_1.0.4-2sarge2.diff.gz
 54e66239bff8195d09a76a8b0c65e096 8887610 web optional 
mozilla-firefox_1.0.4-2sarge2_i386.deb
 e40d4387cdf627df5706e8a83f39640d 156664 web optional 
mozilla-firefox-dom-inspector_1.0.4-2sarge2_i386.deb
 3bc7062690df1334a92eeeae36819ea0 53906 web optional 
mozilla-firefox-gnome-support_1.0.4-2sarge2_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC/xY+W5ql+IAeqTIRAicxAJ4jEgpSE78a9TMj+Ak4n/QFdAyjMACePcBj
U8CHa7WKezKU59a8iNp8Q4o=
=yf3x
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to