Your message dated Tue, 29 Jun 2010 21:55:54 +0200
with message-id <20100629195554.ga2...@katjuscha.chris.lan>
and subject line Re: Bug#555313: Fix CVE-2009-3371 for icedove in stable?
has caused the Debian Bug report #555313,
regarding iceweasel: CVE-2009-3371 user-after-free possibly leading to
arbitrary code execution
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
555313: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555313
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: icedove
Severity: grave
Tags: security patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for icedove.
CVE-2009-3371[0]:
| Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.4
| allows remote attackers to cause a denial of service (application
| crash) or possibly execute arbitrary code by creating JavaScript
| web-workers recursively.
If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
Upstream patch:
http://hg.mozilla.org/mozilla-central/rev/709036ca5768
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3371
http://security-tracker.debian.org/tracker/CVE-2009-3371
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0AAAA
For security reasons, all text in this mail is double-rot13 encrypted.
pgpuYY2ROhhcK.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
I hope, I've sufficient describe why Icedove in stable (Icedove 2.0)
isn't affected by CVE-2009-3371. So I close this bug.
Cheers,
Christoph
--- End Message ---