This bug was fixed in the package seamonkey - 1.1.12+nobinonly- 0ubuntu0.8.04.1
--------------- seamonkey (1.1.12+nobinonly-0ubuntu0.8.04.1) hardy-security; urgency=low * New security upstream release: 1.1.12 (LP: #276437) - CVE-2008-4070: Heap overflow when canceling newsgroup message - CVE-2008-4069: XBM image uninitialized memory reading - CVE-2008-4067..4068: resource: traversal vulnerabilities - CVE-2008-4065..4066: BOM characters stripped from JavaScript before execution - CVE-2008-4061..4064: Crashes with evidence of memory corruption - CVE-2008-4058..4060: Privilege escalation via XPCnativeWrapper pollution - CVE-2008-3837: Forced mouse drag - CVE-2008-3835: nsXMLDocument::OnChannelRedirect() same-origin violation - CVE-2008-0016: UTF-8 URL stack buffer overflow * Also includes security fixes from 1.1.11 and 1.1.10 (LP: #218534) - CVE-2008-2785: Remote code execution by overflowing CSS reference counter - CVE-2008-2811: Crash and remote code execution in block reflow - CVE-2008-2810: Remote site run as local file via Windows URL shortcut - CVE-2008-2809: Peer-trusted certs can use alt names to spoof - CVE-2008-2808: File location URL in directory listings not escaped properly - CVE-2008-2807: Faulty .properties file results in uninitialized memory being used - CVE-2008-2806: Arbitrary socket connections with Java LiveConnect on Mac OS X - CVE-2008-2805: Arbitrary file upload via originalTarget and DOM Range - MFSA 2008-26 (follow-up of CVE-2008-0304): Buffer length checks in MIME processing - CVE-2008-2803: Arbitrary code execution in mozIJSSubScriptLoader.loadSubScript() - CVE-2008-2802: Chrome script loading from fastload file - CVE-2008-2801: Signed JAR tampering - CVE-2008-2800: XSS through JavaScript same-origin violation - CVE-2008-2798..2799: Crashes with evidence of memory corruption - CVE-2008-1380: Crash in JavaScript garbage collector * Refresh diverged patch: - update debian/patches/80_security_build.patch * Fix FTBFS with missing -lfontconfig - add debian/patches/11_fix_ftbfs_with_fontconfig.patch - update debian/patches/series -- Fabien Tassin <[EMAIL PROTECTED]> Tue, 30 Sep 2008 22:44:30 +0200 ** Changed in: seamonkey (Ubuntu Hardy) Status: Triaged => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-0016 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-0304 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2785 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2798 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2800 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2801 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2802 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2803 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2805 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2806 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2807 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2808 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2809 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2810 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-2811 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-3835 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-3837 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-4058 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-4061 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-4065 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-4067 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-4069 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-4070 -- [Needs Packaging] JavaScript vulnerability in Firefox/Thunderbird/SeaMonkey/Xulrunner before 2.0.0.14/1.1.10/1.8.1.14 https://bugs.launchpad.net/bugs/218534 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs