This bug was fixed in the package seamonkey - 1.1.12+nobinonly-0ubuntu1

---------------
seamonkey (1.1.12+nobinonly-0ubuntu1) intrepid; urgency=low

  * New security upstream release: 1.1.12 (LP: #276437)
    - CVE-2008-4070: Heap overflow when canceling newsgroup message
    - CVE-2008-4069: XBM image uninitialized memory reading
    - CVE-2008-4067..4068: resource: traversal vulnerabilities
    - CVE-2008-4065..4066: BOM characters stripped from JavaScript before 
execution
    - CVE-2008-4061..4064: Crashes with evidence of memory corruption
    - CVE-2008-4058..4060: Privilege escalation via XPCnativeWrapper pollution
    - CVE-2008-3837: Forced mouse drag
    - CVE-2008-3835: nsXMLDocument::OnChannelRedirect() same-origin violation
    - CVE-2008-0016: UTF-8 URL stack buffer overflow

 -- Fabien Tassin <[EMAIL PROTECTED]>   Tue, 30 Sep 2008 00:41:24 +0200

** Changed in: seamonkey (Ubuntu Intrepid)
       Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-0016

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-3835

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-3837

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-4058

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-4061

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-4065

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-4067

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-4069

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-4070

-- 
security upgrade of seamonkey 1.1.12
https://bugs.launchpad.net/bugs/276437
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to