** Changed in: seamonkey (Ubuntu Hardy)
Status: Fix Committed => Fix Released
--
security upgrade of seamonkey 1.1.12
https://bugs.launchpad.net/bugs/276437
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing l
As discussed on IRC-- seamonkey on hardy is built with system nss and
nspr4, and the nss-fips import is not used. Buildlogs and resulting
binaries also show this to be true. 80_security_build.patch is also
obsolete on systems that build with system nss and nspr4, and what it
patches for nss are not
to be precise, those nss changes are visible in the ***context*** of
80_security_build.patch but are not part of what that patch is really
addressing.
Those nss changes are from
https://bugzilla.mozilla.org/show_bug.cgi?id=419030 which took the form
of an import of the main nss branch (a stable ta
Thanks for the work on the Hardy update.
As discussed on IRC. The debdiff for hardy is nearly 632,000 lines long.
The vast majority of this is from nss-fips, which is apparently new.
>From what I can tell, this code is now being used based on changes in
80_security_build.patch. Apparently this is
i tested the browser and mail component for most common use cases (like
AJAX, IMAP etc.). No problems.
--
security upgrade of seamonkey 1.1.12
https://bugs.launchpad.net/bugs/276437
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubu
Can someone comment on the testing done for the hardy upload?
--
security upgrade of seamonkey 1.1.12
https://bugs.launchpad.net/bugs/276437
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.u
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-4068
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-4066
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-4062
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-4
This bug was fixed in the package seamonkey - 1.1.12+nobinonly-0ubuntu1
---
seamonkey (1.1.12+nobinonly-0ubuntu1) intrepid; urgency=low
* New security upstream release: 1.1.12 (LP: #276437)
- CVE-2008-4070: Heap overflow when canceling newsgroup message
- CVE-2008-4069: XBM
** Attachment added: "seamonkey_1.1.12+nobinonly-0ubuntu0.8.04.1.dsc"
http://launchpadlibrarian.net/18096988/seamonkey_1.1.12%2Bnobinonly-0ubuntu0.8.04.1.dsc
--
security upgrade of seamonkey 1.1.12
https://bugs.launchpad.net/bugs/276437
You received this bug notification because you are a me
** Attachment added: "seamonkey_1.1.12+nobinonly-0ubuntu0.8.04.1.diff.gz"
http://launchpadlibrarian.net/18096945/seamonkey_1.1.12%2Bnobinonly-0ubuntu0.8.04.1.diff.gz
--
security upgrade of seamonkey 1.1.12
https://bugs.launchpad.net/bugs/276437
You received this bug notification because you
** Attachment added: "seamonkey_1.1.12+nobinonly-0ubuntu1.dsc"
http://launchpadlibrarian.net/18096899/seamonkey_1.1.12%2Bnobinonly-0ubuntu1.dsc
--
security upgrade of seamonkey 1.1.12
https://bugs.launchpad.net/bugs/276437
You received this bug notification because you are a member of Ubuntu
** Attachment added: "seamonkey_1.1.12+nobinonly-0ubuntu1.diff.gz"
http://launchpadlibrarian.net/18096807/seamonkey_1.1.12%2Bnobinonly-0ubuntu1.diff.gz
--
security upgrade of seamonkey 1.1.12
https://bugs.launchpad.net/bugs/276437
You received this bug notification because you are a member o
Here is the full debdiff for hardy.
** Attachment added:
"seamonkey_1.1.11+nobinonly-0ubuntu1--1.1.12+nobinonly-0ubuntu0.8.04.1.debdiff"
http://launchpadlibrarian.net/18096689/seamonkey_1.1.11%2Bnobinonly-0ubuntu1--1.1.12%2Bnobinonly-0ubuntu0.8.04.1.debdiff
** Changed in: seamonkey (Ubuntu H
Here is the tarball, as from "debian/rules get-orig-source"
** Attachment added: "seamonkey_1.1.12+nobinonly.orig.tar.gz"
http://launchpadlibrarian.net/18096109/seamonkey_1.1.12%2Bnobinonly.orig.tar.gz
--
security upgrade of seamonkey 1.1.12
https://bugs.launchpad.net/bugs/276437
You receive
** Visibility changed to: Public
--
security upgrade of seamonkey 1.1.12
https://bugs.launchpad.net/bugs/276437
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubunt
15 matches
Mail list logo