Change logs for seamonkey source package in Karmic

  • seamonkey (2.0.11+build1+nobinonly-0ubuntu0.9.10.1) karmic-security; urgency=low
    
      * New upstream release v2.0.11 (SEAMONKEY_2_0_11_BUILD1)
      * SECURITY UPDATE:
        - http://www.mozilla.org/security/known-vulnerabilities/seamonkey20.html#seamonkey2.0.11
      * Fixes LP: #575160 - seamonkey 2.0 crashes with 'RenderBadPicture'
     -- Chris Coulson <email address hidden>   Mon, 06 Dec 2010 13:46:58 +0000
  • seamonkey (2.0.10+build1+nobinonly-0ubuntu0.9.10.1) karmic-security; urgency=low
    
      * New upstream release v2.0.10 (SEAMONKEY_2_0_10_BUILD1)
      * SECURITY UPDATE:
        - http://www.mozilla.org/security/known-vulnerabilities/seamonkey20.html#seamonkey2.0.10
     -- Chris Coulson <email address hidden>   Wed, 27 Oct 2010 16:26:47 -0400
  • seamonkey (2.0.9+build1+nobinonly-0ubuntu0.9.10.1) karmic-security; urgency=low
    
      * New upstream release v2.0.9 (SEAMONKEY_2_0_9_BUILD1)
      * SECURITY UPDATE:
        - http://www.mozilla.org/security/known-vulnerabilities/seamonkey20.html#seamonkey2.0.9
    
      * Bump minimum system NSS to 3.12.8 after landing of (bmo: 600104) aka
        Bump minimum required version for system NSS to 3.12.8
        - update debian/rules
      * Bump minimum system NSPR to 4.8.6 after landing of (bmo: 567620) aka
        Bump minimum required version for system NSPR to 4.8.6
        - update debian/rules
      * Fix LP: #646632 - No dictionaries present in Seamonkey. Ship a
        symlink to the system dictionaries
        - update debian/rules
        - update debian/seamonkey-browser.install
      * Fix LP: #643047 - Don't touch $LIBDIR/.autoreg from the seamonkey
        postinst script. The seamonkey package is just a meta-package, and
        the file is shipped by seamonkey-browser. Changing this ensures that
        seamonkey doesn't fail to configure if there is version skew during
        upgrades, and avoids the need for having tight dependencies
        - update debian/rules
        - remove debian/seamonkey.postinst.in
        - remove debian/seamonkey.prerm.in
     -- Chris Coulson <email address hidden>   Tue, 05 Oct 2010 01:15:57 +0100
  • seamonkey (2.0.8+build1+nobinonly-0ubuntu0.9.10.1) karmic-security; urgency=low
    
      * New major upstream release v2.0.8 (SEAMONKEY_2_0_8_BUILD1)
    
      [ Fabien Tassin <email address hidden> ]
      * Add conditional support for system Cairo, NSS, NSPR
        - update debian/rules
      * Update icons from xpm to png
        - update debian/seamonkey-*.{install,links,menu}
      * We no longer need dynamic -lsoftokn, disable NSS_DYNAMIC_SOFTOKN
        - add debian/patches/no_dynamic_nss_softokn.patch
        - update debian/patches/series
    
      [ Micah Gersten <email address hidden> ]
      * Use versioned install directory
        - update debian/rules
      * Bump minimum versions of system libs; cairo to 1.8.8; NSPR to 4.8;
        NSS to 3.12.6
        - update debian/rules
      * Update .install files for latest release
        - update debian/seamonkey-browser.install
        - update debian/seamonkey-mailnews.install
      * Refresh patches
        - update debian/patches/cleaner_dist_clean.patch
        - update debian/patches/fix_installer.patch
        - update debian/patches/seamonkey-fsh.patch
      * Drop cairo FTBFS patch after upstream landing
        - drop debian/patches/fix_ftbfs_with_cairo_fb.patch
        - update debian/series
      * Install gnome components in -browser package so that it works out of the box
        - update debian/seamonkey-browser.install
        - update debian/control
        - update debian/rules
      * Move mozclient to be in source
        - add debian/mozclient/compare.mk
        - add debian/mozclient/seamonkey-remove.binonly.sh
        - add debian/mozclient/seamonkey.conf
        - add debian/mozclient/seamonkey.mk
        - update debian/rules
      * Fix FTBFS on Sparc by disabling jit (LP: #523627)
        - update debian/rules
    
      [ Chris Coulson <email address hidden> ]
      * Ensure the symlinks are installed correctly. File name expansion
        doesn't work in the .links files, so call dh_link explicitly in
        debian/rules instead
        - drop debian/seamonkey-browser.links
        - drop debian/seamonkey-mailnews.links
        - update debian/rules
      * Only the seamonkey-gnome-support package should have dependencies on GNOME
        libraries - ensure that seamonkey-browser doesn't have the GNOME components
        installed when dh_shlibdeps is run
        - update debian/rules
        - update debian/seamonkey-browser.install
      * Refresh patches for new upstream version
        - update debian/patches/seamonkey-fsh.patch
      * Fix LP: #593571 - searching for am-newsblog.xul in the wrong chrome package
        Install the newsblog.js XPCOM component
        - update debian/seamonkey-mailnews.install
     -- Chris Coulson <email address hidden>   Fri, 17 Sep 2010 11:08:01 +0100
  • seamonkey (1.1.17+nobinonly-0ubuntu1) karmic; urgency=low
    
      * New upstream security release: 1.1.17 (LP: #356274)
        - CVE-2009-1841: JavaScript chrome privilege escalation
        - CVE-2009-1838: Arbitrary code execution using event listeners attached to an element whose owner document is null
        - CVE-2009-1836: SSL tampering via non-200 responses to proxy CONNECT requests
        - CVE-2009-1835: Arbitrary domain cookie access by local file: resources
        - CVE-2009-1392, CVE-2009-1832, CVE-2009-1833: Crashes with evidence of memory corruption (rv:1.9.0.11)
        - CVE-2009-1311: POST data sent to wrong site when saving web page with embedded frame
        - CVE-2009-1307:  Same-origin violations when Adobe Flash loaded via view-source: scheme
        - MFSA 2009-33  Crash viewing multipart/alternative message with text/enhanced part
      * removed debian/patches/90_181_484320_attachment_368977.patch
      * removed debian/patches/90_181_485217_attachment_369357.patch
      * removed debian/patches/90_181_485286_attachment_369457.patch
        - update debian/patches/series
    
     -- John Vivirito <email address hidden>   Mon, 06 Jul 2009 13:20:53 -0400
  • seamonkey (1.1.15+nobinonly-0ubuntu2) jaunty; urgency=low
    
      * CVE-2009-1044: Arbitrary code execution via XUL tree element
        - add debian/patches/90_181_484320_attachment_368977.patch
        - update debian/patches/series
      * CVE-2009-1169: XSL Transformation vulnerability
        - add 90_181_485217_attachment_369357.patch
        - add debian/patches/90_181_485286_attachment_369457.patch
    
     -- Alexander Sack <email address hidden>   Tue, 31 Mar 2009 13:21:19 +0200