-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Sun, 16 Jan 2011 20:27:25 +0100 Source: iceowl Binary: calendar-timezones iceowl-extension calendar-google-provider iceowl iceowl-dbg Architecture: source i386 Version: 1.0~b1+dfsg2-1 Distribution: unstable Urgency: low Maintainer: Alexander Sack <asac@debian.org> Changed-By: Guido Günther <agx@sigxcpu.org> Description: calendar-google-provider - Google Calendar support for lighting- and iceowl-extension calendar-timezones - Timezone Extension for Sunbird/Iceowl (mandatory) iceowl - Standalone Calendar Application iceowl-dbg - Standalone Calendar Application iceowl-extension - Calendar Extension for Thunderbird/Icedove Changes: iceowl (1.0~b1+dfsg2-1) unstable; urgency=low . * [d96a5b0] New upstream version based on icedove 3.0.11 this fixes the following security bugs: - MFSA 2010-74 aka CVE-2010-3776, CVE-2010-3778: Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) - MFSA 2010-75 aka CVE-2010-3769: Buffer overflow while line breaking after document.write with long string - MFSA 2010-78 aka CVE-2010-3768: Add support for OTS font sanitizer - MFSA 2010-73 aka CVE-2010-3765: Heap buffer overflow mixing document.write and DOM insertion - MFSA 2010-64 aka CVE-2010-3174, CVE-2010-3176: Miscellaneous memory safety hazards (rv:1.9.2.11/ 1.9.1.14) - MFSA 2010-65 aka CVE-2010-3179: Buffer overflow and memory corruption using document.write - MFSA 2010-66 aka CVE-2010-3180: Use-after-free error in nsBarProp - MFSA 2010-67 aka CVE-2010-3183: Dangling pointer vulnerability in LookupGetterOrSetter - MFSA 2010-69 aka CVE-2010-3178: Cross-site information disclosure via modal calls - MFSA 2010-71 aka CVE-2010-3182: Unsafe library loading vulnerabilities - MFSA 2010-49 aka CVE-2010-3169: Miscellaneous memory safety hazards (rv:1.9.2.9/ 1.9.1.12) - MFSA 2010-50 aka CVE-2010-2765: Frameset integer overflow vulnerability - MFSA 2010-51 aka CVE-2010-2767: Dangling pointer vulnerability using DOM plugin array - MFSA 2010-53 aka CVE-2010-3166: Heap buffer overflow in nsTextFrameUtils::TransformText - MFSA 2010-54 aka CVE-2010-2760: Dangling pointer vulnerability in nsTreeSelection - MFSA 2010-55 aka CVE-2010-3168: XUL tree removal crash and remote code execution - MFSA 2010-56 ala CVE-2010-3167: Dangling pointer vulnerability in nsTreeContentView - MFSA 2010-57 aka CVE-2010-2766: Crash and remote code execution in normalizeDocument - MFSA 2010-60 aka CVE-2010-2763: XSS using SJOW scripted function - MFSA 2010-61 aka CVE-2010-2768: UTF-7 XSS by overriding document charset using <object> type attribute - MFSA 2010-62 aka CVE-2010-2769: Copy-and-paste or drag-and-drop into designMode document allows XSS - MFSA 2010-63 aka CVE-2010-2764: Information leak via XMLHttpRequest statusText - MFSA 2010-34 aka CVE-2010-1211, CVE-2010-1212: Miscellaneous memory safety hazards (rv:1.9.2.7/ 1.9.1.11) - MFSA 2010-39 aka CVE-2010-2752: nsCSSValue::Array index integer overflow - MFSA 2010-40 aka CVE-2010-2753: nsTreeSelection dangling pointer remote code execution vulnerability - MFSA 2010-41 aka CVE-2010-1205: Remote code execution using malformed PNG image - MFSA 2010-42 aka CVE-2010-1213: Cross-origin data disclosure via Web Workers and importScripts - MFSA 2010-46 aka CVE-2010-0654: Cross-domain data theft using CSS - MFSA 2010-47 aka CVE-2010-2754: Cross-origin data leakage from script filename in error messages - MFSA 2010-25 aka CVE-2010-1121: Re-use of freed object due to scope confusion - MFSA 2010-26 aka CVE-2010-1200, CVE-2010-1201, CVE-2010-1202: Crashes with evidence of memory corruption (rv:1.9.2.4/ 1.9.1.10) - MFSA 2010-29 aka CVE-2010-1196: Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal - MFSA 2010-30 aka CVE-2010-1199: Integer Overflow in XSLT Node Sorting - MFSA 2010-16 aka CVE-2010-0173, CVE-2010-0174: Crashes with evidence of memory corruption (rv:1.9.2.2/ 1.9.1.9/ 1.9.0.19) - MFSA 2010-17 aka CVE-2010-0175: Remote code execution with use-after-free in nsTreeSelection - MFSA 2010-18 aka CVE-2010-0176: Dangling pointer vulnerability in nsTreeContentView - MFSA 2010-22 aka CVE-2009-3555: Update NSS to support TLS renegotiation indication - MFSA 2010-24 aka CVE-2010-0182: XMLDocument::load() doesn't check nsIContentPolicy - MFSA 2010-01 aka CVE-2010-0159: Crashes with evidence of memory corruption (rv:1.9.1.8/ 1.9.0.18) - MFSA 2010-03 aka CVE-2009-1571: Use-after-free crash in HTML parser * [fa7095e] Rebase patches for new upstream version * [3850d60] New patch Don-t-build-unused-bsdiff.patch: Don't build unused bsdiff * [7c49fe4] New patch Revert-post-release-version-bump.patch: Revert post release version bump, this is still 1.0b1 * [bb9e37e] Don't build against the internal libbz2 copy * [44898c0] Build depend on python-ply * [321c9cd] Add preview image taken from icedove to replace the non-free one. Checksums-Sha1: bff22b53c5929bb7a483bd3bda80fdf94b09e938 1808 iceowl_1.0~b1+dfsg2-1.dsc f8d8107b0a21b9b87ae3db5b6833a55ba74c121d 51910411 iceowl_1.0~b1+dfsg2.orig.tar.bz2 57a43273f340a9d85c92d0f18059b8449dc4b8ca 311316 iceowl_1.0~b1+dfsg2-1.debian.tar.gz 21b0b0b0ddc2d730da3827436dae7ac76b11b400 108550 calendar-timezones_1.0~b1+dfsg2-1_i386.deb 03ae19edb1931916aa08f1dfb5c42a2f66e33110 1142290 iceowl-extension_1.0~b1+dfsg2-1_i386.deb dcb9f09ac7be3e855c2c463324b7baaa08dffa53 109382 calendar-google-provider_1.0~b1+dfsg2-1_i386.deb 93453a3db07bc4f123a5aa65a04004ac4f202501 8044660 iceowl_1.0~b1+dfsg2-1_i386.deb ec3c58338164dd3d80fa78298c8b3e6a3405b805 53638980 iceowl-dbg_1.0~b1+dfsg2-1_i386.deb Checksums-Sha256: ba816b303044cb56efba2ab18762dbc9a0107b017edd865db84169401d1b6c9c 1808 iceowl_1.0~b1+dfsg2-1.dsc 147dc74552d0de56ca63379c0feb46affd19e77ce5cb4ed6f6a21bdfaff628d6 51910411 iceowl_1.0~b1+dfsg2.orig.tar.bz2 3ac586444724fd93c9bd16975543038341c057b163ba6f54942ee04c7f0cf94e 311316 iceowl_1.0~b1+dfsg2-1.debian.tar.gz eebc0fd366d78de84664d3d6fc9ebcd983f2823d1feb930704e566acabd72639 108550 calendar-timezones_1.0~b1+dfsg2-1_i386.deb f9bae17b47fbd7ad037aa4927fe5ff99c29176140d2fe1aad6cacd0d5cb771bb 1142290 iceowl-extension_1.0~b1+dfsg2-1_i386.deb df951e052c88f391a4ad85f6585f4659076410c9e990b1b6e878d960562e635d 109382 calendar-google-provider_1.0~b1+dfsg2-1_i386.deb 0af5b3673085b5cc25db93157501441dfcfc23e1db3574609a7af7491909b285 8044660 iceowl_1.0~b1+dfsg2-1_i386.deb 101d1c5d49f1c36f35e38cf0c3556adcec4ab137511a6d726ba6dce5e4d53219 53638980 iceowl-dbg_1.0~b1+dfsg2-1_i386.deb Files: 3724a3e0d0c9e570ec2af838378f1b4c 1808 web optional iceowl_1.0~b1+dfsg2-1.dsc d8494d5df4203253927b905a9bc21860 51910411 web optional iceowl_1.0~b1+dfsg2.orig.tar.bz2 3e3eea0d73d9d0d68daa0a0b640c6b21 311316 web optional iceowl_1.0~b1+dfsg2-1.debian.tar.gz 832498ded40eddca67e0b108895e07f4 108550 web optional calendar-timezones_1.0~b1+dfsg2-1_i386.deb e47a4a29acfdc6282efa1f9291fdfbdd 1142290 web optional iceowl-extension_1.0~b1+dfsg2-1_i386.deb b3c24c7cab0338e36d607c8a168a3e91 109382 web optional calendar-google-provider_1.0~b1+dfsg2-1_i386.deb 0a2a5571df6a4b81167a48321e8c0243 8044660 web optional iceowl_1.0~b1+dfsg2-1_i386.deb 501557c25a6275e0c53cf70a323c9b93 53638980 debug extra iceowl-dbg_1.0~b1+dfsg2-1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iD8DBQFNM1uhn88szT8+ZCYRAqxcAJ91WbOhCXb8q+d6K0Sf4QGf302PQwCfS/2r GelN9q5g+FuMNQcLFh44v8g= =3xx5 -----END PGP SIGNATURE----- Accepted: calendar-google-provider_1.0~b1+dfsg2-1_i386.deb to main/i/iceowl/calendar-google-provider_1.0~b1+dfsg2-1_i386.deb calendar-timezones_1.0~b1+dfsg2-1_i386.deb to main/i/iceowl/calendar-timezones_1.0~b1+dfsg2-1_i386.deb iceowl-dbg_1.0~b1+dfsg2-1_i386.deb to main/i/iceowl/iceowl-dbg_1.0~b1+dfsg2-1_i386.deb iceowl-extension_1.0~b1+dfsg2-1_i386.deb to main/i/iceowl/iceowl-extension_1.0~b1+dfsg2-1_i386.deb iceowl_1.0~b1+dfsg2-1.debian.tar.gz to main/i/iceowl/iceowl_1.0~b1+dfsg2-1.debian.tar.gz iceowl_1.0~b1+dfsg2-1.dsc to main/i/iceowl/iceowl_1.0~b1+dfsg2-1.dsc iceowl_1.0~b1+dfsg2-1_i386.deb to main/i/iceowl/iceowl_1.0~b1+dfsg2-1_i386.deb iceowl_1.0~b1+dfsg2.orig.tar.bz2 to main/i/iceowl/iceowl_1.0~b1+dfsg2.orig.tar.bz2