Change log for mozilla-thunderbird package in Ubuntu
51 → 60 of 60 results | First • Previous • Next • Last |
Superseded in dapper-release |
mozilla-thunderbird (1.5-0ubuntu6) dapper; urgency=low * debian/mozilla-thunderbird.desktop: - change menu title from "Thunderbird Mail Client" to "Thunderbird Mail" -- Sebastien Bacher <email address hidden> Thu, 9 Mar 2006 12:57:55 +0000
Superseded in dapper-release |
mozilla-thunderbird (1.5-0ubuntu5) dapper; urgency=low * debian/global-config.js: Set intl.locale.matchOS by default to make locale packages work. -- Martin Pitt <email address hidden> Tue, 28 Feb 2006 11:19:46 +0100
Superseded in dapper-release |
mozilla-thunderbird (1.5-0ubuntu4) dapper; urgency=low * Re-enable patch 20_mailnews_mime_makefile_in.dpatch to export proper headers to our -dev package so we can get engimail building again. * Re-enable pango support, adding 10_pangoxft_linkage.dpatch, which fixes the build to link pangoxft, which we directly include and use. -- Adam Conrad <email address hidden> Mon, 13 Feb 2006 14:29:43 +1100
mozilla-thunderbird (1.5-0ubuntu3) dapper; urgency=low * Revert pango support for now. We appear to be calling into libpangoxft without linking to it, and I don't have time this week to sort it out. -- Adam Conrad <email address hidden> Fri, 20 Jan 2006 01:48:13 +1100
Obsolete in breezy-updates |
mozilla-thunderbird (1.0.7-0ubuntu05.10) breezy-updates; urgency=low * Bump version number to be higher than the version in hoary-security. -- Adam Conrad <email address hidden> Thu, 13 Oct 2005 17:44:01 +1000
mozilla-thunderbird (1.0.7-0ubuntu1) breezy; urgency=low * SECURITY UPDATE: Update to 1.0.7 to resolve multiple issues: + CAN-2005-2871, MFSA-2005-57 - IDN heap overrun + CAN-2005-2701, MFSA-2005-58 - Heap overrun in XBM image processing + CAN-2005-2702, MFSA-2005-58 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703, MFSA-2005-58 - XMLHttpRequest header spoofing + CAN-2005-2704, MFSA-2005-58 - Object spoofing using XBL <implements> + CAN-2005-2705, MFSA-2005-58 - JavaScript integer overflow + CAN-2005-2706, MFSA-2005-58 - Privilege escalation using about: scheme + CAN-2005-2707, MFSA-2005-58 - Chrome window spoofing * CAN-2005-2968, MFSA-2005-59 (Command-line shell execution vulnerability) was addressed in Debian in 1.0.6-4, and we're preferring their patch over upstream's, as it allows us to update with the minimum amount of fuss, without re-diffing all our other patches (see Debian bug #329667) * Drop 81_security-idn-normalization.dpatch, now included upstream. * Compile with -fno-strict-aliasing (as discussed in Ubuntu bug #17276) -- Adam Conrad <email address hidden> Mon, 10 Oct 2005 18:39:53 +1000
mozilla-thunderbird (1.0.7-0ubuntu05.04) hoary-security; urgency=low * SECURITY UPDATE: Update to 1.0.7 to resolve multiple issues: + CAN-2005-2871, MFSA-2005-57 - IDN heap overrun + CAN-2005-2701, MFSA-2005-58 - Heap overrun in XBM image processing + CAN-2005-2702, MFSA-2005-58 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703, MFSA-2005-58 - XMLHttpRequest header spoofing + CAN-2005-2704, MFSA-2005-58 - Object spoofing using XBL <implements> + CAN-2005-2705, MFSA-2005-58 - JavaScript integer overflow + CAN-2005-2706, MFSA-2005-58 - Privilege escalation using about: scheme + CAN-2005-2707, MFSA-2005-58 - Chrome window spoofing * CAN-2005-2968, MFSA-2005-59 (Command-line shell execution vulnerability) was addressed in Debian in 1.0.6-4, and we're preferring their patch over upstream's, as it allows us to update with the minimum amount of fuss, without re-diffing all our other patches (see Debian bug #329667) * Drop 81_security-idn-normalization.dpatch, now included upstream. -- Adam Conrad <email address hidden> Mon, 10 Oct 2005 18:39:53 +1000
mozilla-thunderbird (1.0.2-1) hoary; urgency=low * New upstream release with security and stability fixes: - MFSA 2005-30 GIF heap overflow parsing Netscape extension 2 - MFSA 2005-25 Image drag and drop executable spoofing - MFSA 2005-21 Overwrite arbitrary files downloading .lnk twice - MFSA 2005-18 Memory overwrite in string library - MFSA 2005-17 Install source spoofing with user:pass@host - MFSA 2005-15 Heap overflow possible in UTF8 to Unicode conversion -- Tollef Fog Heen <email address hidden> Mon, 4 Apr 2005 14:24:50 +0200
mozilla-thunderbird (1.0.7-0ubuntu04.10) warty-security; urgency=low * SECURITY UPDATE: Update to 1.0.7 to resolve multiple issues: + CAN-2005-2871, MFSA-2005-57 - IDN heap overrun + CAN-2005-2701, MFSA-2005-58 - Heap overrun in XBM image processing + CAN-2005-2702, MFSA-2005-58 - Crash on "zero-width non-joiner" sequence + CAN-2005-2703, MFSA-2005-58 - XMLHttpRequest header spoofing + CAN-2005-2704, MFSA-2005-58 - Object spoofing using XBL <implements> + CAN-2005-2705, MFSA-2005-58 - JavaScript integer overflow + CAN-2005-2706, MFSA-2005-58 - Privilege escalation using about: scheme + CAN-2005-2707, MFSA-2005-58 - Chrome window spoofing * CAN-2005-2968, MFSA-2005-59 (Command-line shell execution vulnerability) was addressed in Debian in 1.0.6-4, and we're preferring their patch over upstream's, as it allows us to update with the minimum amount of fuss, without re-diffing all our other patches (see Debian bug #329667) * Drop 81_security-idn-normalization.dpatch, now included upstream. -- Adam Conrad <email address hidden> Mon, 10 Oct 2005 18:39:53 +1000
Obsolete in warty-release |
mozilla-thunderbird (0.8-2ubuntu2) warty; urgency=low * Ensure that XUL.mfasl is removed cleanly to mitigate profile problems (1933,2266,possibly 2244) -- Thom May <email address hidden> Tue, 12 Oct 2004 13:01:15 +0100
51 → 60 of 60 results | First • Previous • Next • Last |