lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Thu Jul 28 20:38:46 2005
From: martin.pitt at canonical.com (Martin Pitt)
Subject: [USN-155-2] Updated Epiphany packages to match
	Mozilla security update

===========================================================
Ubuntu Security Notice USN-155-2	      July 28, 2005
epiphany-browser regressions
https://bugzilla.ubuntu.com/show_bug.cgi?id=13041
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:

epiphany-browser

The problem can be corrected by upgrading the affected package to
version 1.4.4-0ubuntu2.1.  After a standard system upgrade you need to
restart Epiphany to effect the necessary changes.

Details follow:

USN-155-1 fixed some security vulnerabilities of the Mozilla suite.
Unfortunately this update caused regressions in the Epiphany web
browser, which uses parts of the Mozilla browser. The updated packages
fix these problems.


  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser_1.4.4-0ubuntu2.1.diff.gz
      Size/MD5:    10444 722f5a62053980e2d528d8d694f6b2bd
    http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser_1.4.4-0ubuntu2.1.dsc
      Size/MD5:     1991 be1cad27e897e68d4a51981b9d8191fd
    http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser_1.4.4.orig.tar.gz
      Size/MD5:  4944377 6a77c7f33c9a84d90d1ce1616649d09a

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser-dev_1.4.4-0ubuntu2.1_all.deb
      Size/MD5:   161556 c52390446288cdb37d8593b3b9e4a489

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser_1.4.4-0ubuntu2.1_amd64.deb
      Size/MD5:  2878486 29b3d42e5239adec4ab36791f1415253

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser_1.4.4-0ubuntu2.1_i386.deb
      Size/MD5:  2852102 da9e1980facf911a937fcc95085a0a75

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/e/epiphany-browser/epiphany-browser_1.4.4-0ubuntu2.1_powerpc.deb
      Size/MD5:  2850124 baf52c7b42143717ce4209acaa1570a2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050728/5a446484/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ