Summary: | <www-client/seamonkey-2.38{,-bin}: Multiple vulnerabilities (CVE-2015-{0819,0820,0821,0822,0823,0824,0825,0826,0827,0828,0829,0830,0831,0832,0833,0834,0835,0836}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | ago, alexander, mozilla |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Kristian Fiskerstrand (RETIRED)
2015-02-27 08:47:28 UTC
+*seamonkey-2.33 (11 Mar 2015) + + 11 Mar 2015; Lars Wendler <polynomial-c@gentoo.org> + -seamonkey-2.31-r1.ebuild, +seamonkey-2.33.ebuild: + Version bump. Removed old. + This relaese should address all mentioned issues. For the record, seamonkey{,-bin}.2.33.1 have already bee stablilized quite a while ago. So all what is necessary here is to decide if we want to send out a GLSA. So added to an existing GLSA, will send out with the next Mozilla products GLSA This issue was resolved and addressed in GLSA 201701-15 at https://security.gentoo.org/glsa/201701-15 by GLSA coordinator Thomas Deutschmann (whissi). SeaMonkey was removed from the GLSA. This issue was resolved and addressed in GLSA 201701-35 at https://security.gentoo.org/glsa/201701-35 by GLSA coordinator Aaron Bauman (b-man). |