Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 26 Sep 2004 20:25:47 +0200 (CEST)
From:      Mats Dufberg <mats@dufberg.se>
To:        FreeBSD-gnats-submit@FreeBSD.org
Cc:        mats@dufberg.se
Subject:   ports/72109: Reported vulnerability in firefox before "Firefox Preview Release"
Message-ID:  <20040926182547.A454511612@kafka.home.narnia.pp.se>
Resent-Message-ID: <200409261830.i8QIURl7057485@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         72109
>Category:       ports
>Synopsis:       Reported vulnerability in firefox before "Firefox Preview Release"
>Confidential:   no
>Severity:       serious
>Priority:       high
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Sun Sep 26 18:30:26 GMT 2004
>Closed-Date:
>Last-Modified:
>Originator:     Mats Dufberg
>Release:        FreeBSD 5.2.1-RELEASE-p6 i386
>Organization:
private
>Environment:
System:         FreeBSD 5.2.1-RELEASE-p6


Current version of firefox in ports (firefox-0.9.3;
ports:/www/firefox) is based on firefox version 0.9.3
(firefox-0.9.3-source.tar.bz2). According to information from CERT
(US-CERT Technical Cyber Security Alert TA04-261A -- Multiple
vulnerabilities in Mozilla products;
http://www.us-cert.gov/cas/techalerts/TA04-261A.html) there are
vulnerabilities in that version, which are corrected in next version
of firefox, "Firefox Preview Release", which was announced 14
September 2004.


>Description:
>How-To-Repeat:
>Fix:
>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040926182547.A454511612>