Date: Sun, 26 Sep 2004 20:25:47 +0200 (CEST) From: Mats Dufberg <mats@dufberg.se> To: FreeBSD-gnats-submit@FreeBSD.org Cc: mats@dufberg.se Subject: ports/72109: Reported vulnerability in firefox before "Firefox Preview Release" Message-ID: <20040926182547.A454511612@kafka.home.narnia.pp.se> Resent-Message-ID: <200409261830.i8QIURl7057485@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 72109 >Category: ports >Synopsis: Reported vulnerability in firefox before "Firefox Preview Release" >Confidential: no >Severity: serious >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Sun Sep 26 18:30:26 GMT 2004 >Closed-Date: >Last-Modified: >Originator: Mats Dufberg >Release: FreeBSD 5.2.1-RELEASE-p6 i386 >Organization: private >Environment: System: FreeBSD 5.2.1-RELEASE-p6 Current version of firefox in ports (firefox-0.9.3; ports:/www/firefox) is based on firefox version 0.9.3 (firefox-0.9.3-source.tar.bz2). According to information from CERT (US-CERT Technical Cyber Security Alert TA04-261A -- Multiple vulnerabilities in Mozilla products; http://www.us-cert.gov/cas/techalerts/TA04-261A.html) there are vulnerabilities in that version, which are corrected in next version of firefox, "Firefox Preview Release", which was announced 14 September 2004. >Description: >How-To-Repeat: >Fix: >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040926182547.A454511612>