From owner-freebsd-gecko@FreeBSD.ORG Mon Dec 1 18:23:57 2014 Return-Path: Delivered-To: freebsd-gecko@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id D77B8C93 for ; Mon, 1 Dec 2014 18:23:57 +0000 (UTC) Received: from trillian.chruetertee.ch (trillian.chruetertee.ch [217.150.244.247]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 59F9E2F3 for ; Mon, 1 Dec 2014 18:23:56 +0000 (UTC) Received: from trillian.chruetertee.ch (trillian [217.150.244.247]) by trillian.chruetertee.ch (8.14.4/8.14.3) with ESMTP id sB1INmIs072534 for ; Mon, 1 Dec 2014 18:23:48 GMT (envelope-from svn-freebsd-gecko@chruetertee.ch) Received: (from www@localhost) by trillian.chruetertee.ch (8.14.4/8.14.3/Submit) id sB1INhpd072184 for freebsd-gecko@freebsd.org; Mon, 1 Dec 2014 18:23:43 GMT (envelope-from svn-freebsd-gecko@chruetertee.ch) Date: Mon, 1 Dec 2014 18:23:43 GMT Message-Id: <201412011823.sB1INhpd072184@trillian.chruetertee.ch> X-Authentication-Warning: trillian.chruetertee.ch: www set sender to svn-freebsd-gecko@chruetertee.ch using -f From: svn-freebsd-gecko@chruetertee.ch To: freebsd-gecko@freebsd.org Subject: [SVN-Commit] r1781 - branches/firefox34 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Reply-To: freebsd-gecko@freebsd.org X-BeenThere: freebsd-gecko@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Gecko Rendering Engine issues List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 01 Dec 2014 18:23:58 -0000 Author: jbeich Date: Mon Dec 1 18:23:42 2014 New Revision: 1781 Log: prepare for merge Added: branches/firefox34/ - copied from r1780, trunk/ branches/firefox34/VuXML Added: branches/firefox34/VuXML ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ branches/firefox34/VuXML Mon Dec 1 18:23:42 2014 (r1781) @@ -0,0 +1,76 @@ + + mozilla -- multiple vulnerabilities + + + firefox + 34.0,1 + + + firefox-esr + 31.3.0,1 + + + linux-firefox + 34.0,1 + + + linux-seamonkey + 2.31 + + + linux-thunderbird + 31.3.0 + + + seamonkey + 2.31 + + + thunderbird + 31.3.0 + + + libxul + 31.3.0 + + + + +

The Mozilla Project reports:

+
+

MSFA-2014-89 Bad casting from the BasicThebesLayer to + BasicContainerLayer

+

MSFA-2014-88 Buffer overflow while parsing media content

+

MSFA-2014-87 Use-after-free during HTML5 parsing

+

MSFA-2014-86 CSP leaks redirect data via violation reports

+

MSFA-2014-85 XMLHttpRequest crashes with some input streams

+

MSFA-2014-84 XBL bindings accessible via improper CSS + declarations

+

MSFA-2014-83 Miscellaneous memory safety hazards (rv:34.0 + / rv:31.3)

+
+ +
+ + CVE-2014-1587 + CVE-2014-1588 + CVE-2014-1589 + CVE-2014-1590 + CVE-2014-1591 + CVE-2014-1592 + CVE-2014-1593 + CVE-2014-1594 + https://www.mozilla.org/security/advisories/mfsa2014-83 + https://www.mozilla.org/security/advisories/mfsa2014-84 + https://www.mozilla.org/security/advisories/mfsa2014-85 + https://www.mozilla.org/security/advisories/mfsa2014-86 + https://www.mozilla.org/security/advisories/mfsa2014-87 + https://www.mozilla.org/security/advisories/mfsa2014-88 + https://www.mozilla.org/security/advisories/mfsa2014-89 + https://www.mozilla.org/security/advisories/ + + + 2014-12-01 + 2014-12-01 + +