Date: Tue, 26 Apr 2016 20:24:35 +0000 (UTC) From: Jan Beich <jbeich@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r414068 - head/security/vuxml Message-ID: <201604262024.u3QKOZqM035004@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: jbeich Date: Tue Apr 26 20:24:35 2016 New Revision: 414068 URL: https://svnweb.freebsd.org/changeset/ports/414068 Log: Document recent Firefox vulnerabilities Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Apr 26 20:18:07 2016 (r414067) +++ head/security/vuxml/vuln.xml Tue Apr 26 20:24:35 2016 (r414068) @@ -58,6 +58,79 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="92d44f83-a7bf-41cf-91ee-3d1b8ecf579f"> + <topic>mozilla -- multiple vulnerabilities</topic> + <affects> + <package> + <name>firefox</name> + <name>linux-firefox</name> + <range><lt>46.0,1</lt></range> + </package> + <package> + <name>seamonkey</name> + <name>linux-seamonkey</name> + <range><lt>2.43</lt></range> + </package> + <package> + <name>firefox-esr</name> + <range><ge>39.0,1</ge><lt>45.1.0,1</lt></range> + <range><lt>38.8.0,1</lt></range> + </package> + <package> + <name>libxul</name> + <name>thunderbird</name> + <name>linux-thunderbird</name> + <range><ge>39.0</ge><lt>45.1.0</lt></range> + <range><lt>38.8.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Mozilla Foundation reports:</p> + <blockquote cite="https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox/#firefox46"> + <p>MFSA 2016-39 Miscellaneous memory safety hazards (rv:46.0 / + rv:45.1 / rv:38.8)</p> + <p>MFSA 2016-42 Use-after-free and buffer overflow + in Service Workers</p> + <p>MFSA 2016-44 Buffer overflow in libstagefright with + CENC offsets</p> + <p>MFSA 2016-45 CSP not applied to pages sent with + multipart/x-mixed-replace</p> + <p>MFSA 2016-46 Elevation of privilege with + chrome.tabs.update API in web extensions</p> + <p>MFSA 2016-47 Write to invalid HashMap entry through + JavaScript.watch()</p> + <p>MFSA 2016-48 Firefox Health Reports could accept events + from untrusted domains</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-2804</cvename> + <cvename>CVE-2016-2805</cvename> + <cvename>CVE-2016-2806</cvename> + <cvename>CVE-2016-2807</cvename> + <cvename>CVE-2016-2808</cvename> + <cvename>CVE-2016-2811</cvename> + <cvename>CVE-2016-2812</cvename> + <cvename>CVE-2016-2814</cvename> + <cvename>CVE-2016-2816</cvename> + <cvename>CVE-2016-2817</cvename> + <cvename>CVE-2016-2820</cvename> + <url>https://www.mozilla.org/security/advisories/mfsa2016-39/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-42/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-44/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-45/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-46/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-47/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-48/</url> + </references> + <dates> + <discovery>2016-04-26</discovery> + <entry>2016-04-26</entry> + </dates> + </vuln> + <vuln vid="f87a9376-0943-11e6-8fc4-00a0986f28c4"> <topic>phpmyfaq -- cross-site request forgery vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201604262024.u3QKOZqM035004>