From owner-svn-ports-all@freebsd.org Tue Mar 8 19:45:12 2016
Return-Path: Mozilla Foundation reports: MFSA 2016-16 Miscellaneous memory safety hazards (rv:45.0
+ / rv:38.7) MFSA 2016-17 Local file overwriting and potential
+ privilege escalation through CSP reports MFSA 2016-18 CSP reports fail to strip location
+ information for embedded iframe pages MFSA 2016-19 Linux video memory DOS with Intel
+ drivers MFSA 2016-20 Memory leak in libstagefright when deleting
+ an array during MP4 processing MFSA 2016-21 Displayed page address can be overridden MFSA 2016-22 Service Worker Manager out-of-bounds read in
+ Service Worker Manager MFSA 2016-23 Use-after-free in HTML5 string parser MFSA 2016-24 Use-after-free in SetBody MFSA 2016-25 Use-after-free when using multiple WebRTC
+ data channels MFSA 2016-26 Memory corruption when modifying a file
+ being read by FileReader MFSA 2016-27 Use-after-free during XML
+ transformations MFSA 2016-28 Addressbar spoofing though history
+ navigation and Location protocol property MFSA 2016-29 Same-origin policy violation using
+ perfomance.getEntries and history navigation with session
+ restore MFSA 2016-30 Buffer overflow in Brotli decompression MFSA 2016-31 Memory corruption with malicious NPAPI
+ plugin MFSA 2016-32 WebRTC and LibVPX vulnerabilities found
+ through code inspection MFSA 2016-33 Use-after-free in GetStaticInstance in
+ WebRTC MFSA 2016-34 Out-of-bounds read in HTML parser following
+ a failed allocation Mozilla Foundation reports: Security researcher Holger Fuhrmannek and Mozilla
+ security engineer Tyson Smith reported a number of security
+ vulnerabilities in the Graphite 2 library affecting version
+ 1.3.5.
+
+ The issue reported by Holger Fuhrmannek is a mechanism to
+ induce stack corruption with a malicious graphite font. This
+ leads to a potentially exploitable crash when the font is
+ loaded.
+
+ Tyson Smith used the Address Sanitizer tool in concert with
+ a custom software fuzzer to find a series of uninitialized
+ memory, out-of-bounds read, and out-of-bounds write errors
+ when working with fuzzed graphite fonts. Mozilla Foundation reports: Security researcher Francis Gabriel reported a heap-based
+ buffer overflow in the way the Network Security Services
+ (NSS) libraries parsed certain ASN.1 structures. An attacker
+ could create a specially-crafted certificate which, when
+ parsed by NSS, would cause it to crash or execute arbitrary
+ code with the permissions of the user. Mozilla developer Tim Taubert used the Address Sanitizer
+ tool and software fuzzing to discover a use-after-free
+ vulnerability while processing DER encoded keys in the
+ Network Security Services (NSS) libraries. The vulnerability
+ overwrites the freed memory with zeroes. Mozilla Foundation reports: Security researcher Hanno Böck reported that calculations
+ with mp_div and mp_exptmod in Network Security Services
+ (NSS) can produce wrong results in some circumstances. These
+ functions are used within NSS for a variety of cryptographic
+ division functions, leading to potential cryptographic
+ weaknesses. Mozilla developer Eric Rescorla reported that a failed
+ allocation during DHE and ECDHE handshakes would lead to a
+ use-after-free vulnerability.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
MFSA 2016-06 Missing delay following user click events in protocol handler dialog
-MFSA 2016-07 Errors in mp_div and mp_exptmod - cryptographic functions in NSS
MFSA 2016-09 Addressbar spoofing attacks
MFSA 2016-10 Unsafe memory manipulation found through code inspection
@@ -2550,7 +2839,6 @@ Notes: