Date: Sat, 18 Mar 2017 09:40:22 +0000 (UTC) From: Jan Beich <jbeich@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r436388 - head/security/vuxml Message-ID: <201703180940.v2I9eMX9050036@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: jbeich Date: Sat Mar 18 09:40:21 2017 New Revision: 436388 URL: https://svnweb.freebsd.org/changeset/ports/436388 Log: security/vuxml: mark firefox < 52.0.1 as vulnerable Note, sandboxing isn't implemented on FreeBSD. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat Mar 18 09:01:57 2017 (r436387) +++ head/security/vuxml/vuln.xml Sat Mar 18 09:40:21 2017 (r436388) @@ -58,6 +58,37 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="5f453b69-abab-4e76-b6e5-2ed0bafcaee3"> + <topic>firefox -- integer overflow in createImageBitmap()</topic> + <affects> + <package> + <name>firefox</name> + <range><lt>52.0.1,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Mozilla Foundation reports:</p> + <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2017-08/"> + <p>An integer overflow in createImageBitmap() was reported + through the Pwn2Own contest. The fix for this vulnerability + disables the experimental extensions to the + createImageBitmap API. This function runs in the content + sandbox, requiring a second vulnerability to compromise a + user's computer.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2017-5428</cvename> + <url>https://www.mozilla.org/security/advisories/mfsa2017-08/</url> + </references> + <dates> + <discovery>2017-03-17</discovery> + <entry>2017-03-18</entry> + </dates> + </vuln> + <vuln vid="df45b4bd-0b7f-11e7-970f-002590263bf5"> <topic>moodle -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201703180940.v2I9eMX9050036>