Date: Fri, 27 Feb 2015 08:28:03 +0000 (UTC) From: Jan Beich <jbeich@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r380068 - head/security/vuxml Message-ID: <201502270828.t1R8S3kf039337@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: jbeich Date: Fri Feb 27 08:28:02 2015 New Revision: 380068 URL: https://svnweb.freebsd.org/changeset/ports/380068 QAT: https://qat.redports.org/buildarchive/r380068/ Log: Fix typo: s/MSFA/MFSA/. The source to follow later. https://bugzilla.mozilla.org/show_bug.cgi?id=1137604 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Feb 27 07:39:43 2015 (r380067) +++ head/security/vuxml/vuln.xml Fri Feb 27 08:28:02 2015 (r380068) @@ -1555,19 +1555,19 @@ Notes: <body xmlns="http://www.w3.org/1999/xhtml"> <p>The Mozilla Project reports:</p> <blockquote cite="https://www.mozilla.org/en-US/security/known-vulnerabilities/"> - <p>MSFA-2015-01 Miscellaneous memory safety hazards (rv:35.0 + <p>MFSA-2015-01 Miscellaneous memory safety hazards (rv:35.0 / rv:31.4)</p> - <p>MSFA-2015-02 Uninitialized memory use during bitmap + <p>MFSA-2015-02 Uninitialized memory use during bitmap rendering</p> - <p>MSFA-2015-03 sendBeacon requests lack an Origin header</p> - <p>MSFA-2015-04 Cookie injection through Proxy Authenticate + <p>MFSA-2015-03 sendBeacon requests lack an Origin header</p> + <p>MFSA-2015-04 Cookie injection through Proxy Authenticate responses</p> - <p>MSFA-2015-05 Read of uninitialized memory in Web Audio</p> - <p>MSFA-2015-06 Read-after-free in WebRTC</p> - <p>MSFA-2015-07 Gecko Media Plugin sandbox escape</p> - <p>MSFA-2015-08 Delegated OCSP responder certificates failure + <p>MFSA-2015-05 Read of uninitialized memory in Web Audio</p> + <p>MFSA-2015-06 Read-after-free in WebRTC</p> + <p>MFSA-2015-07 Gecko Media Plugin sandbox escape</p> + <p>MFSA-2015-08 Delegated OCSP responder certificates failure with id-pkix-ocsp-nocheck extension</p> - <p>MSFA-2015-09 XrayWrapper bypass through DOM objects</p> + <p>MFSA-2015-09 XrayWrapper bypass through DOM objects</p> </blockquote> </body> </description> @@ -2496,17 +2496,17 @@ Notes: <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/"> <p>ASN.1 DER decoding of lengths is too permissive, allowing undetected smuggling of arbitrary data</p> - <p>MSFA-2014-90 Apple CoreGraphics framework on OS X 10.10 + <p>MFSA-2014-90 Apple CoreGraphics framework on OS X 10.10 logging input data to /tmp directory</p> - <p>MSFA-2014-89 Bad casting from the BasicThebesLayer to + <p>MFSA-2014-89 Bad casting from the BasicThebesLayer to BasicContainerLayer</p> - <p>MSFA-2014-88 Buffer overflow while parsing media content</p> - <p>MSFA-2014-87 Use-after-free during HTML5 parsing</p> - <p>MSFA-2014-86 CSP leaks redirect data via violation reports</p> - <p>MSFA-2014-85 XMLHttpRequest crashes with some input streams</p> - <p>MSFA-2014-84 XBL bindings accessible via improper CSS + <p>MFSA-2014-88 Buffer overflow while parsing media content</p> + <p>MFSA-2014-87 Use-after-free during HTML5 parsing</p> + <p>MFSA-2014-86 CSP leaks redirect data via violation reports</p> + <p>MFSA-2014-85 XMLHttpRequest crashes with some input streams</p> + <p>MFSA-2014-84 XBL bindings accessible via improper CSS declarations</p> - <p>MSFA-2014-83 Miscellaneous memory safety hazards (rv:34.0 + <p>MFSA-2014-83 Miscellaneous memory safety hazards (rv:34.0 / rv:31.3)</p> </blockquote> </body>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201502270828.t1R8S3kf039337>