From owner-cvs-ports@FreeBSD.ORG Mon Apr 28 17:30:48 2008
Return-Path:
Delivered-To: cvs-ports@FreeBSD.org
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34])
by hub.freebsd.org (Postfix) with ESMTP id CD8D61065676;
Mon, 28 Apr 2008 17:30:48 +0000 (UTC) (envelope-from miwi@bsdcrew.de)
Received: from bsdcrew.de (duro.unixfreunde.de [85.214.90.4])
by mx1.freebsd.org (Postfix) with ESMTP id 6644C8FC20;
Mon, 28 Apr 2008 17:30:48 +0000 (UTC) (envelope-from miwi@bsdcrew.de)
Received: by bsdcrew.de (Postfix, from userid 1001)
id 514154AC97; Mon, 28 Apr 2008 19:30:44 +0200 (CEST)
Date: Mon, 28 Apr 2008 19:30:44 +0200
From: Martin Wilke
To: Andrew Pantyukhin
Message-ID: <20080428173044.GA3241@bsdcrew.de>
References: <200804281714.m3SHEIo9043053@repoman.freebsd.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; x-action=pgp-signed
Content-Disposition: inline
In-Reply-To: <200804281714.m3SHEIo9043053@repoman.freebsd.org>
User-Agent: Mutt/1.5.17 (2007-11-01)
Cc: cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org, ports-committers@FreeBSD.org
Subject: Re: cvs commit: ports/security/vuxml vuln.xml
X-BeenThere: cvs-ports@freebsd.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: CVS commit messages for the ports tree
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 28 Apr 2008 17:30:48 -0000
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Mon, Apr 28, 2008 at 05:14:18PM +0000, Andrew Pantyukhin wrote:
> sat 2008-04-28 17:14:17 UTC
>
> FreeBSD ports repository
>
> Modified files:
> security/vuxml vuln.xml
> Log:
> - A new Firefox vulnerability currently affects 10 of our ports, on
> average. A new VuXML entry usually forgets about 8 of them.
>
Hi Andrew,
That's wrong, seamonkey and thunderbird is't affected,
http://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird
http://www.mozilla.org/projects/security/known-vulnerabilities.html#SeaMonkey
and Thunderbird 2.0.14 and Seamonkey 1.1.10 is't released.
Please revert back this.
> Wiki: http://wiki.freebsd.org/VuXML
>
> Revision Changes Path
> 1.1613 +29 -7 ports/security/vuxml/vuln.xml
> http://cvsweb.FreeBSD.org/ports/security/vuxml/vuln.xml.diff?r1=1.1612&r2=1.1613
> | --- ports/security/vuxml/vuln.xml 2008/04/28 07:34:38 1.1612
> | +++ ports/security/vuxml/vuln.xml 2008/04/28 17:14:17 1.1613
> | @@ -28,7 +28,7 @@ WHETHER IN CONTRACT, STRICT LIABILITY, O
> | OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
> | EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> |
> | - $FreeBSD: /usr/local/www/cvsroot/FreeBSD/ports/security/vuxml/vuln.xml,v 1.1612 2008/04/28 07:34:38 miwi Exp $
> | + $FreeBSD: /usr/local/www/cvsroot/FreeBSD/ports/security/vuxml/vuln.xml,v 1.1613 2008/04/28 17:14:17 sat Exp $
> |
> | Note: Please add new entries to the beginning of this file.
> |
> | @@ -212,7 +212,7 @@ Note: Please add new entries to the beg
> |
> |
> |
> | - firefox -- javascript harbage collector vulnerability
> | + firefox -- javascript garbage collector vulnerability
> |
> |
> | firefox
> | @@ -222,17 +222,38 @@ Note: Please add new entries to the beg
> | linux-firefox
> | 2.0.0.14
> |
> | +
> | + seamonkey
> | + linux-seamonkey
> | + 1.1.10
> | +
> | +
> | + flock
> | + linux-flock
> | + 1.1.2
> | +
> | +
> | + linux-firefox-devel
> | + linux-seamonkey-devel
> | + 0
> | +
> | +
> | + thunderbird
> | + linux-thunderbird
> | + 2.0.0.14
> | +
> |
> |
> |
> | Mozilla Foundation reports:
> |
> | Fixes for security problems in the JavaScript engine described in
> | - MFSA 2008-15 introduced a stability problem, where some users experienced
> | - crashes during JavaScript garbage collection. This is being fixed primarily
> | - to address stability concerns. We have no demonstration that this particular
> | - crash is exploitable but are issuing this advisory because some crashes of this
> | - type have been shown to be exploitable in the past.
> | + MFSA 2008-15 introduced a stability problem, where some users
> | + experienced crashes during JavaScript garbage collection. This is
> | + being fixed primarily to address stability concerns. We have no
> | + demonstration that this particular crash is exploitable but are
> | + issuing this advisory because some crashes of this type have been
> | + shown to be exploitable in the past.
> |
> |
> |
> | @@ -246,6 +267,7 @@ Note: Please add new entries to the beg
> |
> | 2008-04-16
> | 2008-04-25
> | + 2008-04-28
> |
> |
> |
>
- --
+-----------------------+-------------------------------+
| PGP : 0x05682353 | Jabber : miwi(at)BSDCrew.de |
| ICQ : 169139903 | Mail : miwi(at)FreeBSD.org |
+-----------------------+-------------------------------+
| Mess with the Best, Die like the Rest! |
+-----------------------+-------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4 (FreeBSD)
iD8DBQFIFgnCFwpycAVoI1MRAgS4AJ9FLmjdFnkdhvrRfO6d7uwccLDDagCfaXBm
Nt3nthxBIUdEFgMmoCg/j4U=
=JkyL
-----END PGP SIGNATURE-----