Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 Sep 2014 13:10:18 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 193922] New: security/vuxml: belatedly add Mozilla entry for CVE-2014-155[34] and CVE-2014-156[2-7]
Message-ID:  <bug-193922-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=193922

            Bug ID: 193922
           Summary: security/vuxml: belatedly add Mozilla entry for
                    CVE-2014-155[34] and CVE-2014-156[2-7]
           Product: Ports Tree
           Version: Latest
          Hardware: Any
                OS: Any
            Status: Needs Triage
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-secteam@FreeBSD.org
          Reporter: jbeich@vfemail.net
          Assignee: ports-secteam@FreeBSD.org
             Flags: maintainer-feedback?(ports-secteam@FreeBSD.org)

SeaMonkey and XULRunner are likely affected as well but not listed in MFSAs.
Taking discovery date as the commit date of the latest fix in the series under
esr24 branch.

  <vuln vid="da2e025f-a78d-46e4-83ee-7c65f9897f11">
    <topic>mozilla -- multiple vulnerabilities</topic>
    <affects>
      <package>
    <name>firefox</name>
    <range><lt>32.0,1</lt></range>
      </package>
      <package>
    <name>linux-firefox</name>
    <range><lt>32.0,1</lt></range>
      </package>
      <package>
    <name>firefox-esr</name>
    <range><lt>31.1.0,1</lt></range>
      </package>
      <package>
    <name>linux-thunderbird</name>
    <range><lt>31.1.0</lt></range>
      </package>
      <package>
    <name>thunderbird</name>
    <range><lt>31.1.0</lt></range>
      </package>
      <package>
    <name>linux-seamonkey</name>
    <range><lt>2.29</lt></range>
      </package>
      <package>
    <name>seamonkey</name>
    <range><lt>2.29</lt></range>
      </package>
      <package>
    <name>libxul</name>
    <range><lt>24.8.0</lt></range>
      </package>
    </affects>
    <description>
      <body xmlns="http://www.w3.org/1999/xhtml">;
    <p>The Mozilla Project reports:</p>
    <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">;
      <p>MFSA 2014-72 Use-after-free setting text directionality</p>
      <p>MFSA 2014-71 Profile directory file access through file:
       protocol</p>
      <p>MFSA 2014-70 Out-of-bounds read in Web Audio audio timeline</p>
      <p>MFSA 2014-69 Uninitialized memory use during GIF rendering</p>
      <p>MFSA 2014-68 Use-after-free during DOM interactions with SVG</p>
      <p>MFSA 2014-67 Miscellaneous memory safety hazards
       (rv:32.0 / rv:31.1 / rv:24.8)</p>
    </blockquote>
      </body>
    </description>
    <references>
      <cvename>CVE-2014-1553</cvename>
      <cvename>CVE-2014-1554</cvename>
      <cvename>CVE-2014-1562</cvename>
      <cvename>CVE-2014-1563</cvename>
      <cvename>CVE-2014-1564</cvename>
      <cvename>CVE-2014-1565</cvename>
      <cvename>CVE-2014-1566</cvename>
      <cvename>CVE-2014-1567</cvename>
     
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-67.html</url>;
     
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-68.html</url>;
     
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-69.html</url>;
     
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-70.html</url>;
     
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-71.html</url>;
     
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-72.html</url>;
      <url>https://www.mozilla.org/security/announce/</url>;
    </references>
    <dates>
      <discovery>2014-08-18</discovery>
      <entry>2014-09-02</entry>
    </dates>
  </vuln>

--- Comment #1 from Bugzilla Automation <bugzilla@FreeBSD.org> ---
Auto-assigned to maintainer ports-secteam@FreeBSD.org

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-193922-13>