Date: Sun, 29 Mar 2020 21:13:10 +0200 From: Jan Beich <jbeich@FreeBSD.org> To: "Mikhail T." <mi+t@aldan.algebra.com> Cc: gecko@freebsd.org Subject: Re: Restoring seamonkey Message-ID: <r1xb-ezzt-wny@FreeBSD.org> In-Reply-To: <fec57122-bd12-2b6b-4bf0-fe02ec7c59f7@aldan.algebra.com> (Mikhail T.'s message of "Sun, 29 Mar 2020 11:25:11 -0400") References: <857ef528-1dfd-12b6-6579-b03a137ff199@aldan.algebra.com> <wo75-5lf5-wny@FreeBSD.org> <9a797087-e769-3c50-3032-c71b41fab823@aldan.algebra.com> <4ku8-x9zl-wny@FreeBSD.org> <fec57122-bd12-2b6b-4bf0-fe02ec7c59f7@aldan.algebra.com>
next in thread | previous in thread | raw e-mail | index | archive | help
"Mikhail T." <mi+t@aldan.algebra.com> writes: > On 28.03.20 20:47, Jan Beich wrote: > >> Lack of the homework. > > I really don't understand this, Jan... Let's replay: > > 1. I wanted to install Seamonkey on a system I'm dressing up, and > found, that the port is no longer available. > 2. I looked for the final commit-message, and found: > 1. it was deleted by you, last year; > 2. it was deleted for lack of updates. 3. It was deleted due to being perma-vulnerable. 4. It was deleted because of crashes on amd64 when built by Clang 8. 5. It was deleted because it blocked bsd.gecko.mk cleanup. > 3. So, I looked at the upstream's site, and found, that they've made > several releases since then, most recent -- last month. 2.49.5 was released too late while 2.53.1 was vulnerable since release. 2.53.1 is based on ESR60 which is no longer supported by bsd.gecko.mk. https://svnweb.freebsd.org/changeset/ports/511274 > 4. I then wrote you an e-mail inquiring, if the port can be restored... Did you try to build 2.53.1 before writing the email? > Do the 2. and the 3. not qualify as "homework"? What more should I > have done before approaching you for comment? Work with upstream to fix FreeBSD-specific regressions e.g., https://bugzilla.mozilla.org/show_bug.cgi?id=1437670 >> Patches do the talking better. > So, you're angry at me for not doing the work, which you're trying to > dissuade me from doing in the first place? If you don't use bsd.gecko.mk then the revived www/seamonkey wouldn't complicate maintenance of www/firefox + mail/thunderbird. And having a separate maintainer would keep the port under care of a specific person instead of dumping the work on a non-functional team at first opportunity. >> According to SeaMonkey 2.53.1 release notes the engine was updated to >> Firefox 60.2ser with security fixes up to Firefox 72. Current version of >> Firefox is 74 while 75 is expected next week. Finding applicable >> vulnerabilities requires checking the code e.g., trying every fix >> against SeaMonkey tree but assuming some rebase churn. > > So, your earlier statement about it still being vulnerable is not > based on any such research, and cannot be substantiated?.. I'm not a security researcher and don't have access to restricted bugs. Here're a few candidates from a cursory look: - https://hg.mozilla.org/releases/mozilla-release/rev/e50b821c8747 is part of CVE-2020-6800 which applies as is to SeaMonkey 2.53.1. - https://hg.mozilla.org/releases/mozilla-release/rev/c7545f9cfe8f is part of CVE-2020-6798 which needs minor rebase to apply to SeaMonkey 2.53.1. - https://hg.mozilla.org/releases/mozilla-release/rev/23240642f474 is part of CVE-2019-20503 which needs minor rebase to apply to SeaMonkey 2.53.1. - https://hg.mozilla.org/releases/mozilla-release/rev/90e3d7f045bd is part of CVE-2020-6814 which needs minor rebase to apply to SeaMonkey 2.53.1. Thanks to https://wiki.mozilla.org/Security/Bug_Approval_Process obfuscation not all fixes for CVEs are easy to find.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?r1xb-ezzt-wny>