From owner-freebsd-ports@FreeBSD.ORG Sat May 3 14:40:17 2014 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 02E90A4F for ; Sat, 3 May 2014 14:40:17 +0000 (UTC) Received: from isis.morrow.me.uk (isis.morrow.me.uk [204.109.63.142]) by mx1.freebsd.org (Postfix) with ESMTP id D51A91300 for ; Sat, 3 May 2014 14:40:16 +0000 (UTC) Received: from anubis.morrow.me.uk (host109-145-231-72.range109-145.btcentralplus.com [109.145.231.72]) (Authenticated sender: mauzo) by isis.morrow.me.uk (Postfix) with ESMTPSA id 9B5BB45031 for ; Sat, 3 May 2014 14:31:20 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.8.3 isis.morrow.me.uk 9B5BB45031 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=morrow.me.uk; s=dkim201101; t=1399127481; bh=OazJn+zulNp5voH981ZBwff/osquSD/Mt6a9XQaS0AM=; h=Date:From:To:Subject; b=Bkrv9IgE9bLhRPIgmsOltdLlZHrXvXn17ymUCNGh9MXJgv6oY8YzCSlzNK/rDKHeG +NxhJrNXMvPMeeIHy7iflHLiF/Xpft0+HIeGZvBaLXA9C8dSebxjMrCets669G9nlJ 2lcNu/c/RSlyuynqkufmqourB4srsCOJdrgkZo5k= X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.98.1 at isis.morrow.me.uk Received: by anubis.morrow.me.uk (Postfix, from userid 5001) id 84BC213612; Sat, 3 May 2014 15:31:16 +0100 (BST) Date: Sat, 3 May 2014 15:31:16 +0100 From: Ben Morrow To: freebsd-ports@freebsd.org Subject: Firefox vuln in 2014Q2 Message-ID: <20140503143115.GB2997@anubis.morrow.me.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.23 (2014-03-12) X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 May 2014 14:40:17 -0000 Is there any chance of r352640 (the firefox/-esr/thunderbird update) being MFH to 2014Q2? I'm primarily interested in the firefox-esr part, since I'm now running a known-vulnerable version. (Please keep me in CC; I don't read -ports.) Ben