Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 31 Mar 2015 18:40:30 +0000 (UTC)
From:      Jan Beich <jbeich@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r382858 - head/security/vuxml
Message-ID:  <201503311840.t2VIeUTG040460@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: jbeich
Date: Tue Mar 31 18:40:29 2015
New Revision: 382858
URL: https://svnweb.freebsd.org/changeset/ports/382858
QAT: https://qat.redports.org/buildarchive/r382858/

Log:
  Document mozilla vulnerabilities

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Mar 31 18:28:20 2015	(r382857)
+++ head/security/vuxml/vuln.xml	Tue Mar 31 18:40:29 2015	(r382858)
@@ -57,6 +57,110 @@ Notes:
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="d0c97697-df2c-4b8b-bff2-cec24dc35af8">
+    <topic>mozilla -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>firefox</name>
+	<range><lt>37.0,1</lt></range>
+      </package>
+      <package>
+	<name>firefox-esr</name>
+	<range><lt>31.6.0,1</lt></range>
+      </package>
+      <package>
+	<name>linux-firefox</name>
+	<range><lt>37.0,1</lt></range>
+      </package>
+      <package>
+	<name>linux-seamonkey</name>
+	<range><lt>2.34</lt></range>
+      </package>
+      <package>
+	<name>linux-thunderbird</name>
+	<range><lt>31.6.0</lt></range>
+      </package>
+      <package>
+	<name>seamonkey</name>
+	<range><lt>2.34</lt></range>
+      </package>
+      <package>
+	<name>thunderbird</name>
+	<range><lt>31.6.0</lt></range>
+      </package>
+      <package>
+	<name>libxul</name>
+	<range><lt>31.6.0</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Mozilla Project reports:</p>
+	<blockquote cite="https://www.mozilla.org/en-US/security/known-vulnerabilities/">;
+	  <p>MFSA-2015-30 Miscellaneous memory safety hazards (rv:37.0
+	    / rv:31.6)</p>
+	  <p>MFSA-2015-31 Use-after-free when using the Fluendo MP3
+	    GStreamer plugin</p>
+	  <p>MFSA-2015-32 Add-on lightweight theme installation
+	    approval bypassed through MITM attack</p>
+	  <p>MFSA-2015-33 resource:// documents can load privileged
+	    pages</p>
+	  <p>MFSA-2015-34 Out of bounds read in QCMS library</p>
+	  <p>MFSA-2015-35 Cursor clickjacking with flash and images</p>
+	  <p>MFSA-2015-36 Incorrect memory management for simple-type
+	    arrays in WebRTC</p>
+	  <p>MFSA-2015-37 CORS requests should not follow 30x
+	    redirections after preflight</p>
+	  <p>MFSA-2015-38 Memory corruption crashes in Off Main Thread
+	    Compositing</p>
+	  <p>MFSA-2015-39 Use-after-free due to type confusion flaws</p>
+	  <p>MFSA-2015-40 Same-origin bypass through anchor navigation</p>
+	  <p>MFSA-2015-41 PRNG weakness allows for DNS poisoning on
+	    Android</p>
+	  <p>MFSA-2015-42 Windows can retain access to privileged
+	    content on navigation to unprivileged pages</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2012-2808</cvename>
+      <cvename>CVE-2015-0800</cvename>
+      <cvename>CVE-2015-0801</cvename>
+      <cvename>CVE-2015-0802</cvename>
+      <cvename>CVE-2015-0803</cvename>
+      <cvename>CVE-2015-0804</cvename>
+      <cvename>CVE-2015-0805</cvename>
+      <cvename>CVE-2015-0806</cvename>
+      <cvename>CVE-2015-0807</cvename>
+      <cvename>CVE-2015-0808</cvename>
+      <cvename>CVE-2015-0810</cvename>
+      <cvename>CVE-2015-0811</cvename>
+      <cvename>CVE-2015-0812</cvename>
+      <cvename>CVE-2015-0813</cvename>
+      <cvename>CVE-2015-0814</cvename>
+      <cvename>CVE-2015-0815</cvename>
+      <cvename>CVE-2015-0816</cvename>
+      <url>https://www.mozilla.org/security/advisories/mfsa2015-30/</url>;
+      <url>https://www.mozilla.org/security/advisories/mfsa2015-31/</url>;
+      <url>https://www.mozilla.org/security/advisories/mfsa2015-32/</url>;
+      <url>https://www.mozilla.org/security/advisories/mfsa2015-33/</url>;
+      <url>https://www.mozilla.org/security/advisories/mfsa2015-34/</url>;
+      <url>https://www.mozilla.org/security/advisories/mfsa2015-35/</url>;
+      <url>https://www.mozilla.org/security/advisories/mfsa2015-36/</url>;
+      <url>https://www.mozilla.org/security/advisories/mfsa2015-37/</url>;
+      <url>https://www.mozilla.org/security/advisories/mfsa2015-38/</url>;
+      <url>https://www.mozilla.org/security/advisories/mfsa2015-39/</url>;
+      <url>https://www.mozilla.org/security/advisories/mfsa2015-40/</url>;
+      <url>https://www.mozilla.org/security/advisories/mfsa2015-41/</url>;
+      <url>https://www.mozilla.org/security/advisories/mfsa2015-42/</url>;
+      <url>https://www.mozilla.org/security/advisories/</url>;
+    </references>
+    <dates>
+      <discovery>2015-03-31</discovery>
+      <entry>2015-03-31</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="f450587b-d7bd-11e4-b5a4-14dae9d5a9d2">
     <topic>osc -- shell command injection via crafted _service files</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201503311840.t2VIeUTG040460>