[Bug 193922] New: security/vuxml: belatedly add Mozilla entry for CVE-2014-155[34] and CVE-2014-156[2-7]

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Thu Sep 25 13:10:19 UTC 2014


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=193922

            Bug ID: 193922
           Summary: security/vuxml: belatedly add Mozilla entry for
                    CVE-2014-155[34] and CVE-2014-156[2-7]
           Product: Ports Tree
           Version: Latest
          Hardware: Any
                OS: Any
            Status: Needs Triage
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-secteam at FreeBSD.org
          Reporter: jbeich at vfemail.net
          Assignee: ports-secteam at FreeBSD.org
             Flags: maintainer-feedback?(ports-secteam at FreeBSD.org)

SeaMonkey and XULRunner are likely affected as well but not listed in MFSAs.
Taking discovery date as the commit date of the latest fix in the series under
esr24 branch.

  <vuln vid="da2e025f-a78d-46e4-83ee-7c65f9897f11">
    <topic>mozilla -- multiple vulnerabilities</topic>
    <affects>
      <package>
    <name>firefox</name>
    <range><lt>32.0,1</lt></range>
      </package>
      <package>
    <name>linux-firefox</name>
    <range><lt>32.0,1</lt></range>
      </package>
      <package>
    <name>firefox-esr</name>
    <range><lt>31.1.0,1</lt></range>
      </package>
      <package>
    <name>linux-thunderbird</name>
    <range><lt>31.1.0</lt></range>
      </package>
      <package>
    <name>thunderbird</name>
    <range><lt>31.1.0</lt></range>
      </package>
      <package>
    <name>linux-seamonkey</name>
    <range><lt>2.29</lt></range>
      </package>
      <package>
    <name>seamonkey</name>
    <range><lt>2.29</lt></range>
      </package>
      <package>
    <name>libxul</name>
    <range><lt>24.8.0</lt></range>
      </package>
    </affects>
    <description>
      <body xmlns="http://www.w3.org/1999/xhtml">
    <p>The Mozilla Project reports:</p>
    <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
      <p>MFSA 2014-72 Use-after-free setting text directionality</p>
      <p>MFSA 2014-71 Profile directory file access through file:
       protocol</p>
      <p>MFSA 2014-70 Out-of-bounds read in Web Audio audio timeline</p>
      <p>MFSA 2014-69 Uninitialized memory use during GIF rendering</p>
      <p>MFSA 2014-68 Use-after-free during DOM interactions with SVG</p>
      <p>MFSA 2014-67 Miscellaneous memory safety hazards
       (rv:32.0 / rv:31.1 / rv:24.8)</p>
    </blockquote>
      </body>
    </description>
    <references>
      <cvename>CVE-2014-1553</cvename>
      <cvename>CVE-2014-1554</cvename>
      <cvename>CVE-2014-1562</cvename>
      <cvename>CVE-2014-1563</cvename>
      <cvename>CVE-2014-1564</cvename>
      <cvename>CVE-2014-1565</cvename>
      <cvename>CVE-2014-1566</cvename>
      <cvename>CVE-2014-1567</cvename>
     
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-67.html</url>
     
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-68.html</url>
     
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-69.html</url>
     
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-70.html</url>
     
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-71.html</url>
     
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-72.html</url>
      <url>https://www.mozilla.org/security/announce/</url>
    </references>
    <dates>
      <discovery>2014-08-18</discovery>
      <entry>2014-09-02</entry>
    </dates>
  </vuln>

--- Comment #1 from Bugzilla Automation <bugzilla at FreeBSD.org> ---
Auto-assigned to maintainer ports-secteam at FreeBSD.org

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list