svn commit: r382858 - head/security/vuxml
Jan Beich
jbeich at FreeBSD.org
Tue Mar 31 18:40:31 UTC 2015
Author: jbeich
Date: Tue Mar 31 18:40:29 2015
New Revision: 382858
URL: https://svnweb.freebsd.org/changeset/ports/382858
QAT: https://qat.redports.org/buildarchive/r382858/
Log:
Document mozilla vulnerabilities
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Tue Mar 31 18:28:20 2015 (r382857)
+++ head/security/vuxml/vuln.xml Tue Mar 31 18:40:29 2015 (r382858)
@@ -57,6 +57,110 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="d0c97697-df2c-4b8b-bff2-cec24dc35af8">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>37.0,1</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>31.6.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>37.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-seamonkey</name>
+ <range><lt>2.34</lt></range>
+ </package>
+ <package>
+ <name>linux-thunderbird</name>
+ <range><lt>31.6.0</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <range><lt>2.34</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>31.6.0</lt></range>
+ </package>
+ <package>
+ <name>libxul</name>
+ <range><lt>31.6.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Mozilla Project reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/known-vulnerabilities/">
+ <p>MFSA-2015-30 Miscellaneous memory safety hazards (rv:37.0
+ / rv:31.6)</p>
+ <p>MFSA-2015-31 Use-after-free when using the Fluendo MP3
+ GStreamer plugin</p>
+ <p>MFSA-2015-32 Add-on lightweight theme installation
+ approval bypassed through MITM attack</p>
+ <p>MFSA-2015-33 resource:// documents can load privileged
+ pages</p>
+ <p>MFSA-2015-34 Out of bounds read in QCMS library</p>
+ <p>MFSA-2015-35 Cursor clickjacking with flash and images</p>
+ <p>MFSA-2015-36 Incorrect memory management for simple-type
+ arrays in WebRTC</p>
+ <p>MFSA-2015-37 CORS requests should not follow 30x
+ redirections after preflight</p>
+ <p>MFSA-2015-38 Memory corruption crashes in Off Main Thread
+ Compositing</p>
+ <p>MFSA-2015-39 Use-after-free due to type confusion flaws</p>
+ <p>MFSA-2015-40 Same-origin bypass through anchor navigation</p>
+ <p>MFSA-2015-41 PRNG weakness allows for DNS poisoning on
+ Android</p>
+ <p>MFSA-2015-42 Windows can retain access to privileged
+ content on navigation to unprivileged pages</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2012-2808</cvename>
+ <cvename>CVE-2015-0800</cvename>
+ <cvename>CVE-2015-0801</cvename>
+ <cvename>CVE-2015-0802</cvename>
+ <cvename>CVE-2015-0803</cvename>
+ <cvename>CVE-2015-0804</cvename>
+ <cvename>CVE-2015-0805</cvename>
+ <cvename>CVE-2015-0806</cvename>
+ <cvename>CVE-2015-0807</cvename>
+ <cvename>CVE-2015-0808</cvename>
+ <cvename>CVE-2015-0810</cvename>
+ <cvename>CVE-2015-0811</cvename>
+ <cvename>CVE-2015-0812</cvename>
+ <cvename>CVE-2015-0813</cvename>
+ <cvename>CVE-2015-0814</cvename>
+ <cvename>CVE-2015-0815</cvename>
+ <cvename>CVE-2015-0816</cvename>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-30/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-31/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-32/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-33/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-34/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-35/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-36/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-37/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-38/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-39/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-40/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-41/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-42/</url>
+ <url>https://www.mozilla.org/security/advisories/</url>
+ </references>
+ <dates>
+ <discovery>2015-03-31</discovery>
+ <entry>2015-03-31</entry>
+ </dates>
+ </vuln>
+
<vuln vid="f450587b-d7bd-11e4-b5a4-14dae9d5a9d2">
<topic>osc -- shell command injection via crafted _service files</topic>
<affects>
More information about the svn-ports-all
mailing list