[SVN-Commit] r1728 - branches/firefox33
svn-freebsd-gecko at chruetertee.ch
svn-freebsd-gecko at chruetertee.ch
Tue Oct 14 18:51:06 UTC 2014
Author: jbeich
Date: Tue Oct 14 18:50:56 2014
New Revision: 1728
Log:
list changes and vulnerabilities fixed
Added:
branches/firefox33/Gecko_ChangeLog
branches/firefox33/VuXML
Added: branches/firefox33/Gecko_ChangeLog
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ branches/firefox33/Gecko_ChangeLog Tue Oct 14 18:50:56 2014 (r1728)
@@ -0,0 +1,10 @@
+- add multimedia/openh264, maybe used by WebRTC video
+- (workaround) replace USE_GCC=yes with USES=compiler:gcc-c++11-lib in
+ order to fix runtime for PGO and powerpc/powerpc64 on libc++ systems
+- add OSS audio fallback for HTML5 audio from upstream bug;
+ not exposed yet because WebRTC still needs ALSA or PulseAudio
+- apply r368080 to seamonkey-i18n
+- kill @dirrm from gecko@ ports per CHANGES from 20140922
+- drop workaround for LLVM PR 19007: base and lang/clang34 have the fix
+- improve workaround comment for LLVM PR 15840, partially rejecting
+ r348851 by marino@ until bug 193555
Added: branches/firefox33/VuXML
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ branches/firefox33/VuXML Tue Oct 14 18:50:56 2014 (r1728)
@@ -0,0 +1,80 @@
+ <vuln vid="9c1495ac-8d8c-4789-a0f3-8ca6b476619c">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>33.0,1</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>31.2.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>33.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-seamonkey</name>
+ <range><lt>2.30</lt></range>
+ </package>
+ <package>
+ <name>linux-thunderbird</name>
+ <range><lt>31.2.0</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <range><lt>2.30</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>31.2.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Mozilla Project reports:</p>
+ <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
+ <p>MFSA 2014-74 Miscellaneous memory safety hazards
+ (rv:33.0 / rv:31.2)</p>
+ <p>MFSA 2014-75 Buffer overflow during CSS manipulation</p>
+ <p>MFSA 2014-76 Web Audio memory corruption issues with
+ custom waveforms</p>
+ <p>MFSA 2014-77 Out-of-bounds write with WebM video</p>
+ <p>MFSA 2014-78 Further uninitialized memory use during GIF</p>
+ <p>MFSA 2014-79 Use-after-free interacting with text
+ directionality</p>
+ <p>MFSA 2014-80 Key pinning bypasses</p>
+ <p>MFSA 2014-81 Inconsistent video sharing within iframe</p>
+ <p>MFSA 2014-82 Accessing cross-origin objects via the
+ Alarms API</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-1574</cvename>
+ <cvename>CVE-2014-1575</cvename>
+ <cvename>CVE-2014-1576</cvename>
+ <cvename>CVE-2014-1577</cvename>
+ <cvename>CVE-2014-1578</cvename>
+ <cvename>CVE-2014-1580</cvename>
+ <cvename>CVE-2014-1581</cvename>
+ <cvename>CVE-2014-1583</cvename>
+ <cvename>CVE-2014-1584</cvename>
+ <cvename>CVE-2014-1585</cvename>
+ <cvename>CVE-2014-1586</cvename>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-74.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-75.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-76.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-77.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-78.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-79.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-80.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-81.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-82.html</url>
+ <url>https://www.mozilla.org/security/announce/</url>
+ </references>
+ <dates>
+ <discovery>2014-10-06</discovery>
+ <entry>2014-10-14</entry>
+ </dates>
+ </vuln>
More information about the freebsd-gecko
mailing list