svn commit: r428555 - head/security/vuxml

Jan Beich jbeich at FreeBSD.org
Wed Dec 14 10:19:09 UTC 2016


Author: jbeich
Date: Wed Dec 14 10:19:07 2016
New Revision: 428555
URL: https://svnweb.freebsd.org/changeset/ports/428555

Log:
  security/vuxml: mark www/firefox < 50.1_1,1 as vulnerable

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Dec 14 09:58:26 2016	(r428554)
+++ head/security/vuxml/vuln.xml	Wed Dec 14 10:19:07 2016	(r428555)
@@ -58,6 +58,76 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="512c0ffd-cd39-4da4-b2dc-81ff4ba8e238">
+    <topic>mozilla -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>firefox</name>
+	<range><lt>50.1.0_1,1</lt></range>
+      </package>
+      <package>
+	<name>seamonkey</name>
+	<name>linux-seamonkey</name>
+	<range><lt>2.47</lt></range>
+      </package>
+      <package>
+	<name>firefox-esr</name>
+	<range><lt>45.6.0,1</lt></range>
+      </package>
+      <package>
+	<name>linux-firefox</name>
+	<range><lt>45.6.0,2</lt></range>
+      </package>
+      <package>
+	<name>libxul</name>
+	<name>thunderbird</name>
+	<name>linux-thunderbird</name>
+	<range><lt>45.6.0</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Mozilla Foundation reports:</p>
+	<blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2016-94/">
+	<p>CVE-2016-9894: Buffer overflow in SkiaGL</p>
+	<p>CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements</p>
+	<p>CVE-2016-9895: CSP bypass using marquee tag</p>
+	<p>CVE-2016-9896: Use-after-free with WebVR</p>
+	<p>CVE-2016-9897: Memory corruption in libGLES</p>
+	<p>CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees</p>
+	<p>CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs</p>
+	<p>CVE-2016-9904: Cross-origin information leak in shared atoms</p>
+	<p>CVE-2016-9901: Data from Pocket server improperly sanitized before execution</p>
+	<p>CVE-2016-9902: Pocket extension does not validate the origin of events</p>
+	<p>CVE-2016-9903: XSS injection vulnerability in add-ons SDK</p>
+	<p>CVE-2016-9080: Memory safety bugs fixed in Firefox 50.1</p>
+	<p>CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-9894</cvename>
+      <cvename>CVE-2016-9899</cvename>
+      <cvename>CVE-2016-9895</cvename>
+      <cvename>CVE-2016-9896</cvename>
+      <cvename>CVE-2016-9897</cvename>
+      <cvename>CVE-2016-9898</cvename>
+      <cvename>CVE-2016-9900</cvename>
+      <cvename>CVE-2016-9904</cvename>
+      <cvename>CVE-2016-9901</cvename>
+      <cvename>CVE-2016-9902</cvename>
+      <cvename>CVE-2016-9903</cvename>
+      <cvename>CVE-2016-9080</cvename>
+      <cvename>CVE-2016-9893</cvename>
+      <url>https://www.mozilla.org/security/advisories/mfsa2016-94/</url>
+      <url>https://www.mozilla.org/security/advisories/mfsa2016-95/</url>
+    </references>
+    <dates>
+      <discovery>2016-12-13</discovery>
+      <entry>2016-12-14</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="54e50cd9-c1a8-11e6-ae1b-002590263bf5">
     <topic>wordpress -- multiple vulnerabilities</topic>
     <affects>
@@ -1238,6 +1308,14 @@ Notes:
 	<range><lt>45.5.1,2</lt></range>
       </package>
       <package>
+	<name>seamonkey</name>
+	<range><lt>2.47</lt></range>
+      </package>
+      <package>
+	<name>linux-seamonkey</name>
+	<range><lt>2.47</lt></range>
+      </package>
+      <package>
 	<name>libxul</name>
 	<range><lt>45.5.1</lt></range>
       </package>
@@ -1268,6 +1346,7 @@ Notes:
     <dates>
       <discovery>2016-11-30</discovery>
       <entry>2016-12-01</entry>
+      <modified>2016-12-14</modified>
     </dates>
   </vuln>
 


More information about the svn-ports-head mailing list