diff options
author | flo <flo@FreeBSD.org> | 2013-12-14 21:42:06 +0800 |
---|---|---|
committer | flo <flo@FreeBSD.org> | 2013-12-14 21:42:06 +0800 |
commit | edaa25c436296059e2f53857725feebc334be006 (patch) | |
tree | 3f75766ca5d76f6dd2367c583fb90b16519be03a /security | |
parent | 89e537dbea71d78877124223148d8741ee1c638d (diff) | |
download | freebsd-ports-gnome-edaa25c436296059e2f53857725feebc334be006.tar.gz freebsd-ports-gnome-edaa25c436296059e2f53857725feebc334be006.tar.zst freebsd-ports-gnome-edaa25c436296059e2f53857725feebc334be006.zip |
Update to nspr 4.10.2
Update to nss 3.15.3.1
Update firefox-esr and thunderbird to 24.2.0
Update firefox to 26.0
Update seamonkey to 2.23
- catch up with directory renames since USES=webplugins was introduced;
fixes plugins not being automatically enabled after install
- linux-firefox and linux-seamonkey can play HTML5 audio [2][3] and
measure about:memory usage, again
- dom.ipc.plugins.enabled->true no longer crash linux-firefox which makes
some flash sites work again; as there's no nspluginwrapper in-between
the infamous "youtube issue" never occurs
- install DEBUG with symbols [3] and describe the option better [4]
- enable dumping about:memory upon kill -65, kill -66 and GC/CC log
upon kill -67 to a file under /tmp directory; linux-firefox uses
kill -34, kill -35 and kill -36 respectively
PR: ports/183861 [1]
PR: ports/184006 [2]
PR: ports/169896 [3]
PR: ports/184285 [3]
PR: ports/184286 [4]
Security: dd116b19-64b3-11e3-868f-0025905a4771
In collaboration with: Jan Beich <jbeich@tormail.org>
Diffstat (limited to 'security')
-rw-r--r-- | security/ca_root_nss/Makefile | 3 | ||||
-rw-r--r-- | security/ca_root_nss/distinfo | 4 | ||||
-rw-r--r-- | security/nss/Makefile | 4 | ||||
-rw-r--r-- | security/nss/distinfo | 4 | ||||
-rw-r--r-- | security/vuxml/vuln.xml | 95 |
5 files changed, 102 insertions, 8 deletions
diff --git a/security/ca_root_nss/Makefile b/security/ca_root_nss/Makefile index f0bf1ae5ba71..db7a272c82a5 100644 --- a/security/ca_root_nss/Makefile +++ b/security/ca_root_nss/Makefile @@ -2,7 +2,6 @@ PORTNAME= ca_root_nss PORTVERSION= ${VERSION_NSS} -PORTREVISION= 1 CATEGORIES= security MASTER_SITES= MOZILLA/security/nss/releases/${DISTNAME:U:C/[-.]/_/g}_RTM/src DISTNAME= nss-${VERSION_NSS}${NSS_SUFFIX} @@ -25,7 +24,7 @@ PLIST_SUB+= CERTDIR=${CERTDIR} # !!! Please DO NOT submit patches for new version until it has !!! # !!! been committed there first. !!! # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -VERSION_NSS= 3.15.2 +VERSION_NSS= 3.15.3.1 #NSS_SUFFIX= .with.ckbi.1.93 CERTDATA_TXT_PATH= nss-${VERSION_NSS}/nss/lib/ckfw/builtins/certdata.txt BUNDLE_PROCESSOR= MAca-bundle.pl diff --git a/security/ca_root_nss/distinfo b/security/ca_root_nss/distinfo index 051dd1ff71c1..f2062981f367 100644 --- a/security/ca_root_nss/distinfo +++ b/security/ca_root_nss/distinfo @@ -1,2 +1,2 @@ -SHA256 (nss-3.15.2.tar.gz) = 7b2c80d18c49581edbdb509cbf7afd61d8c53658f2a38ff20e224c1909faeddc -SIZE (nss-3.15.2.tar.gz) = 6288669 +SHA256 (nss-3.15.3.1.tar.gz) = 607a913882540df81f74152e8aa492e0dd09c5d3f2c7321f18c69ee501fc6ba5 +SIZE (nss-3.15.3.1.tar.gz) = 6289657 diff --git a/security/nss/Makefile b/security/nss/Makefile index 12c508f8fc23..d1af9730a4ef 100644 --- a/security/nss/Makefile +++ b/security/nss/Makefile @@ -2,7 +2,7 @@ # $FreeBSD$ PORTNAME= nss -PORTVERSION= 3.15.2 +PORTVERSION= 3.15.3.1 #DISTVERSIONSUFFIX= .with.ckbi.1.93 CATEGORIES= security MASTER_SITES= MOZILLA/security/${PORTNAME}/releases/${DISTNAME:U:C/[-.]/_/g}_RTM/src @@ -11,7 +11,7 @@ MAINTAINER= gecko@FreeBSD.org COMMENT= Libraries to support development of security-enabled applications BUILD_DEPENDS= zip:${PORTSDIR}/archivers/zip \ - nspr>=4.10:${PORTSDIR}/devel/nspr \ + nspr>=4.10.2:${PORTSDIR}/devel/nspr \ sqlite3>=3.7.15:${PORTSDIR}/databases/sqlite3 LIB_DEPENDS= nspr4.1:${PORTSDIR}/devel/nspr \ sqlite3.8:${PORTSDIR}/databases/sqlite3 diff --git a/security/nss/distinfo b/security/nss/distinfo index 051dd1ff71c1..f2062981f367 100644 --- a/security/nss/distinfo +++ b/security/nss/distinfo @@ -1,2 +1,2 @@ -SHA256 (nss-3.15.2.tar.gz) = 7b2c80d18c49581edbdb509cbf7afd61d8c53658f2a38ff20e224c1909faeddc -SIZE (nss-3.15.2.tar.gz) = 6288669 +SHA256 (nss-3.15.3.1.tar.gz) = 607a913882540df81f74152e8aa492e0dd09c5d3f2c7321f18c69ee501fc6ba5 +SIZE (nss-3.15.3.1.tar.gz) = 6289657 diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 0b2773761d47..6e3a33094a7b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,101 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="dd116b19-64b3-11e3-868f-0025905a4771"> + <topic>mozilla -- multiple vulnerabilities</topic> + <affects> + <package> + <name>firefox</name> + <range><gt>25.0,1</gt><lt>26.0,1</lt></range> + <range><lt>24.2.0,1</lt></range> + </package> + <package> + <name>linux-firefox</name> + <range><lt>26.0,1</lt></range> + </package> + <package> + <name>linux-seamonkey</name> + <range><lt>2.23</lt></range> + </package> + <package> + <name>linux-thunderbird</name> + <range><lt>24.2.0</lt></range> + </package> + <package> + <name>seamonkey</name> + <range><lt>2.23</lt></range> + </package> + <package> + <name>thunderbird</name> + <range><lt>24.2.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Mozilla Project reports:</p> + <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/"> + <p>MFSA 2013-116 JPEG information leak</p> + <p>MFSA 2013-105 Application Installation doorhanger persists on + navigation</p> + <p>MFSA 2013-106 Character encoding cross-origin XSS attack</p> + <p>MFSA 2013-107 Sandbox restrictions not applied to nested object + elements</p> + <p>MFSA 2013-108 Use-after-free in event listeners</p> + <p>MFSA 2013-109 Use-after-free during Table Editing</p> + <p>MFSA 2013-110 Potential overflow in JavaScript binary search + algorithms</p> + <p>MFSA 2013-111 Segmentation violation when replacing ordered list + elements</p> + <p>MFSA 2013-112 Linux clipboard information disclosure though + selection paste</p> + <p>MFSA 2013-113 Trust settings for built-in roots ignored during EV + certificate validation</p> + <p>MFSA 2013-114 Use-after-free in synthetic mouse movement</p> + <p>MFSA 2013-115 GetElementIC typed array stubs can be generated + outside observed typesets</p> + <p>MFSA 2013-116 JPEG information leak</p> + <p>MFSA 2013-117 Mis-issued ANSSI/DCSSI certificate</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-5609</cvename> + <cvename>CVE-2013-5610</cvename> + <cvename>CVE-2013-5611</cvename> + <cvename>CVE-2013-5612</cvename> + <cvename>CVE-2013-5613</cvename> + <cvename>CVE-2013-5614</cvename> + <cvename>CVE-2013-5615</cvename> + <cvename>CVE-2013-5616</cvename> + <cvename>CVE-2013-5618</cvename> + <cvename>CVE-2013-5619</cvename> + <cvename>CVE-2013-6629</cvename> + <cvename>CVE-2013-6630</cvename> + <cvename>CVE-2013-6671</cvename> + <cvename>CVE-2013-6672</cvename> + <cvename>CVE-2013-6673</cvename> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-104.html</url> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-105.html</url> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-106.html</url> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-107.html</url> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-108.html</url> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-109.html</url> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-110.html</url> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-111.html</url> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-112.html</url> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-113.html</url> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-114.html</url> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-115.html</url> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-116.html</url> + <url>https://www.mozilla.org/security/announce/2013/mfsa2013-117.html</url> + <url>http://www.mozilla.org/security/known-vulnerabilities/</url> + </references> + <dates> + <discovery>2013-12-09</discovery> + <entry>2013-12-14</entry> + </dates> + </vuln> + <vuln vid="613e45d1-6154-11e3-9b62-000c292e4fd8"> <topic>samba -- multiple vulnerabilities</topic> <affects> |