aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorflo <flo@FreeBSD.org>2013-12-14 21:42:06 +0800
committerflo <flo@FreeBSD.org>2013-12-14 21:42:06 +0800
commitedaa25c436296059e2f53857725feebc334be006 (patch)
tree3f75766ca5d76f6dd2367c583fb90b16519be03a /security
parent89e537dbea71d78877124223148d8741ee1c638d (diff)
downloadfreebsd-ports-gnome-edaa25c436296059e2f53857725feebc334be006.tar.gz
freebsd-ports-gnome-edaa25c436296059e2f53857725feebc334be006.tar.zst
freebsd-ports-gnome-edaa25c436296059e2f53857725feebc334be006.zip
Update to nspr 4.10.2
Update to nss 3.15.3.1 Update firefox-esr and thunderbird to 24.2.0 Update firefox to 26.0 Update seamonkey to 2.23 - catch up with directory renames since USES=webplugins was introduced; fixes plugins not being automatically enabled after install - linux-firefox and linux-seamonkey can play HTML5 audio [2][3] and measure about:memory usage, again - dom.ipc.plugins.enabled->true no longer crash linux-firefox which makes some flash sites work again; as there's no nspluginwrapper in-between the infamous "youtube issue" never occurs - install DEBUG with symbols [3] and describe the option better [4] - enable dumping about:memory upon kill -65, kill -66 and GC/CC log upon kill -67 to a file under /tmp directory; linux-firefox uses kill -34, kill -35 and kill -36 respectively PR: ports/183861 [1] PR: ports/184006 [2] PR: ports/169896 [3] PR: ports/184285 [3] PR: ports/184286 [4] Security: dd116b19-64b3-11e3-868f-0025905a4771 In collaboration with: Jan Beich <jbeich@tormail.org>
Diffstat (limited to 'security')
-rw-r--r--security/ca_root_nss/Makefile3
-rw-r--r--security/ca_root_nss/distinfo4
-rw-r--r--security/nss/Makefile4
-rw-r--r--security/nss/distinfo4
-rw-r--r--security/vuxml/vuln.xml95
5 files changed, 102 insertions, 8 deletions
diff --git a/security/ca_root_nss/Makefile b/security/ca_root_nss/Makefile
index f0bf1ae5ba71..db7a272c82a5 100644
--- a/security/ca_root_nss/Makefile
+++ b/security/ca_root_nss/Makefile
@@ -2,7 +2,6 @@
PORTNAME= ca_root_nss
PORTVERSION= ${VERSION_NSS}
-PORTREVISION= 1
CATEGORIES= security
MASTER_SITES= MOZILLA/security/nss/releases/${DISTNAME:U:C/[-.]/_/g}_RTM/src
DISTNAME= nss-${VERSION_NSS}${NSS_SUFFIX}
@@ -25,7 +24,7 @@ PLIST_SUB+= CERTDIR=${CERTDIR}
# !!! Please DO NOT submit patches for new version until it has !!!
# !!! been committed there first. !!!
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
-VERSION_NSS= 3.15.2
+VERSION_NSS= 3.15.3.1
#NSS_SUFFIX= .with.ckbi.1.93
CERTDATA_TXT_PATH= nss-${VERSION_NSS}/nss/lib/ckfw/builtins/certdata.txt
BUNDLE_PROCESSOR= MAca-bundle.pl
diff --git a/security/ca_root_nss/distinfo b/security/ca_root_nss/distinfo
index 051dd1ff71c1..f2062981f367 100644
--- a/security/ca_root_nss/distinfo
+++ b/security/ca_root_nss/distinfo
@@ -1,2 +1,2 @@
-SHA256 (nss-3.15.2.tar.gz) = 7b2c80d18c49581edbdb509cbf7afd61d8c53658f2a38ff20e224c1909faeddc
-SIZE (nss-3.15.2.tar.gz) = 6288669
+SHA256 (nss-3.15.3.1.tar.gz) = 607a913882540df81f74152e8aa492e0dd09c5d3f2c7321f18c69ee501fc6ba5
+SIZE (nss-3.15.3.1.tar.gz) = 6289657
diff --git a/security/nss/Makefile b/security/nss/Makefile
index 12c508f8fc23..d1af9730a4ef 100644
--- a/security/nss/Makefile
+++ b/security/nss/Makefile
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= nss
-PORTVERSION= 3.15.2
+PORTVERSION= 3.15.3.1
#DISTVERSIONSUFFIX= .with.ckbi.1.93
CATEGORIES= security
MASTER_SITES= MOZILLA/security/${PORTNAME}/releases/${DISTNAME:U:C/[-.]/_/g}_RTM/src
@@ -11,7 +11,7 @@ MAINTAINER= gecko@FreeBSD.org
COMMENT= Libraries to support development of security-enabled applications
BUILD_DEPENDS= zip:${PORTSDIR}/archivers/zip \
- nspr>=4.10:${PORTSDIR}/devel/nspr \
+ nspr>=4.10.2:${PORTSDIR}/devel/nspr \
sqlite3>=3.7.15:${PORTSDIR}/databases/sqlite3
LIB_DEPENDS= nspr4.1:${PORTSDIR}/devel/nspr \
sqlite3.8:${PORTSDIR}/databases/sqlite3
diff --git a/security/nss/distinfo b/security/nss/distinfo
index 051dd1ff71c1..f2062981f367 100644
--- a/security/nss/distinfo
+++ b/security/nss/distinfo
@@ -1,2 +1,2 @@
-SHA256 (nss-3.15.2.tar.gz) = 7b2c80d18c49581edbdb509cbf7afd61d8c53658f2a38ff20e224c1909faeddc
-SIZE (nss-3.15.2.tar.gz) = 6288669
+SHA256 (nss-3.15.3.1.tar.gz) = 607a913882540df81f74152e8aa492e0dd09c5d3f2c7321f18c69ee501fc6ba5
+SIZE (nss-3.15.3.1.tar.gz) = 6289657
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 0b2773761d47..6e3a33094a7b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,101 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="dd116b19-64b3-11e3-868f-0025905a4771">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><gt>25.0,1</gt><lt>26.0,1</lt></range>
+ <range><lt>24.2.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>26.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-seamonkey</name>
+ <range><lt>2.23</lt></range>
+ </package>
+ <package>
+ <name>linux-thunderbird</name>
+ <range><lt>24.2.0</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <range><lt>2.23</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>24.2.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Mozilla Project reports:</p>
+ <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
+ <p>MFSA 2013-116 JPEG information leak</p>
+ <p>MFSA 2013-105 Application Installation doorhanger persists on
+ navigation</p>
+ <p>MFSA 2013-106 Character encoding cross-origin XSS attack</p>
+ <p>MFSA 2013-107 Sandbox restrictions not applied to nested object
+ elements</p>
+ <p>MFSA 2013-108 Use-after-free in event listeners</p>
+ <p>MFSA 2013-109 Use-after-free during Table Editing</p>
+ <p>MFSA 2013-110 Potential overflow in JavaScript binary search
+ algorithms</p>
+ <p>MFSA 2013-111 Segmentation violation when replacing ordered list
+ elements</p>
+ <p>MFSA 2013-112 Linux clipboard information disclosure though
+ selection paste</p>
+ <p>MFSA 2013-113 Trust settings for built-in roots ignored during EV
+ certificate validation</p>
+ <p>MFSA 2013-114 Use-after-free in synthetic mouse movement</p>
+ <p>MFSA 2013-115 GetElementIC typed array stubs can be generated
+ outside observed typesets</p>
+ <p>MFSA 2013-116 JPEG information leak</p>
+ <p>MFSA 2013-117 Mis-issued ANSSI/DCSSI certificate</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-5609</cvename>
+ <cvename>CVE-2013-5610</cvename>
+ <cvename>CVE-2013-5611</cvename>
+ <cvename>CVE-2013-5612</cvename>
+ <cvename>CVE-2013-5613</cvename>
+ <cvename>CVE-2013-5614</cvename>
+ <cvename>CVE-2013-5615</cvename>
+ <cvename>CVE-2013-5616</cvename>
+ <cvename>CVE-2013-5618</cvename>
+ <cvename>CVE-2013-5619</cvename>
+ <cvename>CVE-2013-6629</cvename>
+ <cvename>CVE-2013-6630</cvename>
+ <cvename>CVE-2013-6671</cvename>
+ <cvename>CVE-2013-6672</cvename>
+ <cvename>CVE-2013-6673</cvename>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-104.html</url>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-105.html</url>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-106.html</url>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-107.html</url>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-108.html</url>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-109.html</url>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-110.html</url>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-111.html</url>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-112.html</url>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-113.html</url>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-114.html</url>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-115.html</url>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-116.html</url>
+ <url>https://www.mozilla.org/security/announce/2013/mfsa2013-117.html</url>
+ <url>http://www.mozilla.org/security/known-vulnerabilities/</url>
+ </references>
+ <dates>
+ <discovery>2013-12-09</discovery>
+ <entry>2013-12-14</entry>
+ </dates>
+ </vuln>
+
<vuln vid="613e45d1-6154-11e3-9b62-000c292e4fd8">
<topic>samba -- multiple vulnerabilities</topic>
<affects>