From 77342f69d51663a88058e4efe3535364dadf0dfe Mon Sep 17 00:00:00 2001 From: jbeich Date: Sat, 18 Mar 2017 09:40:21 +0000 Subject: security/vuxml: mark firefox < 52.0.1 as vulnerable Note, sandboxing isn't implemented on FreeBSD. --- security/vuxml/vuln.xml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 2292e8a4ad8e..b37393e9c8fe 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,37 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + firefox -- integer overflow in createImageBitmap() + + + firefox + 52.0.1,1 + + + + +

The Mozilla Foundation reports:

+
+

An integer overflow in createImageBitmap() was reported + through the Pwn2Own contest. The fix for this vulnerability + disables the experimental extensions to the + createImageBitmap API. This function runs in the content + sandbox, requiring a second vulnerability to compromise a + user's computer.

+
+ +
+ + CVE-2017-5428 + https://www.mozilla.org/security/advisories/mfsa2017-08/ + + + 2017-03-17 + 2017-03-18 + +
+ moodle -- multiple vulnerabilities -- cgit