diff options
author | jbeich <jbeich@FreeBSD.org> | 2016-06-08 00:34:07 +0800 |
---|---|---|
committer | jbeich <jbeich@FreeBSD.org> | 2016-06-08 00:34:07 +0800 |
commit | 5b6f6c651c9e4e52303ef4800cb9b312f5661e76 (patch) | |
tree | 01370a0d22b9a3e0e5c21fbc471f5b2af817c7e1 | |
parent | 4cffcc5b93755fd22dc9dab460b0ba7fd74aeb55 (diff) | |
download | freebsd-ports-graphics-5b6f6c651c9e4e52303ef4800cb9b312f5661e76.tar.gz freebsd-ports-graphics-5b6f6c651c9e4e52303ef4800cb9b312f5661e76.tar.zst freebsd-ports-graphics-5b6f6c651c9e4e52303ef4800cb9b312f5661e76.zip |
Document recent Firefox vulnerabilities
-rw-r--r-- | security/vuxml/vuln.xml | 118 |
1 files changed, 118 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 5c0d1e0c6df..cf671acf67b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,124 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="32166082-53fa-41fa-b081-207e7a989a0a"> + <topic>NSS -- multiple vulnerabilities</topic> + <affects> + <package> + <name>nss</name> + <name>linux-c6-nss</name> + <range><ge>3.22</ge><lt>3.23</lt></range> + </package> + <package> + <name>linux-seamonkey</name> + <range><lt>2.44</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Mozilla Foundation reports:</p> + <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2016-62/"> + <p>Mozilla has updated the version of Network Security + Services (NSS) library used in Firefox to NSS 3.23. This + addresses four moderate rated networking security issues + reported by Mozilla engineers Tyson Smith and Jed Davis.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-2834</cvename> + <url>https://www.mozilla.org/security/advisories/mfsa2016-62/</url> + <url>https://hg.mozilla.org/projects/nss/rev/1ba7cd83c672</url> + <url>https://hg.mozilla.org/projects/nss/rev/8d78a5ae260a</url> + <url>https://hg.mozilla.org/projects/nss/rev/5fde729fdbff</url> + <url>https://hg.mozilla.org/projects/nss/rev/329932eb1700</url> + </references> + <dates> + <discovery>2016-06-07</discovery> + <entry>2016-06-07</entry> + </dates> + </vuln> + + <vuln vid="8065d37b-8e7c-4707-a608-1b0a2b8509c3"> + <topic>mozilla -- multiple vulnerabilities</topic> + <affects> + <package> + <name>firefox</name> + <range><lt>47.0,1</lt></range> + </package> + <package> + <name>seamonkey</name> + <name>linux-seamonkey</name> + <range><lt>2.44</lt></range> + </package> + <package> + <name>firefox-esr</name> + <range><lt>45.2.0,1</lt></range> + </package> + <package> + <name>linux-firefox</name> + <range><lt>45.2.0,2</lt></range> + </package> + <package> + <name>libxul</name> + <name>thunderbird</name> + <name>linux-thunderbird</name> + <range><lt>45.2.0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Mozilla Foundation reports:</p> + <blockquote cite="https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox/#firefox47"> + <p>MFSA 2016-49 Miscellaneous memory safety hazards (rv:47.0 / + rv:45.2)</p> + <p>MFSA 2016-50 Buffer overflow parsing HTML5 fragments</p> + <p>MFSA 2016-51 Use-after-free deleting tables from a + contenteditable document</p> + <p>MFSA 2016-52 Addressbar spoofing though the SELECT element</p> + <p>MFSA 2016-54 Partial same-origin-policy through setting + location.host through data URI</p> + <p>MFSA 2016-56 Use-after-free when textures are used in WebGL + operations after recycle pool destruction</p> + <p>MFSA 2016-57 Incorrect icon displayed on permissions + notifications</p> + <p>MFSA 2016-58 Entering fullscreen and persistent pointerlock + without user permission</p> + <p>MFSA 2016-59 Information disclosure of disabled plugins + through CSS pseudo-classes</p> + <p>MFSA 2016-60 Java applets bypass CSP protections</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-2815</cvename> + <cvename>CVE-2016-2818</cvename> + <cvename>CVE-2016-2819</cvename> + <cvename>CVE-2016-2821</cvename> + <cvename>CVE-2016-2822</cvename> + <cvename>CVE-2016-2825</cvename> + <cvename>CVE-2016-2828</cvename> + <cvename>CVE-2016-2829</cvename> + <cvename>CVE-2016-2831</cvename> + <cvename>CVE-2016-2832</cvename> + <cvename>CVE-2016-2833</cvename> + <url>https://www.mozilla.org/security/advisories/mfsa2016-49/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-50/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-51/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-52/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-54/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-56/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-57/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-58/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-59/</url> + <url>https://www.mozilla.org/security/advisories/mfsa2016-60/</url> + </references> + <dates> + <discovery>2016-06-07</discovery> + <entry>2016-06-07</entry> + </dates> + </vuln> + <vuln vid="c039a761-2c29-11e6-8912-3065ec8fd3ec"> <topic>chromium -- multiple vulnerabilities</topic> <affects> |