aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorjbeich <jbeich@FreeBSD.org>2016-04-27 04:24:35 +0800
committerjbeich <jbeich@FreeBSD.org>2016-04-27 04:24:35 +0800
commit8265f377c1d72aba052160fb40864347099d338c (patch)
treeb45585ad3f499cba457028cea1319d5e4993b382 /security
parent098336ecc8d0305396391a58f6976e6ca0f60658 (diff)
downloadfreebsd-ports-graphics-8265f377c1d72aba052160fb40864347099d338c.tar.gz
freebsd-ports-graphics-8265f377c1d72aba052160fb40864347099d338c.tar.zst
freebsd-ports-graphics-8265f377c1d72aba052160fb40864347099d338c.zip
Document recent Firefox vulnerabilities
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml73
1 files changed, 73 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 363dc5b10e6..8c65cb003ae 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,79 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="92d44f83-a7bf-41cf-91ee-3d1b8ecf579f">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <name>linux-firefox</name>
+ <range><lt>46.0,1</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <name>linux-seamonkey</name>
+ <range><lt>2.43</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><ge>39.0,1</ge><lt>45.1.0,1</lt></range>
+ <range><lt>38.8.0,1</lt></range>
+ </package>
+ <package>
+ <name>libxul</name>
+ <name>thunderbird</name>
+ <name>linux-thunderbird</name>
+ <range><ge>39.0</ge><lt>45.1.0</lt></range>
+ <range><lt>38.8.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Foundation reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox/#firefox46">
+ <p>MFSA 2016-39 Miscellaneous memory safety hazards (rv:46.0 /
+ rv:45.1 / rv:38.8)</p>
+ <p>MFSA 2016-42 Use-after-free and buffer overflow
+ in Service Workers</p>
+ <p>MFSA 2016-44 Buffer overflow in libstagefright with
+ CENC offsets</p>
+ <p>MFSA 2016-45 CSP not applied to pages sent with
+ multipart/x-mixed-replace</p>
+ <p>MFSA 2016-46 Elevation of privilege with
+ chrome.tabs.update API in web extensions</p>
+ <p>MFSA 2016-47 Write to invalid HashMap entry through
+ JavaScript.watch()</p>
+ <p>MFSA 2016-48 Firefox Health Reports could accept events
+ from untrusted domains</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-2804</cvename>
+ <cvename>CVE-2016-2805</cvename>
+ <cvename>CVE-2016-2806</cvename>
+ <cvename>CVE-2016-2807</cvename>
+ <cvename>CVE-2016-2808</cvename>
+ <cvename>CVE-2016-2811</cvename>
+ <cvename>CVE-2016-2812</cvename>
+ <cvename>CVE-2016-2814</cvename>
+ <cvename>CVE-2016-2816</cvename>
+ <cvename>CVE-2016-2817</cvename>
+ <cvename>CVE-2016-2820</cvename>
+ <url>https://www.mozilla.org/security/advisories/mfsa2016-39/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2016-42/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2016-44/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2016-45/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2016-46/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2016-47/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2016-48/</url>
+ </references>
+ <dates>
+ <discovery>2016-04-26</discovery>
+ <entry>2016-04-26</entry>
+ </dates>
+ </vuln>
+
<vuln vid="f87a9376-0943-11e6-8fc4-00a0986f28c4">
<topic>phpmyfaq -- cross-site request forgery vulnerability</topic>
<affects>