summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorJan Beich <jbeich@FreeBSD.org>2015-03-31 18:40:29 +0000
committerJan Beich <jbeich@FreeBSD.org>2015-03-31 18:40:29 +0000
commit5744d948be800795560376ff1c00983b418d1fb4 (patch)
tree426e08fee6a345a68553b707a88766be1fa8808d /security
parentUpdate to 1.4.99.16 aka pkg 1.5.0 beta1 (diff)
Document mozilla vulnerabilities
Notes
Notes: svn path=/head/; revision=382858
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml104
1 files changed, 104 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 3636e62197bf..aa18eb8d83e8 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -57,6 +57,110 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="d0c97697-df2c-4b8b-bff2-cec24dc35af8">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>37.0,1</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>31.6.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>37.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-seamonkey</name>
+ <range><lt>2.34</lt></range>
+ </package>
+ <package>
+ <name>linux-thunderbird</name>
+ <range><lt>31.6.0</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <range><lt>2.34</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>31.6.0</lt></range>
+ </package>
+ <package>
+ <name>libxul</name>
+ <range><lt>31.6.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Mozilla Project reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/known-vulnerabilities/">
+ <p>MFSA-2015-30 Miscellaneous memory safety hazards (rv:37.0
+ / rv:31.6)</p>
+ <p>MFSA-2015-31 Use-after-free when using the Fluendo MP3
+ GStreamer plugin</p>
+ <p>MFSA-2015-32 Add-on lightweight theme installation
+ approval bypassed through MITM attack</p>
+ <p>MFSA-2015-33 resource:// documents can load privileged
+ pages</p>
+ <p>MFSA-2015-34 Out of bounds read in QCMS library</p>
+ <p>MFSA-2015-35 Cursor clickjacking with flash and images</p>
+ <p>MFSA-2015-36 Incorrect memory management for simple-type
+ arrays in WebRTC</p>
+ <p>MFSA-2015-37 CORS requests should not follow 30x
+ redirections after preflight</p>
+ <p>MFSA-2015-38 Memory corruption crashes in Off Main Thread
+ Compositing</p>
+ <p>MFSA-2015-39 Use-after-free due to type confusion flaws</p>
+ <p>MFSA-2015-40 Same-origin bypass through anchor navigation</p>
+ <p>MFSA-2015-41 PRNG weakness allows for DNS poisoning on
+ Android</p>
+ <p>MFSA-2015-42 Windows can retain access to privileged
+ content on navigation to unprivileged pages</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2012-2808</cvename>
+ <cvename>CVE-2015-0800</cvename>
+ <cvename>CVE-2015-0801</cvename>
+ <cvename>CVE-2015-0802</cvename>
+ <cvename>CVE-2015-0803</cvename>
+ <cvename>CVE-2015-0804</cvename>
+ <cvename>CVE-2015-0805</cvename>
+ <cvename>CVE-2015-0806</cvename>
+ <cvename>CVE-2015-0807</cvename>
+ <cvename>CVE-2015-0808</cvename>
+ <cvename>CVE-2015-0810</cvename>
+ <cvename>CVE-2015-0811</cvename>
+ <cvename>CVE-2015-0812</cvename>
+ <cvename>CVE-2015-0813</cvename>
+ <cvename>CVE-2015-0814</cvename>
+ <cvename>CVE-2015-0815</cvename>
+ <cvename>CVE-2015-0816</cvename>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-30/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-31/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-32/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-33/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-34/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-35/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-36/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-37/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-38/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-39/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-40/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-41/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2015-42/</url>
+ <url>https://www.mozilla.org/security/advisories/</url>
+ </references>
+ <dates>
+ <discovery>2015-03-31</discovery>
+ <entry>2015-03-31</entry>
+ </dates>
+ </vuln>
+
<vuln vid="f450587b-d7bd-11e4-b5a4-14dae9d5a9d2">
<topic>osc -- shell command injection via crafted _service files</topic>
<affects>