Author: jbeich
Date: Mon Dec  1 18:23:42 2014
New Revision: 1781

Log:
prepare for merge

Added:
   branches/firefox34/
      - copied from r1780, trunk/
   branches/firefox34/VuXML

Added: branches/firefox34/VuXML
==============================================================================
--- /dev/null   00:00:00 1970   (empty, because file is newly added)
+++ branches/firefox34/VuXML    Mon Dec  1 18:23:42 2014        (r1781)
@@ -0,0 +1,76 @@
+  <vuln vid="7ae61870-9dd2-4884-a2f2-f19bb5784d09">
+    <topic>mozilla -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+       <name>firefox</name>
+       <range><lt>34.0,1</lt></range>
+      </package>
+      <package>
+       <name>firefox-esr</name>
+       <range><lt>31.3.0,1</lt></range>
+      </package>
+      <package>
+       <name>linux-firefox</name>
+       <range><lt>34.0,1</lt></range>
+      </package>
+      <package>
+       <name>linux-seamonkey</name>
+       <range><lt>2.31</lt></range>
+      </package>
+      <package>
+       <name>linux-thunderbird</name>
+       <range><lt>31.3.0</lt></range>
+      </package>
+      <package>
+       <name>seamonkey</name>
+       <range><lt>2.31</lt></range>
+      </package>
+      <package>
+       <name>thunderbird</name>
+       <range><lt>31.3.0</lt></range>
+      </package>
+      <package>
+       <name>libxul</name>
+       <range><lt>31.3.0</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml";>
+       <p>The Mozilla Project reports:</p>
+       <blockquote 
cite="http://www.mozilla.org/security/known-vulnerabilities/";>
+         <p>MSFA-2014-89 Bad casting from the BasicThebesLayer to
+           BasicContainerLayer</p>
+         <p>MSFA-2014-88 Buffer overflow while parsing media content</p>
+         <p>MSFA-2014-87 Use-after-free during HTML5 parsing</p>
+         <p>MSFA-2014-86 CSP leaks redirect data via violation reports</p>
+         <p>MSFA-2014-85 XMLHttpRequest crashes with some input streams</p>
+         <p>MSFA-2014-84 XBL bindings accessible via improper CSS
+           declarations</p>
+         <p>MSFA-2014-83 Miscellaneous memory safety hazards (rv:34.0
+           / rv:31.3)</p>
+       </blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2014-1587</cvename>
+      <cvename>CVE-2014-1588</cvename>
+      <cvename>CVE-2014-1589</cvename>
+      <cvename>CVE-2014-1590</cvename>
+      <cvename>CVE-2014-1591</cvename>
+      <cvename>CVE-2014-1592</cvename>
+      <cvename>CVE-2014-1593</cvename>
+      <cvename>CVE-2014-1594</cvename>
+      <url>https://www.mozilla.org/security/advisories/mfsa2014-83</url>
+      <url>https://www.mozilla.org/security/advisories/mfsa2014-84</url>
+      <url>https://www.mozilla.org/security/advisories/mfsa2014-85</url>
+      <url>https://www.mozilla.org/security/advisories/mfsa2014-86</url>
+      <url>https://www.mozilla.org/security/advisories/mfsa2014-87</url>
+      <url>https://www.mozilla.org/security/advisories/mfsa2014-88</url>
+      <url>https://www.mozilla.org/security/advisories/mfsa2014-89</url>
+      <url>https://www.mozilla.org/security/advisories/</url>
+    </references>
+    <dates>
+      <discovery>2014-12-01</discovery>
+      <entry>2014-12-01</entry>
+    </dates>
+  </vuln>
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-gecko
To unsubscribe, send any mail to "[email protected]"

Reply via email to