https://www.mozilla.org/en-US/security/advisories/mfsa2016-50/ https://www.mozilla.org/en-US/security/advisories/mfsa2016-49/ https://www.mozilla.org/en-US/security/advisories/mfsa2016-58/ https://www.mozilla.org/en-US/security/advisories/mfsa2016-56/ https://www.mozilla.org/en-US/security/advisories/mfsa2016-55/ https://www.mozilla.org/en-US/security/advisories/mfsa2016-53/ https://www.mozilla.org/en-US/security/advisories/mfsa2016-51/ https://www.mozilla.org/en-US/security/advisories/mfsa2016-62/ https://www.mozilla.org/en-US/security/advisories/mfsa2016-60/ https://www.mozilla.org/en-US/security/advisories/mfsa2016-59/ https://www.mozilla.org/en-US/security/advisories/mfsa2016-52/ https://www.mozilla.org/en-US/security/advisories/mfsa2016-57/ https://www.mozilla.org/en-US/security/advisories/mfsa2016-54/
New versions are in the tree. Arches, please stabilize the ESR 45.2 version as follows: www-client/firefox-45.2.0 Target KEYWORDS="amd64 hppa ppc ppc64 x86" www-client/firefox-bin-45.2.0 Target KEYWORDS="amd64 x86"
cc'ing arches... Please stabilize the ESR 45.2 version as follows: www-client/firefox-45.2.0 Target KEYWORDS="amd64 hppa ppc ppc64 x86" www-client/firefox-bin-45.2.0 Target KEYWORDS="amd64 x86"
CVE-2016-2834 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2834): Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors. CVE-2016-2833 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2833): Mozilla Firefox before 47.0 ignores Content Security Policy (CSP) directives for cross-domain Java applets, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted applet. CVE-2016-2832 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2832): Mozilla Firefox before 47.0 allows remote attackers to discover the list of disabled plugins via a fingerprinting attack involving Cascading Style Sheets (CSS) pseudo-classes. CVE-2016-2831 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2831): Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote attackers to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site. CVE-2016-2829 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2829): Mozilla Firefox before 47.0 allows remote attackers to spoof permission notifications via a crafted web site that rapidly triggers permission requests, as demonstrated by the microphone permission or the geolocation permission. CVE-2016-2828 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2828): Use-after-free vulnerability in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via WebGL content that triggers texture access after destruction of the texture's recycle pool. CVE-2016-2826 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2826): The maintenance service in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 on Windows does not prevent MAR extracted-file modification during updater execution, which might allow local users to gain privileges via a Trojan horse file. CVE-2016-2825 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2825): Mozilla Firefox before 47.0 allows remote attackers to bypass the Same Origin Policy and modify the location.host property via an invalid data: URL. CVE-2016-2824 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2824): The TSymbolTableLevel class in ANGLE, as used in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 on Windows, allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact by triggering use of a WebGL shader that writes to an array. CVE-2016-2822 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2822): Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to spoof the address bar via a SELECT element with a persistent menu. CVE-2016-2821 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2821): Use-after-free vulnerability in the mozilla::dom::Element class in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2, when contenteditable mode is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering deletion of DOM elements that were created in the editor. CVE-2016-2819 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2819): Heap-based buffer overflow in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via foreign-context HTML5 fragments, as demonstrated by fragments within an SVG element. CVE-2016-2818 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2818): Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. CVE-2016-2815 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2815): Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Not sure how I messed that up... arches, please stabilize: =www-client/firefox-45.2.0 Target KEYWORDS="amd64 hppa ppc ppc64 x86" =www-client/firefox-bin-45.2.0 Target KEYWORDS="amd64 x86"
RepoMan scours the neighborhood... dependency.bad [fatal] 14 www-client/firefox/firefox-45.2.0.ebuild: DEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] www-client/firefox/firefox-45.2.0.ebuild: RDEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] www-client/firefox/firefox-45.2.0.ebuild: DEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland/desktop) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] www-client/firefox/firefox-45.2.0.ebuild: RDEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland/desktop) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] www-client/firefox/firefox-45.2.0.ebuild: DEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland/desktop/gnome) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] www-client/firefox/firefox-45.2.0.ebuild: RDEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland/desktop/gnome) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] www-client/firefox/firefox-45.2.0.ebuild: DEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland/desktop/gnome/systemd) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] www-client/firefox/firefox-45.2.0.ebuild: RDEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland/desktop/gnome/systemd) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] www-client/firefox/firefox-45.2.0.ebuild: DEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland/desktop/kde) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] www-client/firefox/firefox-45.2.0.ebuild: RDEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland/desktop/kde) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] www-client/firefox/firefox-45.2.0.ebuild: DEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland/desktop/kde/systemd) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] www-client/firefox/firefox-45.2.0.ebuild: RDEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland/desktop/kde/systemd) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] www-client/firefox/firefox-45.2.0.ebuild: DEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland/developer) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] www-client/firefox/firefox-45.2.0.ebuild: RDEPEND: ppc64(default/linux/powerpc/ppc64/13.0/64bit-userland/developer) ['>=media-gfx/graphite2-1.3.8', '>=media-libs/libvpx-1.5.0:0=[postproc]'] Waiting for two blocking bugs.
Dropped HPPA keywording.
*** Bug 588072 has been marked as a duplicate of this bug. ***
Since no arch has gone stable yet with this version, I'm adding mail-client/thunderbird-45.2.0 to this bug instead of filing a new one. It's a subset of the same vulnerability list. AT's please stabilize as follows: mail-client/thunderbird-45.2.0 Stable KEYWORDS="amd64 ppc ppc64 x86" mail-client/thunderbird-bin-45.2.0 Stable KEYWORDS="amd64 x86"
Stable for PPC64.
amd64 stable
x86 stable
www-client/firefox-45.2.0 has been removed from the tree. ppc arch, please continue stabilization on bug 590330