diff options
author | Thomas Deutschmann <whissi@gentoo.org> | 2017-01-04 16:26:25 +0100 |
---|---|---|
committer | Thomas Deutschmann <whissi@gentoo.org> | 2017-01-04 16:26:25 +0100 |
commit | 082d2e572755d30ba7143486447cd92b21352f36 (patch) | |
tree | f83059d43128e52cf4ebe08dfcba99b72fefd288 /glsa-201701-15.xml | |
parent | Add GLSA 201701-15 (diff) | |
download | glsa-082d2e572755d30ba7143486447cd92b21352f36.tar.gz glsa-082d2e572755d30ba7143486447cd92b21352f36.tar.bz2 glsa-082d2e572755d30ba7143486447cd92b21352f36.zip |
Fix GLSA 201701-15
Not all CVEs listed were resolved in the www-client/seamonkey{,-bin}
version in Gentoo repository. Therefore, SeaMonkey was removed from the
GLSA and a separate GLSA addressing the outstanding Mozilla SeaMonkey
vulnerabilities will be published as soon as possible.
Diffstat (limited to 'glsa-201701-15.xml')
-rw-r--r-- | glsa-201701-15.xml | 75 |
1 files changed, 11 insertions, 64 deletions
diff --git a/glsa-201701-15.xml b/glsa-201701-15.xml index 893c2fe8..5209b617 100644 --- a/glsa-201701-15.xml +++ b/glsa-201701-15.xml @@ -1,16 +1,14 @@ <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> <glsa id="201701-15"> - <title>Mozilla Firefox, SeaMonkey, Thunderbird: Multiple vulnerabilities</title> - <synopsis>Multiple vulnerabilities have been found in Mozilla Firefox, - SeaMonkey, and Thunderbird the worst of which could lead to the execution - of arbitrary code. + <title>Mozilla Firefox, Thunderbird: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in Mozilla Firefox and + Thunderbird the worst of which could lead to the execution of arbitrary + code. </synopsis> - <product type="ebuild">firefox, thunderbird, seamonkey</product> + <product type="ebuild">firefox, thunderbird</product> <announced>January 03, 2017</announced> - <revised>January 03, 2017: 1</revised> - <bug>539242</bug> - <bug>541506</bug> + <revised>January 04, 2017: 2</revised> <bug>581326</bug> <bug>590330</bug> <bug>594616</bug> @@ -36,28 +34,18 @@ <unaffected range="ge">45.6.0</unaffected> <vulnerable range="lt">45.6.0</vulnerable> </package> - <package name="www-client/seamonkey" auto="yes" arch="*"> - <unaffected range="ge">2.38</unaffected> - <vulnerable range="lt">2.38</vulnerable> - </package> - <package name="www-client/seamonkey-bin" auto="yes" arch="*"> - <unaffected range="ge">2.38</unaffected> - <vulnerable range="lt">2.38</vulnerable> - </package> </affected> <background> <p>Mozilla Firefox is a cross-platform web browser from Mozilla. The Mozilla Thunderbird mail client is a redesign of the Mozilla Mail component. The goal is to produce a cross-platform stand-alone mail - application using XUL (XML User Interface Language). SeaMonkey is a free - and open-source Internet suite. It is the continuation of the former - Mozilla Application Suite, based on the same source code. + application using XUL (XML User Interface Language). </p> </background> <description> - <p>Multiple vulnerabilities have been discovered in Mozilla Firefox, - SeaMonkey, and Thunderbird. Please review the CVE identifiers referenced - below for details. + <p>Multiple vulnerabilities have been discovered in Mozilla Firefox and + Thunderbird. Please review the CVE identifiers referenced below for + details. </p> </description> <impact type="normal"> @@ -98,49 +86,8 @@ # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-45.6.0" </code> - - <p>All SeaMonkey users should upgrade to the latest version:</p> - - <code> - # emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-2.38" - </code> - - <p>All SeaMonkey-bin users should upgrade to the latest version:</p> - - <code> - # emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-2.38" - </code> </resolution> <references> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8634">CVE-2014-8634</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8635">CVE-2014-8635</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8636">CVE-2014-8636</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8637">CVE-2014-8637</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8638">CVE-2014-8638</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8639">CVE-2014-8639</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8640">CVE-2014-8640</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8641">CVE-2014-8641</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8642">CVE-2014-8642</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0819">CVE-2015-0819</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0820">CVE-2015-0820</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0821">CVE-2015-0821</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0822">CVE-2015-0822</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0823">CVE-2015-0823</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0824">CVE-2015-0824</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0825">CVE-2015-0825</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0826">CVE-2015-0826</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0827">CVE-2015-0827</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0828">CVE-2015-0828</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0829">CVE-2015-0829</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0830">CVE-2015-0830</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0831">CVE-2015-0831</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0832">CVE-2015-0832</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0833">CVE-2015-0833</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0834">CVE-2015-0834</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0835">CVE-2015-0835</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0836">CVE-2015-0836</uri> <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2804">CVE-2016-2804</uri> <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2805">CVE-2016-2805</uri> <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2806">CVE-2016-2806</uri> @@ -218,5 +165,5 @@ <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9905">CVE-2016-9905</uri> </references> <metadata tag="requester" timestamp="Mon, 02 Jan 2017 23:32:38 +0000">b-man</metadata> - <metadata tag="submitter" timestamp="Tue, 03 Jan 2017 12:54:04 +0000">b-man</metadata> + <metadata tag="submitter" timestamp="Wed, 04 Jan 2017 14:37:04 +0000">b-man</metadata> </glsa> |