Subject: pkg/30744: incorrect package vulnerability entry for firefox
To: None <pkg-manager@netbsd.org, gnats-admin@netbsd.org,>
From: None <smb@cs.columbia.edu>
List: pkgsrc-bugs
Date: 07/13/2005 17:35:00
>Number:         30744
>Category:       pkg
>Synopsis:       bad firefox entries in pkg-vulnerabilities
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    pkg-manager
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Wed Jul 13 17:35:00 +0000 2005
>Originator:     Steven M. Bellovin
>Release:        NetBSD 3.99.7
>Organization:
Department of Computer Science, Columbia University
>Environment:
	
	
System: NetBSD berkshire.machshav.com 3.99.7 NetBSD 3.99.7 (BERKSHIRE) #1: Fri Jul 1 15:56:08 EDT 2005 smb@berkshire.machshav.com:/usr/BUILD/obj/sys/arch/i386/compile/BERKSHIRE i386
Architecture: i386
Machine: i386
>Description:
	These two entries in pkg-vulnerabilities:

	firefox{,-bin,-gtk1,-gtk2,-gtk2-bin}-[0-9]*     http-frame-spoof        http://secunia.com/advisories/15601/
	firefox{,-bin,-gtk1,-gtk2,-gtk2-bin}-[0-9]*     dialog-spoofing         http://secunia.com/advisories/15489/

	are wrong.  The advisories themselves say to upgrade to 1.0.5,
	but those entries object to 1.0.5.

>How-To-Repeat:
	cd pkgsrc/www/firefox-bin && MOZILLA_USE_LINUX=y make install
>Fix:
	Use ALLOW_VULNERABLE_PACKAGES=y

>Unformatted: