I've been told these are all applicable, but have not yet done any independent research. CVE-2017-5472: Use-after-free using destroyed node when regenerating trees CVE-2017-7749: Use-after-free during docshell reloading CVE-2017-7750: Use-after-free with track elements CVE-2017-7751: Use-after-free with content viewer listeners CVE-2017-7752: Use-after-free with IME input CVE-2017-7754: Out-of-bounds read in WebGL with ImageInfo object CVE-2017-7755: Privilege escalation through Firefox Installer with same directory DLL files CVE-2017-7756: Use-after-free and use-after-scope logging XHR header errors CVE-2017-7757: Use-after-free in IndexedDB CVE-2017-7778: Vulnerabilities in the Graphite 2 library CVE-2017-7758: Out-of-bounds read in Opus encoder CVE-2017-7759: Android intent URLs can cause navigation to local file system CVE-2017-7760: File manipulation and privilege escalation via callback parameter in Mozilla Windows Updater and Maintenance Service CVE-2017-7761: File deletion and privilege escalation through Mozilla Maintenance Service helper.exe application CVE-2017-7762: Addressbar spoofing in Reader mode CVE-2017-7763: Mac fonts render some unicode characters as spaces CVE-2017-7764: Domain spoofing with combination of Canadian Syllabics and other unicode blocks CVE-2017-7765: Mark of the Web bypass when saving executable files CVE-2017-7766: File execution and privilege escalation through updater.ini, Mozilla Windows Updater, and Mozilla Maintenance Service CVE-2017-7767: Privilege escalation and arbitrary file overwrites through Mozilla Windows Updater and Mozilla Maintenance Service CVE-2017-7768: 32 byte arbitrary file read through Mozilla Maintenance Service CVE-2017-5471: Memory safety bugs fixed in Firefox 54 CVE-2017-5470: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2
The port cannot be updated, see https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=220607
https://bugzilla.mozilla.org/show_bug.cgi?id=1221724
The only thing I use that requires www/libxul is java/icedtea-web. I'm trying to figure out if its actually needed by icedtea-web because its not listed explicitly as a dependency in the Makefile, but that is a separate issue. What course of action is there to address these vulnerabilities? remove www/libxul from ports?
(In reply to Andrew Marks from comment #3) It IS actually needed for building NPAPI plugins. I guess the only way to work around this problem is adding a slave port only to install *.h and *.pc files.
(In reply to Jung-uk Kim from comment #4) My problems are solved for now thanks to: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=220648 I can remove www/libxul after building java/icedtea-web, which was the only thing I needed www/libxul for.
Maybe someone can check how many vulnerabilities (since 45.9) are fixed by https://github.com/classilla/tenfourfox
A commit references this bug: Author: jbeich Date: Wed Nov 22 06:25:47 UTC 2017 New revision: 454674 URL: https://svnweb.freebsd.org/changeset/ports/454674 Log: www/libxul: expire after ESR59 but before 2018Q3 Non-Flash plugins aren't supported past FF52 and Gnash doesn't work in FF57. XUL consumers (e.g., Conkeror) may still be able to use "firefox -app". PR: 220607 Changes: head/www/libxul/Makefile
Expired port removed.