Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 3 Jun 2024 12:32:16 GMT
From:      Robert Nagy <rnagy@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 3e70f65ff74f - main - security/vuxml: add www/*chromium < 125.0.6422.141
Message-ID:  <202406031232.453CWG9Z070168@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by rnagy:

URL: https://cgit.FreeBSD.org/ports/commit/?id=3e70f65ff74fec100971d0243dde52c5ebe12d3d

commit 3e70f65ff74fec100971d0243dde52c5ebe12d3d
Author:     Robert Nagy <rnagy@FreeBSD.org>
AuthorDate: 2024-06-03 12:31:31 +0000
Commit:     Robert Nagy <rnagy@FreeBSD.org>
CommitDate: 2024-06-03 12:32:09 +0000

    security/vuxml: add www/*chromium < 125.0.6422.141
    
    Obtained from:  https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html
---
 security/vuxml/vuln/2024.xml | 45 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 45 insertions(+)

diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index 03eadfe8f1f0..b1ef1325f5b3 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -1,3 +1,48 @@
+  <vuln vid="b058380e-21a4-11ef-8a0f-a8a1599412c6">
+    <topic>chromium -- multiple security fixes</topic>
+    <affects>
+      <package>
+       <name>chromium</name>
+       <range><lt>125.0.6422.141</lt></range>
+      </package>
+      <package>
+       <name>ungoogled-chromium</name>
+       <range><lt>125.0.6422.141</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+       <p>Chrome Releases reports:</p>
+       <blockquote cite="https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html">;
+	 <p>This update includes 11 security fixes:</p>
+	 <ul>
+	    <li>[339877165] High CVE-2024-5493: Heap buffer overflow in WebRTC. Reported by Cassidy Kim(@cassidy6564) on 2024-05-11</li>
+	    <li>[338071106] High CVE-2024-5494: Use after free in Dawn. Reported by wgslfuzz on 2024-05-01</li>
+	    <li>[338103465] High CVE-2024-5495: Use after free in Dawn. Reported by wgslfuzz on 2024-05-01</li>
+	    <li>[338929744] High CVE-2024-5496: Use after free in Media Session. Reported by Cassidy Kim(@cassidy6564) on 2024-05-06</li>
+	    <li>[339061099] High CVE-2024-5497: Out of bounds memory access in Keyboard Inputs. Reported by zh1x1an1221 of Ant Group Tianqiong Security Lab on 2024-05-07</li>
+	    <li>[339588211] High CVE-2024-5498: Use after free in Presentation API. Reported by anymous on 2024-05-09</li>
+	    <li>[339877167] High CVE-2024-5499: Out of bounds write in Streams API. Reported by anonymous on 2024-05-11</li>
+	 </ul>
+       </blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2024-5493</cvename>
+      <cvename>CVE-2024-5494</cvename>
+      <cvename>CVE-2024-5495</cvename>
+      <cvename>CVE-2024-5496</cvename>
+      <cvename>CVE-2024-5497</cvename>
+      <cvename>CVE-2024-5498</cvename>
+      <cvename>CVE-2024-5499</cvename>
+      <url>https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html</url>;
+    </references>
+    <dates>
+      <discovery>2024-05-30</discovery>
+      <entry>2024-06-03</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="320a19f7-1ddd-11ef-a2ae-8c164567ca3c">
     <topic>nginx-devel -- Multiple Vulnerabilities in HTTP/3</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202406031232.453CWG9Z070168>