From owner-freebsd-chromium@FreeBSD.ORG Wed Jul 16 20:57:16 2014 Return-Path: Delivered-To: freebsd-chromium@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 131BFB1E; Wed, 16 Jul 2014 20:57:16 +0000 (UTC) Received: from erelay2.ox.registrar-servers.com (erelay2.ox.registrar-servers.com [192.64.117.125]) by mx1.freebsd.org (Postfix) with ESMTP id E30B92285; Wed, 16 Jul 2014 20:57:14 +0000 (UTC) Received: from localhost (unknown [127.0.0.1]) by erelay1.ox.registrar-servers.com (Postfix) with ESMTP id 00E702204BD1; Wed, 16 Jul 2014 20:46:41 +0000 (UTC) Received: from erelay1.ox.registrar-servers.com ([127.0.0.1]) by localhost (erelay.ox.registrar-servers.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 8AKKbKb2v4h4; Wed, 16 Jul 2014 16:46:39 -0400 (EDT) Received: from imap2.ox.privateemail.com (imap2.ox.privateemail.com [198.187.29.234]) by erelay1.ox.registrar-servers.com (Postfix) with ESMTP id D42132204C4F; Wed, 16 Jul 2014 16:46:39 -0400 (EDT) Received: from localhost (localhost [127.0.0.1]) by mail.privateemail.com (Postfix) with ESMTP id 7F7588C007B; Wed, 16 Jul 2014 16:46:39 -0400 (EDT) X-Virus-Scanned: Debian amavisd-new at imap2.ox.privateemail.com Received: from mail.privateemail.com ([127.0.0.1]) by localhost (imap2.ox.privateemail.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 3qtOGwKVO-fq; Wed, 16 Jul 2014 16:46:39 -0400 (EDT) Received: from localhost (27.Red-88-3-119.dynamicIP.rima-tde.net [88.3.119.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.privateemail.com (Postfix) with ESMTPSA id 9AD348C0075; Wed, 16 Jul 2014 16:46:38 -0400 (EDT) Date: Wed, 16 Jul 2014 22:46:16 +0200 From: Carlos Jacobo Puga Medina To: freebsd-chromium@freebsd.org Subject: Document new vulnerabilities in www/chromium < 36.0.1985.122 Message-Id: <20140716224616.c65911f7742e91632b3e691d@fbsd.es> X-Mailer: Sylpheed 3.4.2 (GTK+ 2.24.22; i386-portbld-freebsd11.0) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-chromium@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: FreeBSD-specific Chromium issues List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 16 Jul 2014 20:57:16 -0000 Current www/chromium is marked as vulnerable on Google Chrome Releases website [1]. --- vuln.xml.old 2014-07-16 22:18:17.000000000 +0200 +++ vuln.xml 2014-07-16 22:38:07.000000000 +0200 @@ -57,6 +57,39 @@ --> + + chromium -- multiple vulnerabilities + + + chromium + 36.0.1985.122 + + + + +

Google Chrome Releases reports:

+
+

26 security fixes in this release, including

+
    +
  • [380885] Medium CVE-2014-3160: Same-Origin-Policy bypass in SVG. Credit + to Christian Schneider.
  • +
  • [393765] CVE-2014-3162: Various fixes from internal audits, fuzzing and + other initiatives.
  • +
+
+ +
+ + CVE-2014-3160 + CVE-2014-3162 + http://googlechromereleases.blogspot.nl + + + 2014-07-16 + 2014-07-16 + +
+ [1] http://googlechromereleases.blogspot.nl -- Carlos Jacobo Puga Medina