Date: Wed, 10 Jul 2013 14:35:58 +0000 (UTC) From: Rene Ladan <rene@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r322699 - head/security/vuxml Message-ID: <201307101435.r6AEZwNu067230@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: rene Date: Wed Jul 10 14:35:58 2013 New Revision: 322699 URL: http://svnweb.freebsd.org/changeset/ports/322699 Log: Add new vulnerabilities for www/chromium < 28.0.1500.71 Obtained from: http://googlechromereleases.blogspot.nl/ Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Jul 10 14:01:42 2013 (r322698) +++ head/security/vuxml/vuln.xml Wed Jul 10 14:35:58 2013 (r322699) @@ -51,6 +51,75 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3b80104f-e96c-11e2-8bac-00262d5ed8ee"> + <topic>chromium -- multiple vulnerabilities</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>28.0.1500.71</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Google Chrome Releases reports:</p> + <blockquote cite="http://googlechromereleases.blogspot.nl/"> + <p>A special reward for Andrey Labunets for his combination of + CVE-2013-2879 and CVE-2013-2868 along with some (since fixed) + server-side bugs.</p> + <p>[252216] Low CVE-2013-2867: Block pop-unders in various + scenarios.</p> + <p>[252062] High CVE-2013-2879: Confusion setting up sign-in and sync. + Credit to Andrey Labunets.</p> + <p>[252034] Medium CVE-2013-2868: Incorrect sync of NPAPI extension + component. Credit to Andrey Labunets.</p> + <p>[245153] Medium CVE-2013-2869: Out-of-bounds read in JPEG2000 + handling. Credit to Felix Groebert of Google Security Team.</p> + <p>[244746] [242762] Critical CVE-2013-2870: Use-after-free with + network sockets. Credit to Collin Payne.</p> + <p>[244260] Medium CVE-2013-2853: Man-in-the-middle attack against + HTTP in SSL. Credit to Antoine Delignat-Lavaud and Karthikeyan + Bhargavan from Prosecco at INRIA Paris.</p> + <p>[243991] [243818] High CVE-2013-2871: Use-after-free in input + handling. Credit to miaubiz.</p> + <p>[Mac only] [242702] Low CVE-2013-2872: Possible lack of entropy in + renderers. Credit to Eric Rescorla.</p> + <p>[241139] High CVE-2013-2873: Use-after-free in resource loading. + Credit to miaubiz.</p> + <p>[233848] Medium CVE-2013-2875: Out-of-bounds-read in SVG. Credit + to miaubiz.</p> + <p>[229504] Medium CVE-2013-2876: Extensions permissions confusion + with interstitials. Credit to Dev Akhawe.</p> + <p>[229019] Low CVE-2013-2877: Out-of-bounds read in XML parsing. + Credit to Aki Helin of OUSPG.</p> + <p>[196636] None: Remove the "viewsource" attribute on iframes. + Credit to Collin Jackson.</p> + <p>[177197] Medium CVE-2013-2878: Out-of-bounds read in text + handling. Credit to Atte Kettunen of OUSPG.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-2853</cvename> + <cvename>CVE-2013-2867</cvename> + <cvename>CVE-2013-2868</cvename> + <cvename>CVE-2013-2869</cvename> + <cvename>CVE-2013-2870</cvename> + <cvename>CVE-2013-2871</cvename> + <cvename>CVE-2013-2872</cvename> + <cvename>CVE-2013-2873</cvename> + <cvename>CVE-2013-2875</cvename> + <cvename>CVE-2013-2876</cvename> + <cvename>CVE-2013-2877</cvename> + <cvename>CVE-2013-2878</cvename> + <cvename>CVE-2013-2879</cvename> + <url>http://googlechromereleases.blogspot.nl/</url> + </references> + <dates> + <discovery>2013-07-09</discovery> + <entry>2013-07-10</entry> + </dates> + </vuln> + <vuln vid="f3d24aee-e5ad-11e2-b183-20cf30e32f6d"> <topic>apache22 -- mod_rewrite vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201307101435.r6AEZwNu067230>