Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 2 Dec 2015 21:49:51 +0000 (UTC)
From:      Rene Ladan <rene@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r402855 - head/security/vuxml
Message-ID:  <201512022149.tB2Lnp0p033938@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: rene
Date: Wed Dec  2 21:49:51 2015
New Revision: 402855
URL: https://svnweb.freebsd.org/changeset/ports/402855

Log:
  Doument new vulnerabilities in www/chromium < 47.0.2526.73
  
  Obtained from: 	http://googlechromereleases.blogspot.nl/2015/12/stable-channel-update.html

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Dec  2 21:41:17 2015	(r402854)
+++ head/security/vuxml/vuln.xml	Wed Dec  2 21:49:51 2015	(r402855)
@@ -1,4 +1,3 @@
-<?xml version="1.0" encoding="utf-8"?>
 <!DOCTYPE vuxml PUBLIC "-//vuxml.org//DTD VuXML 1.1//EN" "http://www.vuxml.org/dtd/vuxml-1/vuxml-11.dtd">;
 <!--
 Copyright 2003-2014 Jacques Vidrine and contributors
@@ -58,6 +57,109 @@ Notes:
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="548f74bd-993c-11e5-956b-00262d5ed8ee">
+    <topic>chromium -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>chromium</name>
+	<!--pcbsd-->
+	<name>chromium-npapi</name>
+	<name>chromium-pulse</name>
+	<range><lt>47.0.2526.73</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Google Chrome Releases reports:</p>
+	<blockquote cite="http://googlechromereleases.blogspot.nl/2015/12/stable-channel-update.html">;
+	  <p>41 security fixes in this release, inclduding:</p>
+	  <ul>
+	    <li>[558589] Critical CVE-2015-6765: Use-after-free in AppCache.
+	      Credit to anonymous.</li>
+	    <li>[551044] High CVE-2015-6766: Use-after-free in AppCache.
+	      Credit to anonymous.</li>
+	    <li>[554908] High CVE-2015-6767: Use-after-free in AppCache.
+	      Credit to anonymous.</li>
+	    <li>[556724] High CVE-2015-6768: Cross-origin bypass in DOM.
+	      Credit to Mariusz Mlynski.</li>
+	    <li>[534923] High CVE-2015-6769: Cross-origin bypass in core.
+	      Credit to Mariusz Mlynski.</li>
+	    <li>[541206] High CVE-2015-6770: Cross-origin bypass in DOM.
+	      Credit to Mariusz Mlynski.</li>
+	    <li>[544991] High CVE-2015-6771: Out of bounds access in v8.
+	      Credit to anonymous.</li>
+	    <li>[546545] High CVE-2015-6772: Cross-origin bypass in DOM.
+	      Credit to Mariusz Mlynski.</li>
+	    <li>[554946] High CVE-2015-6764: Out of bounds access in v8.
+	      Credit to Guang Gong of Qihoo 360 via pwn2own.</li>
+	    <li>[491660] High CVE-2015-6773: Out of bounds access in Skia.
+	      Credit to cloudfuzzer.</li>
+	    <li>[549251] High CVE-2015-6774: Use-after-free in Extensions.
+	      Credit to anonymous.</li>
+	    <li>[529012] High CVE-2015-6775: Type confusion in PDFium.
+	      Credit to Atte Kettunen of OUSPG.</li>
+	    <li>[457480] High CVE-2015-6776: Out of bounds access in PDFium.
+	      Credit to Hanno Böck.</li>
+	    <li>[544020] High CVE-2015-6777: Use-after-free in DOM.
+	      Credit to Long Liu of Qihoo 360Vulcan Team.</li>
+	    <li>[514891] Medium CVE-2015-6778: Out of bounds access in PDFium.
+	      Credit to Karl Skomski.</li>
+	    <li>[528505] Medium CVE-2015-6779: Scheme bypass in PDFium.
+	      Credit to Til Jasper Ullrich.</li>
+	    <li>[490492] Medium CVE-2015-6780: Use-after-free in Infobars.
+	      Credit to Khalil Zhani.</li>
+	    <li>[497302] Medium CVE-2015-6781: Integer overflow in Sfntly.
+	      Credit to miaubiz.</li>
+	    <li>[536652] Medium CVE-2015-6782: Content spoofing in Omnibox.
+	      Credit to Luan Herrera.</li>
+	    <li>[537205] Medium CVE-2015-6783: Signature validation issue in
+	      Android Crazy Linker. Credit to Michal Bednarski.</li>
+	    <li>[503217] Low CVE-2015-6784: Escaping issue in saved pages.
+	      Credit to Inti De Ceukelaire.</li>
+	    <li>[534542] Low CVE-2015-6785: Wildcard matching issue in CSP.
+	      Credit to Michael Ficarra / Shape Security.</li>
+	    <li>[534570] Low CVE-2015-6786: Scheme bypass in CSP. Credit to
+	      Michael Ficarra / Shape Security.</li>
+	    <li>[563930] CVE-2015-6787: Various fixes from internal audits,
+	      fuzzing and other initiatives.</li>
+	    <li>  Multiple vulnerabilities in V8 fixed at the tip of the 4.7
+	      branch (currently 4.7.80.23).</li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2015-6765</cvename>
+      <cvename>CVE-2015-6766</cvename>
+      <cvename>CVE-2015-6767</cvename>
+      <cvename>CVE-2015-6768</cvename>
+      <cvename>CVE-2015-6769</cvename>
+      <cvename>CVE-2015-6770</cvename>
+      <cvename>CVE-2015-6771</cvename>
+      <cvename>CVE-2015-6772</cvename>
+      <cvename>CVE-2015-6773</cvename>
+      <cvename>CVE-2015-6774</cvename>
+      <cvename>CVE-2015-6775</cvename>
+      <cvename>CVE-2015-6776</cvename>
+      <cvename>CVE-2015-6777</cvename>
+      <cvename>CVE-2015-6778</cvename>
+      <cvename>CVE-2015-6779</cvename>
+      <cvename>CVE-2015-6780</cvename>
+      <cvename>CVE-2015-6781</cvename>
+      <cvename>CVE-2015-6782</cvename>
+      <cvename>CVE-2015-6783</cvename>
+      <cvename>CVE-2015-6784</cvename>
+      <cvename>CVE-2015-6785</cvename>
+      <cvename>CVE-2015-6786</cvename>
+      <cvename>CVE-2015-6787</cvename>
+      <url>http://googlechromereleases.blogspot.nl/2015/12/stable-channel-update.html</url>;
+    </references>
+    <dates>
+      <discovery>2015-12-01</discovery>
+      <entry>2015-12-02</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="11351c82-9909-11e5-a9c8-14dae9d5a9d2">
     <topic>piwik -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201512022149.tB2Lnp0p033938>