Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 15 Jan 2014 23:19:28 +0100
From:      Remko Lodder <remko@FreeBSD.org>
To:        Rene Ladan <rene@FreeBSD.org>
Cc:        svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org, ports-committers@freebsd.org
Subject:   Re: svn commit: r339828 - branches/2014Q1/security/vuxml
Message-ID:  <7D594B65-2957-43C0-BF7D-8A33B977DA6A@FreeBSD.org>
In-Reply-To: <201401152218.s0FMI039053008@svn.freebsd.org>
References:  <201401152218.s0FMI039053008@svn.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help

--Apple-Mail=_66167912-B6BA-46AD-A54C-C7DC2EB0F1CE
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252


On 15 Jan 2014, at 23:18, Rene Ladan <rene@FreeBSD.org> wrote:

> Author: rene
> Date: Wed Jan 15 22:18:00 2014
> New Revision: 339828
> URL: http://svnweb.freebsd.org/changeset/ports/339828
> QAT: https://qat.redports.org/buildarchive/r339828/
>=20
> Log:
>  MFH: r339825
>=20
>  Document new vulnerabilities in www/chromium < 32.0.1700.77
>=20
>  Obtained from:	http://googlechromereleases.blogspot.nl/
>=20
>  MFH: r339721
>=20
>  Merge latest ntpd entry from remko@ which came in as a merge =
conflict.
>=20
>  Approved by:	portmgr (erwin)


Thank you!

>=20
> Modified:
>  branches/2014Q1/security/vuxml/vuln.xml
> Directory Properties:
>  branches/2014Q1/   (props changed)
>=20
> Modified: branches/2014Q1/security/vuxml/vuln.xml
> =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D
> --- branches/2014Q1/security/vuxml/vuln.xml	Wed Jan 15 22:11:43 2014	=
(r339827)
> +++ branches/2014Q1/security/vuxml/vuln.xml	Wed Jan 15 22:18:00 2014	=
(r339828)
> @@ -51,6 +51,87 @@ Note:  Please add new entries to the beg
>=20
> -->
> <vuxml xmlns=3D"http://www.vuxml.org/apps/vuxml-1">;
> +  <vuln vid=3D"5acf4638-7e2c-11e3-9fba-00262d5ed8ee">
> +    <topic>chromium -- multiple vulnerabilities</topic>
> +    <affects>
> +      <package>
> +	<name>chromium</name>
> +	<range><lt>32.0.1700.77</lt></range>
> +      </package>
> +    </affects>
> +    <description>
> +      <body xmlns=3D"http://www.w3.org/1999/xhtml">;
> +	<p>Google Chrome Releases reports:</p>
> +	<blockquote cite=3D"http://googlechromereleases.blogspot.nl/">;
> +	  <p>11 security fixes in this release, including:</p>
> +	  <ul>
> +	    <li>[249502] High CVE-2013-6646: Use-after-free in web =
workers.
> +	      Credit to Collin Payne.</li>
> +	    <li>[326854] High CVE-2013-6641: Use-after-free related to =
forms.
> +	      Credit to Atte Kettunen of OUSPG.</li>
> +	    <li>[324969] High CVE-2013-6642: Address bar spoofing in =
Chrome for
> +	      Android. Credit to lpilorz.</li>
> +	    <li>[321940] High CVE-2013-6643: Unprompted sync with an =
attacker=92s
> +	      Google account. Credit to Joao Lucas Melo Brasio.</li>
> +	    <li>[318791] Medium CVE-2013-6645 Use-after-free related to =
speech
> +	      input elements. Credit to Khalil Zhani.</li>
> +	    <li>[333036] CVE-2013-6644: Various fixes from internal =
audits,
> +	      fuzzing and other initiatives.</li>
> +	  </ul>
> +	</blockquote>
> +      </body>
> +    </description>
> +    <references>
> +      <cvename>CVE-2013-6641</cvename>
> +      <cvename>CVE-2013-6642</cvename>
> +      <cvename>CVE-2013-6643</cvename>
> +      <cvename>CVE-2013-6644</cvename>
> +      <cvename>CVE-2013-6645</cvename>
> +      <cvename>CVE-2013-6646</cvename>
> +      <url>http://googlechromereleases.blogspot.nl/</url>;
> +    </references>
> +    <dates>
> +      <discovery>2014-01-14</discovery>
> +      <entry>2014-01-15</entry>
> +    </dates>
> +  </vuln>
> +
> +  <vuln vid=3D"3d95c9a7-7d5c-11e3-a8c1-206a8a720317">
> +    <topic>ntpd DRDoS / Amplification Attack using ntpdc monlist =
command</topic>
> +    <affects>
> +      <package>
> +	<name>ntp</name>
> +	<range><lt>4.2.7p26</lt></range>
> +      </package>
> +    </affects>
> +    <description>
> +      <body xmlns=3D"http://www.w3.org/1999/xhtml">;
> +	<p>ntp.org reports:</p>
> +	<blockquote =
cite=3D"http://support.ntp.org/bin/view/Main/SecurityNotice#DRDoS_Amplific=
ation_Attack_using">
> +	  <p>Unrestricted access to the monlist feature in
> +	    ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote
> +	    attackers to cause a denial of service (traffic
> +	    amplification) via forged (1) REQ_MON_GETLIST or (2)
> +	    REQ_MON_GETLIST_1 requests, as exploited in the wild in
> +	    December 2013</p>
> +	  <p>Use noquery to your default restrictions to block all
> +	    status queries.</p>
> +	  <p>Use disable monitor to disable the ``ntpdc -c monlist''
> +	    command while still allowing other status queries.</p>
> +	</blockquote>
> +      </body>
> +    </description>
> +    <references>
> +      <cvename>CVE-2013-5211</cvename>
> +      <freebsdsa>SA-14:02.ntpd</freebsdsa>
> +      =
<url>http://support.ntp.org/bin/view/Main/SecurityNotice#DRDoS_Amplificati=
on_Attack_using</url>
> +    </references>
> +    <dates>
> +      <discovery>2014-01-01</discovery>
> +      <entry>2014-01-14</entry>
> +    </dates>
> +  </vuln>
> +
>   <vuln vid=3D"ba04a373-7d20-11e3-8992-00132034b086">
>     <topic>nagios -- denial of service vulnerability</topic>
>     <affects>
> _______________________________________________
> svn-ports-all@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/svn-ports-all
> To unsubscribe, send any mail to =
"svn-ports-all-unsubscribe@freebsd.org"

--=20

/"\   Best regards,                      | remko@FreeBSD.org
\ /   Remko Lodder                       | remko@EFnet
 X    http://www.evilcoder.org/          |
/ \   ASCII Ribbon Campaign              | Against HTML Mail and News


--Apple-Mail=_66167912-B6BA-46AD-A54C-C7DC2EB0F1CE
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org

iQIcBAEBAgAGBQJS1wlxAAoJEKjD27JZ84ywMcwQAKECANBGJU5yIiVCrsZS0PfP
9/TRWMzGvpYJm0RYyb/2V3jGbv3RP6qt5ZCmXt5gmooxrml6coc+VvkZkrR9CbiQ
c+DswFqnHreu6Vr37PE8YTXuAGCF0WdSEUhgABhvNjsQ1fHNoS85mvtIXXRm8zMb
tUUFYSXWsZ0ghwpE14mNnQcrGqcPt55bYHf+YyOkDV/80I6NJ+fE6ZibTgCHyTIr
wxhgpvyQj9kcVdJ/cEU9GYErAGQnGcjPYsUhdvfnHHYnEu08gpzpQdg9zA3GeOzR
Pf8fJbNdzKdhl7tHS5GRq/4XDeknRUDTAjw1vzGk6NgtN9n/EgY8tHUptvVctY8P
aUojCUptkmuw4qYwUI0P1Z4tZdtLYQ3Wff6WT0bJPBmKbce/iQKOdX2G8nX1DQdN
lZRlU0dMMRPUV5BIDzydnpYg6ZcHwq6+IkrdwOYqykdInoNN6keuVc6KRRSB5YGm
1iWVjxhKxsCBP1mKb/aDsmlVkdRdEyNnjWLdo4tYVWa6eogbt2VdqcwPf37xoxu2
+lhmUnKGZivB08hhn+65ruYxuoA3Zv5P3U3iKwboTZbvdRD5mK8xQ0/4PAsXFsEC
nTXhr2rbPdEy3yhAUwmQ4+qTBmAwDby1VSmojt6/b3yO5asAXHVaOPk2SPGZlxz4
ZKSz5LHotN7d+GFoEr81
=IXDN
-----END PGP SIGNATURE-----

--Apple-Mail=_66167912-B6BA-46AD-A54C-C7DC2EB0F1CE--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?7D594B65-2957-43C0-BF7D-8A33B977DA6A>