Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 1 Oct 2013 21:30:23 +0000 (UTC)
From:      Rene Ladan <rene@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r328998 - head/security/vuxml
Message-ID:  <201310012130.r91LUNwV057708@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: rene
Date: Tue Oct  1 21:30:23 2013
New Revision: 328998
URL: http://svnweb.freebsd.org/changeset/ports/328998

Log:
  Document new vulnerabilities for www/chromium < 30.0.1599.66
  
  Obtained from:	http://googlechromereleases.blogspot.nl/

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Oct  1 21:27:49 2013	(r328997)
+++ head/security/vuxml/vuln.xml	Tue Oct  1 21:30:23 2013	(r328998)
@@ -51,6 +51,94 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="e5414d0c-2ade-11e3-821d-00262d5ed8ee">
+    <topic>chromium -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>chromium</name>
+	<range><lt>30.0.1599.66</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Google Chrome Releases reports:</p>
+	<blockquote cite="http://googlechromereleases.blogspot.nl/">;
+	  <p>50 security fixes in this release, including:</p>
+	  <ul>
+	    <li>[223962][270758][271161][284785][284786] Medium CVE-2013-2906:
+	      Races in Web Audio. Credit to Atte Kettunen of OUSPG.</li>
+	    <li>[260667] Medium CVE-2013-2907: Out of bounds read in
+	      Window.prototype object. Credit to Boris Zbarsky.</li>
+	    <li>[265221] Medium CVE-2013-2908: Address bar spoofing related to
+	      the “204 No Content” status code. Credit to Chamal de Silva.</li>
+	    <li>[265838][279277] High CVE-2013-2909: Use after free in
+	      inline-block rendering. Credit to Atte Kettunen of OUSPG.</li>
+	    <li>[269753] Medium CVE-2013-2910: Use-after-free in Web Audio.
+	      Credit to Byoungyoung Lee of Georgia Tech Information Security
+	      Center (GTISC).</li>
+	    <li>[271939] High CVE-2013-2911: Use-after-free in XSLT. Credit to
+	      Atte Kettunen of OUSPG.</li>
+	    <li>[276368] High CVE-2013-2912: Use-after-free in PPAPI. Credit to
+	      Chamal de Silva and 41.w4r10r(at)garage4hackers.com.</li>
+	    <li>[278908] High CVE-2013-2913: Use-after-free in XML document
+	      parsing. Credit to cloudfuzzer.</li>
+	    <li>[279263] High CVE-2013-2914: Use after free in the Windows
+	      color chooser dialog. Credit to Khalil Zhani.</li>
+	    <li>[280512] Low CVE-2013-2915: Address bar spoofing via a
+	      malformed scheme. Credit to Wander Groeneveld. </li>
+	    <li>[281256] High CVE-2013-2916: Address bar spoofing related to
+	      the “204 No Content” status code. Credit to Masato Kinugawa.</li>
+	    <li>[281480] Medium CVE-2013-2917: Out of bounds read in Web Audio.
+	      Credit to Byoungyoung Lee and Tielei Wang of Georgia Tech
+	      Information Security Center (GTISC).</li>
+	    <li>[282088] High CVE-2013-2918: Use-after-free in DOM. Credit to
+	      Byoungyoung Lee of Georgia Tech Information Security Center
+	      (GTISC).</li>
+	    <li>[282736] High CVE-2013-2919: Memory corruption in V8. Credit to
+	      Adam Haile of Concrete Data.</li>
+	    <li>[285742] Medium CVE-2013-2920: Out of bounds read in URL
+	      parsing. Credit to Atte Kettunen of OUSPG.</li>
+	    <li>[286414] High CVE-2013-2921: Use-after-free in resource loader.
+	      Credit to Byoungyoung Lee and Tielei Wang of Georgia Tech
+	      Information Security Center (GTISC).</li>
+	    <li>[286975] High CVE-2013-2922: Use-after-free in template
+	      element. Credit to Jon Butler.</li>
+	    <li>[299016] CVE-2013-2923: Various fixes from internal audits,
+	      fuzzing and other initiatives (Chrome 30).</li>
+	    <li>[275803] Medium CVE-2013-2924: Use-after-free in ICU. Upstream
+	      bug here.</li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2013-2906</cvename>
+      <cvename>CVE-2013-2907</cvename>
+      <cvename>CVE-2013-2908</cvename>
+      <cvename>CVE-2013-2909</cvename>
+      <cvename>CVE-2013-2910</cvename>
+      <cvename>CVE-2013-2911</cvename>
+      <cvename>CVE-2013-2912</cvename>
+      <cvename>CVE-2013-2913</cvename>
+      <cvename>CVE-2013-2914</cvename>
+      <cvename>CVE-2013-2915</cvename>
+      <cvename>CVE-2013-2916</cvename>
+      <cvename>CVE-2013-2917</cvename>
+      <cvename>CVE-2013-2918</cvename>
+      <cvename>CVE-2013-2919</cvename>
+      <cvename>CVE-2013-2920</cvename>
+      <cvename>CVE-2013-2921</cvename>
+      <cvename>CVE-2013-2922</cvename>
+      <cvename>CVE-2013-2923</cvename>
+      <cvename>CVE-2013-2924</cvename>
+      <url>http://googlechromereleases.blogspot.nl/</url>;
+    </references>
+    <dates>
+      <discovery>2013-10-01</discovery>
+      <entry>2013-10-01</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="e1f99d59-81aa-4662-bf62-c1076f5016c8">
     <topic>py-graphite-web -- Multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201310012130.r91LUNwV057708>