Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 24 Apr 2018 18:07:21 +0000 (UTC)
From:      Thomas Zander <riggs@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r468227 - head/security/vuxml
Message-ID:  <201804241807.w3OI7LEO058193@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: riggs
Date: Tue Apr 24 18:07:21 2018
New Revision: 468227
URL: https://svnweb.freebsd.org/changeset/ports/468227

Log:
  Document vulnerabilities in chromium before 66.0.3359.117
  
  Submitted by:	tommi.pernila@iki.fi (via mail to ports-secteam)
  Reviewed by:	riggs

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Apr 24 18:05:23 2018	(r468226)
+++ head/security/vuxml/vuln.xml	Tue Apr 24 18:07:21 2018	(r468227)
@@ -58,6 +58,101 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="36ff7a74-47b1-11e8-a7d6-54e1ad544088">
+     <topic>chromium -- vulnerability</topic>
+    <affects>
+      <package>
+	<name>chromium</name>
+	<range><lt>66.0.3359.117</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Google Chrome Releases reports:</p>
+	<blockquote cite="https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html">;
+	  <p>62 security fixes in this release:</p>
+	  <ul>
+	   <li>[826626] Critical CVE-2018-6085: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-28</li>
+	   <li>[827492] Critical CVE-2018-6086: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-30</li>
+	   <li>[813876] High CVE-2018-6087: Use after free in WebAssembly. Reported by Anonymous on 2018-02-20</li>
+	   <li>[822091] High CVE-2018-6088: Use after free in PDFium. Reported by Anonymous on 2018-03-15</li>
+	   <li>[808838] High CVE-2018-6089: Same origin policy bypass in Service Worker. Reported by Rob Wu on 2018-02-04</li>
+	   <li>[820913] High CVE-2018-6090: Heap buffer overflow in Skia. Reported by ZhanJia Song on 2018-03-12</li>
+	   <li>[771933] High CVE-2018-6091: Incorrect handling of plug-ins by Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-10-05</li>
+	   <li>[819869] High CVE-2018-6092: Integer overflow in WebAssembly. Reported by Natalie Silvanovich of Google Project Zero on 2018-03-08</li>
+	   <li>[780435] Medium CVE-2018-6093: Same origin bypass in Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-11-01</li>
+	   <li>[633030] Medium CVE-2018-6094: Exploit hardening regression in Oilpan. Reported by Chris Rohlf on 2016-08-01</li>
+	   <li>[637098] Medium CVE-2018-6095: Lack of meaningful user interaction requirement before file upload. Reported by Abdulrahman Alqabandi (@qab) on 2016-08-11</li>
+	   <li>[776418] Medium CVE-2018-6096: Fullscreen UI spoof. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-19</li>
+	   <li>[806162] Medium CVE-2018-6097: Fullscreen UI spoof. Reported by xisigr of Tencent's Xuanwu Lab on 2018-01-26</li>
+	   <li>[798892] Medium CVE-2018-6098: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-01-03</li>
+	   <li>[808825] Medium CVE-2018-6099: CORS bypass in ServiceWorker. Reported by Jun Kokatsu (@shhnjk) on 2018-02-03</li>
+	   <li>[811117] Medium CVE-2018-6100: URL spoof in Omnibox. Reported by Lnyas Zhang on 2018-02-11</li>
+	   <li>[813540] Medium CVE-2018-6101: Insufficient protection of remote debugging prototol in DevTools . Reported by Rob Wu on 2018-02-19</li>
+	   <li>[813814] Medium CVE-2018-6102: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-20</li>
+	   <li>[816033] Medium CVE-2018-6103: UI spoof in Permissions. Reported by Khalil Zhani on 2018-02-24</li>
+	   <li>[820068] Medium CVE-2018-6104: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-03-08</li>
+	   <li>[803571] Medium CVE-2018-6105: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-01-18</li>
+	   <li>[805729] Medium CVE-2018-6106: Incorrect handling of promises in V8. Reported by lokihardt of Google Project Zero on 2018-01-25</li>
+	   <li>[808316] Medium CVE-2018-6107: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-02</li>
+	   <li>[816769] Medium CVE-2018-6108: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-27</li>
+	   <li>[710190] Low CVE-2018-6109: Incorrect handling of files by FileAPI. Reported by Dominik Weber (@DoWeb_) on 2017-04-10</li>
+	   <li>[777737] Low CVE-2018-6110: Incorrect handling of plaintext files via file:// . Reported by Wenxiang Qian (aka blastxiang) on 2017-10-24</li>
+	   <li>[780694] Low CVE-2018-6111: Heap-use-after-free in DevTools. Reported by Khalil Zhani on 2017-11-02</li>
+	   <li>[798096] Low CVE-2018-6112: Incorrect URL handling in DevTools. Reported by Rob Wu on 2017-12-29</li>
+	   <li>[805900] Low CVE-2018-6113: URL spoof in Navigation. Reported by Khalil Zhani on 2018-01-25</li>
+	   <li>[811691] Low CVE-2018-6114: CSP bypass. Reported by Lnyas Zhang on 2018-02-13</li>
+	   <li>[819809] Low CVE-2018-6115: SmartScreen bypass in downloads. Reported by James Feher on 2018-03-07</li>
+	   <li>[822266] Low CVE-2018-6116: Incorrect low memory handling in WebAssembly. Reported by Jin from Chengdu Security Response Center of Qihoo 360 Technology Co. Ltd. on 2018-03-15</li>
+	   <li>[822465] Low CVE-2018-6117: Confusing autofill settings. Reported by Spencer Dailey on 2018-03-15</li>
+	   <li>[822424] Low CVE-2018-6084: Incorrect use of Distributed Objects in Google Software Updater on MacOS. Reported by Ian Beer of Google Project Zero on 2018-03-15</li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html</url>;
+      <cvename>CVE-2018-6085</cvename>
+      <cvename>CVE-2018-6086</cvename>
+      <cvename>CVE-2018-6087</cvename>
+      <cvename>CVE-2018-6088</cvename>
+      <cvename>CVE-2018-6089</cvename>
+      <cvename>CVE-2018-6090</cvename>
+      <cvename>CVE-2018-6091</cvename>
+      <cvename>CVE-2018-6092</cvename>
+      <cvename>CVE-2018-6093</cvename>
+      <cvename>CVE-2018-6094</cvename>
+      <cvename>CVE-2018-6095</cvename>
+      <cvename>CVE-2018-6096</cvename>
+      <cvename>CVE-2018-6097</cvename>
+      <cvename>CVE-2018-6098</cvename>
+      <cvename>CVE-2018-6099</cvename>
+      <cvename>CVE-2018-6100</cvename>
+      <cvename>CVE-2018-6101</cvename>
+      <cvename>CVE-2018-6102</cvename>
+      <cvename>CVE-2018-6103</cvename>
+      <cvename>CVE-2018-6104</cvename>
+      <cvename>CVE-2018-6105</cvename>
+      <cvename>CVE-2018-6106</cvename>
+      <cvename>CVE-2018-6107</cvename>
+      <cvename>CVE-2018-6108</cvename>
+      <cvename>CVE-2018-6109</cvename>
+      <cvename>CVE-2018-6110</cvename>
+      <cvename>CVE-2018-6111</cvename>
+      <cvename>CVE-2018-6112</cvename>
+      <cvename>CVE-2018-6113</cvename>
+      <cvename>CVE-2018-6114</cvename>
+      <cvename>CVE-2018-6115</cvename>
+      <cvename>CVE-2018-6116</cvename>
+      <cvename>CVE-2018-6117</cvename>
+      <cvename>CVE-2018-6084</cvename>
+    </references>
+    <dates>
+      <discovery>2017-04-10</discovery>
+      <entry>2018-04-24</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="d8382a69-4728-11e8-ba83-0011d823eebd">
     <topic>mbed TLS (PolarSSL) -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201804241807.w3OI7LEO058193>