Date: Wed, 1 Sep 2021 20:39:37 GMT From: Rene Ladan <rene@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: d14afe74fa0e - main - security/vuxml: add www/chromium < 93.0.4577.63 Message-ID: <202109012039.181Kdbga020633@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by rene: URL: https://cgit.FreeBSD.org/ports/commit/?id=d14afe74fa0e9534dbaa33a89aa11480d5d2c6aa commit d14afe74fa0e9534dbaa33a89aa11480d5d2c6aa Author: Rene Ladan <rene@FreeBSD.org> AuthorDate: 2021-09-01 15:18:30 +0000 Commit: Rene Ladan <rene@FreeBSD.org> CommitDate: 2021-09-01 20:34:29 +0000 security/vuxml: add www/chromium < 93.0.4577.63 Obtained from: https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop_31.html --- security/vuxml/vuln-2021.xml | 97 +++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 96 insertions(+), 1 deletion(-) diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml index 970a48531564..76be37c19665 100644 --- a/security/vuxml/vuln-2021.xml +++ b/security/vuxml/vuln-2021.xml @@ -1,3 +1,98 @@ + <vuln vid="a7732806-0b2a-11ec-836b-3065ec8fd3ec"> + <topic>chromium -- multiple vulnerabilities</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>93.0.4577.63</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Chrome Releases reports:</p> + <blockquote cite="https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop_31.html"> + <p>This release contains 27 security fixes, including:</p> + <ul> + <li>[1233975] High CVE-2021-30606: Use after free in Blink. Reported + by Nan Wang (@eternalsakura13) and koocola (@alo_cook) of 360 + Alpha Lab on 2021-07-28</li> + <li>[1235949] High CVE-2021-30607: Use after free in Permissions. + Reported by Weipeng Jiang (@Krace) from Codesafe Team of + Legendsec at Qi'anxin Group on 2021-08-03</li> + <li>[1219870] High CVE-2021-30608: Use after free in Web Share. + Reported by Huyna at Viettel Cyber Security on 2021-06-15</li> + <li>[1239595] High CVE-2021-30609: Use after free in Sign-In. + Reported by raven (@raid_akame) on 2021-08-13</li> + <li>[1200440] High CVE-2021-30610: Use after free in Extensions API. + Reported by Igor Bukanov from Vivaldi on 2021-04-19</li> + <li>[1233942] Medium CVE-2021-30611: Use after free in WebRTC. + Reported by Nan Wang (@eternalsakura13) and koocola (@alo_cook) of + 360 Alpha Lab on 2021-07-28</li> + <li>[1234284] Medium CVE-2021-30612: Use after free in WebRTC. + Reported by Nan Wang (@eternalsakura13) and koocola (@alo_cook) of + 360 Alpha Lab on 2021-07-29</li> + <li>[1209622] Medium CVE-2021-30613: Use after free in Base + internals. Reported by Yangkang (@dnpushme) of 360 ATA on + 2021-05-16</li> + <li>[1207315] Medium CVE-2021-30614: Heap buffer overflow in + TabStrip. Reported by Huinian Yang (@vmth6) of Amber Security Lab, + OPPO Mobile Telecommunications Corp. Ltd. on 2021-05-10</li> + <li>[1208614] Medium CVE-2021-30615: Cross-origin data leak in + Navigation. Reported by NDevTK on 2021-05-12</li> + <li>[1231432] Medium CVE-2021-30616: Use after free in Media. + Reported by Anonymous on 2021-07-21</li> + <li>[1226909] Medium CVE-2021-30617: Policy bypass in Blink. + Reported by NDevTK on 2021-07-07</li> + <li>[1232279] Medium CVE-2021-30618: Inappropriate implementation in + DevTools. Reported by @DanAmodio and @mattaustin from Contrast + Security on 2021-07-23</li> + <li>[1235222] Medium CVE-2021-30619: UI Spoofing in Autofill. + Reported by Alesandro Ortiz on 2021-08-02</li> + <li>[1063518] Medium CVE-2021-30620: Insufficient policy enforcement + in Blink. Reported by Jun Kokatsu, Microsoft Browser Vulnerability + Research on 2020-03-20</li> + <li>[1204722] Medium CVE-2021-30621: UI Spoofing in Autofill. + Reported by Abdulrahman Alqabandi, Microsoft Browser Vulnerability + Research on 2021-04-30</li> + <li>[1224419] Medium CVE-2021-30622: Use after free in WebApp + Installs. Reported by Jun Kokatsu, Microsoft Browser Vulnerability + Research on 2021-06-28</li> + <li>[1223667] Low CVE-2021-30623: Use after free in Bookmarks. + Reported by Leecraso and Guang Gong of 360 Alpha Lab on + 2021-06-25</li> + <li>[1230513] Low CVE-2021-30624: Use after free in Autofill. + Reported by Wei Yuan of MoyunSec VLab on 2021-07-19</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2021-30606</cvename> + <cvename>CVE-2021-30607</cvename> + <cvename>CVE-2021-30608</cvename> + <cvename>CVE-2021-30609</cvename> + <cvename>CVE-2021-30610</cvename> + <cvename>CVE-2021-30611</cvename> + <cvename>CVE-2021-30612</cvename> + <cvename>CVE-2021-30613</cvename> + <cvename>CVE-2021-30614</cvename> + <cvename>CVE-2021-30615</cvename> + <cvename>CVE-2021-30616</cvename> + <cvename>CVE-2021-30617</cvename> + <cvename>CVE-2021-30618</cvename> + <cvename>CVE-2021-30619</cvename> + <cvename>CVE-2021-30620</cvename> + <cvename>CVE-2021-30621</cvename> + <cvename>CVE-2021-30622</cvename> + <cvename>CVE-2021-30623</cvename> + <cvename>CVE-2021-30624</cvename> + <url>https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop_31.html</url> + </references> + <dates> + <discovery>2021-08-31</discovery> + <entry>2021-09-01</entry> + </dates> + </vuln> + <vuln vid="3d915d96-0b1f-11ec-8d9f-080027415d17"> <topic>cyrus-imapd -- multiple-minute daemon hang via input that is mishandled during hash-table interaction</topic> <affects> @@ -25,7 +120,7 @@ <blockquote cite="https://www.cyrusimap.org/imap/download/release-notes/3.4/x/3.4.2.html"> <p>Fixed CVE-2021-33582: Certain user inputs are used as hash table keys during processing. A poorly chosen string hashing algorithm meant that the user could control which bucket their data was stored in, allowing a malicious user to direct many inputs to a single bucket. Each subsequent insertion to the same bucket requires a strcmp of every other entry in it. At tens of thousands of entries, each new insertion could keep the CPU busy in a strcmp loop for minutes. The string hashing algorithm has been replaced with a better one, and now also uses a random seed per hash table, so malicious inputs cannot be precomputed.</p> - </blockquote> + </blockquote> </body> </description> <references>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202109012039.181Kdbga020633>