From nobody Tue Dec 7 20:59:40 2021 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id C2C8518DCD6B; Tue, 7 Dec 2021 20:59:40 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4J7t303sDvz3DbS; Tue, 7 Dec 2021 20:59:40 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 644DC26B8A; Tue, 7 Dec 2021 20:59:40 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 1B7KxeMI061392; Tue, 7 Dec 2021 20:59:40 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 1B7KxeXJ061391; Tue, 7 Dec 2021 20:59:40 GMT (envelope-from git) Date: Tue, 7 Dec 2021 20:59:40 GMT Message-Id: <202112072059.1B7KxeXJ061391@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Rene Ladan Subject: git: 61be3bb83a5c - main - security/vuxml: document www/chromium < 96.0.4664.93 List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: rene X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 61be3bb83a5c1fd7cbedaec7209d3a1dc8abb2c4 Auto-Submitted: auto-generated ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1638910780; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=ZfBbSWODEx8y3V3a9oxH8sBfFiGorQ91xyj3Fh0/of0=; b=Bx7STdzQjKK07TWeRKN+oY8NtwsUmOkonRqWnfb3engoZ5LUDkh7YgIe3NkmgrYZLNymwB Qi21L7QvQIMeM2CozkGLVP4obVnqHFfHQpndJHnMfVnRofroxPKod10mMTTT9haQgpdwkK HKgdunJrY01K+k+S64ZKX8LwSOEjWwaDCjc3t3U8HqHwEf/o2YJD/i3VW5WU4dL3CXUcTp p0ZFmGGquN/DUZtgBg64t1O5Mfr8arv2apz2eAOaUj1E/2dj/Unefp7UTJ+PioqJOiidJo TCm76rYDQdJVpHn32QCapWV2CD53uMOsHQn/3ZPAsRrM7EL8dYKY18b+Z76drQ== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1638910780; a=rsa-sha256; cv=none; b=Lzuj0sZV8QLZV9N83keYD7jdg+NLRXOmPgq4Efg4EfEYhT0dA5aAmve6byq+ECkRRtYDPm Qqb3/BKuypgrspDe4Ht1yt1XLJTq/DTyFM/GHlwaiMr2B0/KemSHbOMoW3TREEp1ziTNE7 vfcFK9qxSZibY6441MpW6FFbQwZy0uBBKVlBnM7UfmSkJE25j5tXDWInA9yQWdne+laZ2v 9NgTglcIwSvKL9GooB69ibU3z9gGL+kfdOarv9Iw/cR5v0uZMXdpESb9dDzDUPS03NymdA 6bkyXQILnJfhHMWCDxqiTaJyv3pffzClAHgQaufp/PTZFSEUFBwPaNcWiFKOlA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by rene: URL: https://cgit.FreeBSD.org/ports/commit/?id=61be3bb83a5c1fd7cbedaec7209d3a1dc8abb2c4 commit 61be3bb83a5c1fd7cbedaec7209d3a1dc8abb2c4 Author: Rene Ladan AuthorDate: 2021-12-07 20:58:47 +0000 Commit: Rene Ladan CommitDate: 2021-12-07 20:59:33 +0000 security/vuxml: document www/chromium < 96.0.4664.93 Obtained from: https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html --- security/vuxml/vuln-2021.xml | 86 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 86 insertions(+) diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml index d34054d4af63..43b87c9ef03c 100644 --- a/security/vuxml/vuln-2021.xml +++ b/security/vuxml/vuln-2021.xml @@ -1,3 +1,89 @@ + + chromium -- multiple vulnerabilities + + + chromium + 96.0.4664.93 + + + + +

Chrome Releases reports:

+
+

This release contains 22 security fixes, including:

+
    +
  • [1267661] High CVE-2021-4052: Use after free in web apps. + Reported by Wei Yuan of MoyunSec VLab on 2021-11-07
  • +
  • [1267791] High CVE-2021-4053: Use after free in UI. Reported by + Rox on 2021-11-08
  • +
  • [1265806] High CVE-2021-4079: Out of bounds write in WebRTC. + Reported by Brendon Tiszka on 2021-11-01
  • +
  • [1239760] High CVE-2021-4054: Incorrect security UI in autofill. + Reported by Alesandro Ortiz on 2021-08-13
  • +
  • [1268738] High CVE-2021-4078: Type confusion in V8. Reported by + Nan Wang (@eternalsakura13) and Guang Gong of 360 Alpha Lab on + 2021-11-09
  • +
  • [1266510] High CVE-2021-4055: Heap buffer overflow in + extensions. Reported by Chen Rong on 2021-11-03
  • +
  • [1260939] High CVE-2021-4056: Type Confusion in loader. Reported + by @__R0ng of 360 Alpha Lab on 2021-10-18
  • +
  • [1262183] High CVE-2021-4057: Use after free in file API. + Reported by Sergei Glazunov of Google Project Zero on + 2021-10-21
  • +
  • [1267496] High CVE-2021-4058: Heap buffer overflow in ANGLE. + Reported by Abraruddin Khan and Omair on 2021-11-06
  • +
  • [1270990] High CVE-2021-4059: Insufficient data validation in + loader. Reported by Luan Herrera (@lbherrera_) on 2021-11-17
  • +
  • [1271456] High CVE-2021-4061: Type Confusion in V8. Reported by + Paolo Severini on 2021-11-18
  • +
  • [1272403] High CVE-2021-4062: Heap buffer overflow in BFCache. + Reported by Leecraso and Guang Gong of 360 Alpha Lab on + 2021-11-22
  • +
  • [1273176] High CVE-2021-4063: Use after free in developer tools. + Reported by Abdulrahman Alqabandi, Microsoft Browser Vulnerability + Research on 2021-11-23
  • +
  • [1273197] High CVE-2021-4064: Use after free in screen capture. + Reported by @ginggilBesel on 2021-11-23
  • +
  • [1273674] High CVE-2021-4065: Use after free in autofill. + Reported by 5n1p3r0010 on 2021-11-25
  • +
  • [1274499] High CVE-2021-4066: Integer underflow in ANGLE. + Reported by Jaehun Jeong(@n3sk) of Theori on 2021-11-29
  • +
  • [1274641] High CVE-2021-4067: Use after free in window manager. + Reported by @ginggilBesel on 2021-11-29
  • +
  • [1265197] Low CVE-2021-4068: Insufficient validation of + untrusted input in new tab page. Reported by NDevTK on + 2021-10-31
  • +
+
+ +
+ + CVE-2021-4052 + CVE-2021-4053 + CVE-2021-4054 + CVE-2021-4055 + CVE-2021-4056 + CVE-2021-4057 + CVE-2021-4058 + CVE-2021-4059 + CVE-2021-4061 + CVE-2021-4062 + CVE-2021-4063 + CVE-2021-4064 + CVE-2021-4065 + CVE-2021-4066 + CVE-2021-4067 + CVE-2021-4068 + CVE-2021-4078 + CVE-2021-4079 + https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html + + + 2021-12-06 + 2021-12-07 + +
+ Gitlab -- Multiple Vulnerabilities