Date: Thu, 8 Mar 2018 19:28:06 +0000 (UTC) From: Thomas Zander <riggs@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r463915 - head/security/vuxml Message-ID: <201803081928.w28JS65T022756@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: riggs Date: Thu Mar 8 19:28:06 2018 New Revision: 463915 URL: https://svnweb.freebsd.org/changeset/ports/463915 Log: Document vulnerabilities in www/chromium before 65.0.3325.146 Submitted by: Tommi Pernila <tommi.pernila@iki.fi> (via e-mail) Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Mar 8 19:10:29 2018 (r463914) +++ head/security/vuxml/vuln.xml Thu Mar 8 19:28:06 2018 (r463915) @@ -58,6 +58,88 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="555af074-22b9-11e8-9799-54ee754af08e"> +<topic>chromium -- vulnerability</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>65.0.3325.146</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Google Chrome Releases reports:</p> + <blockquote cite="https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html"> + <p>45 security fixes in this release:</p> + <ul> + <li>[758848] High CVE-2017-11215: Use after free in Flash. Reported by JieZeng of Tencent Zhanlu Lab on 2017-08-25</li> + <li>[758863] High CVE-2017-11225: Use after free in Flash. Reported by JieZeng of Tencent Zhanlu Lab on 2017-08-25</li> + <li>[780919] High CVE-2018-6060: Use after free in Blink. Reported by Omair on 2017-11-02</li> + <li>[794091] High CVE-2018-6061: Race condition in V8. Reported by Guang Gong of Alpha Team, Qihoo 360 on 2017-12-12</li> + <li>[780104] High CVE-2018-6062: Heap buffer overflow in Skia. Reported by Anonymous on 2017-10-31</li> + <li>[789959] High CVE-2018-6057: Incorrect permissions on shared memory. Reported by Gal Beniamini of Google Project Zero on 2017-11-30</li> + <li>[792900] High CVE-2018-6063: Incorrect permissions on shared memory. Reported by Gal Beniamini of Google Project Zero on 2017-12-07</li> + <li>[798644] High CVE-2018-6064: Type confusion in V8. Reported by lokihardt of Google Project Zero on 2018-01-03</li> + <li>[808192] High CVE-2018-6065: Integer overflow in V8. Reported by Mark Brand of Google Project Zero on 2018-02-01</li> + <li>[799477] Medium CVE-2018-6066: Same Origin Bypass via canvas. Reported by Masato Kinugawa on 2018-01-05</li> + <li>[779428] Medium CVE-2018-6067: Buffer overflow in Skia. Reported by Ned Williamson on 2017-10-30</li> + <li>[779428] Medium CVE-2018-6067: Buffer overflow in Skia. Reported by Ned Williamson on 2017-10-30</li> + <li>[799918] Medium CVE-2018-6069: Stack buffer overflow in Skia. Reported by Wanglu and Yangkang(@dnpushme) of Qihoo360 Qex Team on 2018-01-08</li> + <li>[668645] Medium CVE-2018-6070: CSP bypass through extensions. Reported by Rob Wu on 2016-11-25</li> + <li>[777318] Medium CVE-2018-6071: Heap bufffer overflow in Skia. Reported by Anonymous on 2017-10-23</li> + <li>[791048] Medium CVE-2018-6072: Integer overflow in PDFium. Reported by Atte Kettunen of OUSPG on 2017-12-01</li> + <li>[804118] Medium CVE-2018-6073: Heap bufffer overflow in WebGL. Reported by Omair on 2018-01-20</li> + <li>[809759] Medium CVE-2018-6074: Mark-of-the-Web bypass. Reported by Abdulrahman Alqabandi (@qab) on 2018-02-06</li> + <li>[608669] Medium CVE-2018-6075: Overly permissive cross origin downloads. Reported by Inti De Ceukelaire (intigriti.com) on 2016-05-03</li> + <li>[758523] Medium CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink. Reported by Mateusz Krzeszowiec on 2017-08-24</li> + <li>[778506] Medium CVE-2018-6077: Timing attack using SVG filters. Reported by Khalil Zhani on 2017-10-26</li> + <li>[793628] Medium CVE-2018-6078: URL Spoof in OmniBox. Reported by Khalil Zhani on 2017-12-10</li> + <li>[788448] Medium CVE-2018-6079: Information disclosure via texture data in WebGL. Reported by Ivars Atteka on 2017-11-24</li> + <li>[792028] Medium CVE-2018-6080: Information disclosure in IPC call. Reported by Gal Beniamini of Google Project Zero on 2017-12-05</li> + <li>[797525] Low CVE-2018-6081: XSS in interstitials. Reported by Rob Wu on 2017-12-24</li> + <li>[767354] Low CVE-2018-6082: Circumvention of port blocking. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-09-21</li> + <li>[771709] Low CVE-2018-6083: Incorrect processing of AppManifests. Reported by Jun Kokatsu (@shhnjk) on 2017-10-04</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2017-11215</cvename> + <cvename>CVE-2017-11225</cvename> + <cvename>CVE-2018-6060</cvename> + <cvename>CVE-2018-6061</cvename> + <cvename>CVE-2018-6060</cvename> + <cvename>CVE-2018-6061</cvename> + <cvename>CVE-2018-6062</cvename> + <cvename>CVE-2018-6057</cvename> + <cvename>CVE-2018-6063</cvename> + <cvename>CVE-2018-6064</cvename> + <cvename>CVE-2018-6065</cvename> + <cvename>CVE-2018-6066</cvename> + <cvename>CVE-2018-6067</cvename> + <cvename>CVE-2018-6069</cvename> + <cvename>CVE-2018-6070</cvename> + <cvename>CVE-2018-6071</cvename> + <cvename>CVE-2018-6072</cvename> + <cvename>CVE-2018-6073</cvename> + <cvename>CVE-2018-6074</cvename> + <cvename>CVE-2018-6075</cvename> + <cvename>CVE-2018-6076</cvename> + <cvename>CVE-2018-6077</cvename> + <cvename>CVE-2018-6078</cvename> + <cvename>CVE-2018-6079</cvename> + <cvename>CVE-2018-6080</cvename> + <cvename>CVE-2018-6081</cvename> + <cvename>CVE-2018-6082</cvename> + <cvename>CVE-2018-6083</cvename> + <url>https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html</url> + </references> + <dates> + <discovery>2016-05-03</discovery> + <entry>2018-03-08</entry> + </dates> +</vuln> + <vuln vid="c5ab620f-4576-4ad5-b51f-93e4fec9cd0e"> <topic>wireshark -- multiple security issues</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201803081928.w28JS65T022756>