Date: Thu, 26 Jan 2017 17:44:29 +0000 (UTC) From: "Carlos J. Puga Medina" <cpm@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r432522 - head/security/vuxml Message-ID: <201701261744.v0QHiTJa020355@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: cpm Date: Thu Jan 26 17:44:29 2017 New Revision: 432522 URL: https://svnweb.freebsd.org/changeset/ports/432522 Log: Document new vulnerabilities in www/chromium < 56.0.2924.76 Obtained from: https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Jan 26 17:42:50 2017 (r432521) +++ head/security/vuxml/vuln.xml Thu Jan 26 17:44:29 2017 (r432522) @@ -58,6 +58,98 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="4b9ca994-e3d9-11e6-813d-e8e0b747a45a"> + <topic>chromium -- multiple vulnerabilities</topic> + <affects> + <package> + <name>chromium</name> + <name>chromium-npapi</name> + <name>chromium-pulse</name> + <range><lt>56.0.2924.76</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Google Chrome Releases reports:</p> + <blockquote cite="https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"> + <p>51 security fixes in this release, including:</p> + <ul> + <li>[671102] High CVE-2017-5007: Universal XSS in Blink. Credit to + Mariusz Mlynski</li> + <li>[673170] High CVE-2017-5006: Universal XSS in Blink. Credit to + Mariusz Mlynski</li> + <li>[668552] High CVE-2017-5008: Universal XSS in Blink. Credit to + Mariusz Mlynski</li> + <li>[663476] High CVE-2017-5010: Universal XSS in Blink. Credit to + Mariusz Mlynski</li> + <li>[662859] High CVE-2017-5011: Unauthorised file access in Devtools. + Credit to Khalil Zhani</li> + <li>[667504] High CVE-2017-5009: Out of bounds memory access in WebRTC. + Credit to Sean Stanek and Chip Bradford</li> + <li>[681843] High CVE-2017-5012: Heap overflow in V8. Credit to + Gergely Nagy (Tresorit)</li> + <li>[677716] Medium CVE-2017-5013: Address spoofing in Omnibox. + Credit to Haosheng Wang (@gnehsoah)</li> + <li>[675332] Medium CVE-2017-5014: Heap overflow in Skia. Credit to + sweetchip</li> + <li>[673971] Medium CVE-2017-5015: Address spoofing in Omnibox. + Credit to Armin Razmdjou</li> + <li>[666714] Medium CVE-2017-5019: Use after free in Renderer. + Credit to Wadih Matar</li> + <li>[673163] Medium CVE-2017-5016: UI spoofing in Blink. Credit to + Haosheng Wang (@gnehsoah)</li> + <li>[676975] Medium CVE-2017-5017: Uninitialised memory access in webm video. + Credit to danberm</li> + <li>[668665] Medium CVE-2017-5018: Universal XSS in chrome://apps. + Credit to Rob Wu</li> + <li>[668653] Medium CVE-2017-5020: Universal XSS in chrome://downloads. + Credit to Rob Wu</li> + <li>[663726] Low CVE-2017-5021: Use after free in Extensions. Credit to + Rob Wu</li> + <li>[663620] Low CVE-2017-5022: Bypass of Content Security Policy in Blink. + Credit to Pujun Li of PKAV Team</li> + <li>[651443] Low CVE-2017-5023: Type confunsion in metrics. Credit to the + UK's National Cyber Security Centre (NCSC)</li> + <li>[643951] Low CVE-2017-5024: Heap overflow in FFmpeg. Credit to + Paul Mehta</li> + <li>[643950] Low CVE-2017-5025: Heap overflow in FFmpeg. Credit to + Paul Mehta</li> + <li>[634108] Low CVE-2017-5026: UI spoofing. Credit to Ronni Skansing</li> + <li>[685349] Various fixes from internal audits, fuzzing and other initiatives</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2017-5007</cvename> + <cvename>CVE-2017-5006</cvename> + <cvename>CVE-2017-5008</cvename> + <cvename>CVE-2017-5010</cvename> + <cvename>CVE-2017-5011</cvename> + <cvename>CVE-2017-5009</cvename> + <cvename>CVE-2017-5012</cvename> + <cvename>CVE-2017-5013</cvename> + <cvename>CVE-2017-5014</cvename> + <cvename>CVE-2017-5015</cvename> + <cvename>CVE-2017-5019</cvename> + <cvename>CVE-2017-5016</cvename> + <cvename>CVE-2017-5017</cvename> + <cvename>CVE-2017-5018</cvename> + <cvename>CVE-2017-2020</cvename> + <cvename>CVE-2017-2021</cvename> + <cvename>CVE-2017-2022</cvename> + <cvename>CVE-2017-2023</cvename> + <cvename>CVE-2017-2024</cvename> + <cvename>CVE-2017-2025</cvename> + <cvename>CVE-2017-2026</cvename> + <url>https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html</url> + </references> + <dates> + <discovery>2017-01-25</discovery> + <entry>2017-01-26</entry> + </dates> + </vuln> + <vuln vid="d455708a-e3d3-11e6-9940-b499baebfeaf"> <topic>OpenSSL -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201701261744.v0QHiTJa020355>