Date: Wed, 14 Apr 2021 17:47:33 GMT From: Rene Ladan <rene@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 34921a9d57df - main - Document new vulnerabilities in www/chromium < 89.0.4389.128 Message-ID: <202104141747.13EHlXGG092631@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by rene: URL: https://cgit.FreeBSD.org/ports/commit/?id=34921a9d57dfccc296c4ac2aff7d3ed4d11e1923 commit 34921a9d57dfccc296c4ac2aff7d3ed4d11e1923 Author: Rene Ladan <rene@FreeBSD.org> AuthorDate: 2021-04-14 17:46:52 +0000 Commit: Rene Ladan <rene@FreeBSD.org> CommitDate: 2021-04-14 17:47:31 +0000 Document new vulnerabilities in www/chromium < 89.0.4389.128 Obtained from: https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html --- security/vuxml/vuln.xml | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 950f3312ab7a..fbc7527f15ed 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -76,6 +76,41 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="7c0d71a9-9d48-11eb-97a0-e09467587c17"> + <topic>chromium -- multiple vulnerabilities</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>89.0.4389.128</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Chrome Releases reports:</p> + <blockquote cite="https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html"> + <p>This release contains two security fixes:</p> + <ul> + <li>[1196781] High CVE-2021-21206: Use after free in Blink. Reported + by Anonymous on 2021-04-07</li> + <li>[1196683] High CVE-2021-21220: Insufficient validation of + untrusted input in V8 for x86_64. Reported by Bruno Keith (@bkth_) + and Niklas Baumstark (@_niklasb) of Dataflow Security (@dfsec_it) + via ZDI (ZDI-CAN-13569) on 2021-04-07></li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2021-21206</cvename> + <cvename>CVE-2021-21220</cvename> + <url>https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop.html</url> + </references> + <dates> + <discovery>2021-04-13</discovery> + <entry>2021-04-14</entry> + </dates> + </vuln> + <vuln vid="465db5b6-9c6d-11eb-8e8a-bc542f4bd1dd"> <topic>xorg-server -- Input validation failures in X server XInput extension</topic> <affects> @@ -140,6 +175,7 @@ Notes: <entry>2021-04-11</entry> </dates> </vuln> + <vuln vid="9ee01e60-6045-43df-98e5-a794007e54ef"> <topic>syncthing -- crash due to malformed relay protocol message</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202104141747.13EHlXGG092631>