From owner-svn-ports-all@freebsd.org Sun Mar 12 20:19:00 2017 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 643CAD099C6; Sun, 12 Mar 2017 20:19:00 +0000 (UTC) (envelope-from cpm@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3DD6B1BDD; Sun, 12 Mar 2017 20:19:00 +0000 (UTC) (envelope-from cpm@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id v2CKIxP4036671; Sun, 12 Mar 2017 20:18:59 GMT (envelope-from cpm@FreeBSD.org) Received: (from cpm@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id v2CKIxwJ036670; Sun, 12 Mar 2017 20:18:59 GMT (envelope-from cpm@FreeBSD.org) Message-Id: <201703122018.v2CKIxwJ036670@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: cpm set sender to cpm@FreeBSD.org using -f From: "Carlos J. Puga Medina" Date: Sun, 12 Mar 2017 20:18:59 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r436024 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 12 Mar 2017 20:19:00 -0000 Author: cpm Date: Sun Mar 12 20:18:59 2017 New Revision: 436024 URL: https://svnweb.freebsd.org/changeset/ports/436024 Log: Document new vulnerabilities in www/chromium < 57.0.2987.98 Obtained from: https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Mar 12 20:15:40 2017 (r436023) +++ head/security/vuxml/vuln.xml Sun Mar 12 20:18:59 2017 (r436024) @@ -58,6 +58,90 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + chromium -- multiple vulnerabilities + + + chromium + chromium-npapi + chromium-pulse + 57.0.2987.98 + + + + +

Google Chrome Releases reports:

+
+

36 security fixes in this release, including:

+
    +
  • [682194] High CVE-2017-5030: Memory corruption in V8. Credit to + Brendon Tiszka
  • +
  • [682020] High CVE-2017-5031: Use after free in ANGLE. Credit to + Looben Yang
  • +
  • [668724] High CVE-2017-5032: Out of bounds write in PDFium. Credit to + Ashfaq Ansari - Project Srishti
  • +
  • [676623] High CVE-2017-5029: Integer overflow in libxslt. Credit to + Holger Fuhrmannek
  • +
  • [678461] High CVE-2017-5034: Use after free in PDFium. Credit to + Ke Liu of Tencent's Xuanwu Lab
  • +
  • [688425] High CVE-2017-5035: Incorrect security UI in Omnibox. Credit to + Enzo Aguado
  • +
  • [691371] High CVE-2017-5036: Use after free in PDFium. Credit to + Anonymous
  • +
  • [679640] High CVE-2017-5037: Multiple out of bounds writes in ChunkDemuxer. + Credit to Yongke Wang of Tecent's Xuanwu Lab
  • +
  • [679649] High CVE-2017-5039: Use after free in PDFium. Credit to + jinmo123
  • +
  • [691323] Medium CVE-2017-5040: Information disclosure in V8. Credit to + Choongwoo Han
  • +
  • [642490] Medium CVE-2017-5041: Address spoofing in Omnibox. Credit to + Jordi Chancel
  • +
  • [669086] Medium CVE-2017-5033: Bypass of Content Security Policy in Blink. + Credit to Nicolai Grodum
  • +
  • [671932] Medium CVE-2017-5042: Incorrect handling of cookies in Cast. + Credit to Mike Ruddy
  • +
  • [695476] Medium CVE-2017-5038: Use after free in GuestView. Credit to + Anonymous
  • +
  • [683523] Medium CVE-2017-5043: Use after free in GuestView. Credit to + Anonymous
  • +
  • [688987] Medium CVE-2017-5044: Heap overflow in Skia. Credit to + Kushal Arvind Shah of Fortinet's FortiGuard Labs
  • +
  • [667079] Medium CVE-2017-5045: Information disclosure in XSS Auditor. + Credit to Dhaval Kapil
  • +
  • [680409] Medium CVE-2017-5046: Information disclosure in Blink. Credit to + Masato Kinugawa
  • +
  • [699618] Various fixes from internal audits, fuzzing and other initiatives
  • +
+
+ +
+ + CVE-2017-5030 + CVE-2017-5031 + CVE-2017-5032 + CVE-2017-5029 + CVE-2017-5034 + CVE-2017-5035 + CVE-2017-5036 + CVE-2017-5037 + CVE-2017-5039 + CVE-2017-5040 + CVE-2017-5041 + CVE-2017-5033 + CVE-2017-5042 + CVE-2017-5038 + CVE-2017-5043 + CVE-2017-5044 + CVE-2017-5045 + CVE-2017-5046 + https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html + + + 2017-03-09 + 2017-03-12 + +
+ Several Security Defects in the Bouncy Castle Crypto APIs