From owner-freebsd-chromium@FreeBSD.ORG Wed Sep 10 08:53:39 2014 Return-Path: Delivered-To: freebsd-chromium@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 1862EA70; Wed, 10 Sep 2014 08:53:39 +0000 (UTC) Received: from erelay5.ox.registrar-servers.com (erelay5.ox.registrar-servers.com [192.64.117.65]) by mx1.freebsd.org (Postfix) with ESMTP id E529B1027; Wed, 10 Sep 2014 08:53:38 +0000 (UTC) Received: from localhost (unknown [127.0.0.1]) by erelay1.ox.registrar-servers.com (Postfix) with ESMTP id 1C96C2201CA6; Wed, 10 Sep 2014 08:53:38 +0000 (UTC) Received: from erelay1.ox.registrar-servers.com ([127.0.0.1]) by localhost (erelay.ox.registrar-servers.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id EhZN34kSp0bV; Wed, 10 Sep 2014 04:53:37 -0400 (EDT) Received: from imap11.ox.privateemail.com (imap11.ox.privateemail.com [192.64.116.222]) by erelay1.ox.registrar-servers.com (Postfix) with ESMTP id 3D8572201772; Wed, 10 Sep 2014 04:53:37 -0400 (EDT) Received: from localhost (localhost [127.0.0.1]) by mail.privateemail.com (Postfix) with ESMTP id D69B68800ED; Wed, 10 Sep 2014 04:53:36 -0400 (EDT) X-Virus-Scanned: Debian amavisd-new at imap11.ox.privateemail.com Received: from mail.privateemail.com ([127.0.0.1]) by localhost (imap11.ox.privateemail.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id IyM5i7YYtrVe; Wed, 10 Sep 2014 04:53:36 -0400 (EDT) Received: from localhost (140.Red-83-57-187.dynamicIP.rima-tde.net [83.57.187.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.privateemail.com (Postfix) with ESMTPSA id C0BD98800EF; Wed, 10 Sep 2014 04:53:34 -0400 (EDT) Date: Wed, 10 Sep 2014 10:51:56 +0200 From: Carlos Jacobo Puga Medina To: =?ISO-8859-1?Q?Ren=E9?= Ladan Subject: Re: Document new vulnerabilities in www/chromium < 37.0.2062.120 Message-Id: <20140910105156.2ef28375a20859edab4c44be@fbsd.es> In-Reply-To: <54100868.2000507@freebsd.org> References: <20140910094315.957a635d28c73570b0eccb2a@fbsd.es> <54100868.2000507@freebsd.org> X-Mailer: Sylpheed 3.4.2 (GTK+ 2.24.22; i386-portbld-freebsd11.0) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Cc: freebsd-chromium@freebsd.org X-BeenThere: freebsd-chromium@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: FreeBSD-specific Chromium issues List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 10 Sep 2014 08:53:39 -0000 On Wed, 10 Sep 2014 10:14:32 +0200 Ren=E9 Ladan wrote: > On 10-09-2014 09:43, Carlos Jacobo Puga Medina wrote: > > Current www/chromium is marked as vulnerable on Google Chrome website [= 1]. Added a new entry in vuxml. > I already added an entry last night, see r367784 I forgot to check it ;P >=20 > Thanks anyway. >=20 > Rene > > diff -urN vuln.xml.old vuln.xml > > --- vuln.xml.old 2014-09-10 09:24:32.000000000 +0200 > > +++ vuln.xml 2014-09-10 09:37:49.000000000 +0200 > > @@ -57,6 +57,39 @@ > > =20 > > --> > > > > + > > + chromium -- multiple vulnerabilities > > + > > + > > + chromium > > + 37.0.2062.120 > > + > > + > > + > > + > > +

Google Chrome Releases reports:

> > +
> > +

4 security fixes in this release, including:

> > +
    > > +
  • [401362] High CVE-2014-3178: Use-after-free in renderi= ng. Credit > > + to miaubiz.
  • > > +
  • [411014] CVE-2014-3179: Various fixes from internal au= dits, fuzzing > > + and other initiatives.
  • > > +
=20 > > +
> > + > > +
> > + > > + CVE-2014-3178 > > + CVE-2014-3179=20 > > + http://googlechromereleases.blogspot.nl > > + > > + > > + 2014-09-09 > > + 2014-09-10 > > + > > +
> > + > > > > trafficserver -- unspecified vulnerability > > > > > > [1] http://googlechromereleases.blogspot.nl >=20 --=20 Carlos Jacobo Puga Medina