Date: Thu, 7 Jan 2021 15:09:22 +0000 (UTC) From: Rene Ladan <rene@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r560715 - head/security/vuxml Message-ID: <202101071509.107F9MZf014824@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: rene Date: Thu Jan 7 15:09:21 2021 New Revision: 560715 URL: https://svnweb.freebsd.org/changeset/ports/560715 Log: Document new vulnerabilities in www/chromium < 87.0.4280.141 Obtained from: https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Jan 7 14:41:03 2021 (r560714) +++ head/security/vuxml/vuln.xml Thu Jan 7 15:09:21 2021 (r560715) @@ -58,6 +58,81 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="d153c4d2-50f8-11eb-8046-3065ec8fd3ec"> + <topic>chromium -- multiple vulnerabilities</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>87.0.4280.141</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Chrome Releases reports:</p> + <blockquote cite="https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html"> + <p>This release includes 16 security fixes, including:</p> + <ul> + <li>[1148749] High CVE-2021-21106: Use after free in autofill. + Reported by Weipeng Jiang (@Krace) from Codesafe Team of + Legendsec at Qi'anxin Group on 2020-11-13</li> + <li>[1153595] High CVE-2021-21107: Use after free in drag and + drop. Reported by Leecraso and Guang Gong of 360 Alpha Lab on + 2020-11-30</li> + <li>[1155426] High CVE-2021-21108: Use after free in media. + Reported by Leecraso and Guang Gong of 360 Alpha Lab on + 2020-12-04</li> + <li>[1152334] High CVE-2021-21109: Use after free in payments. + Reported by Rong Jian and Guang Gong of 360 Alpha Lab on + 2020-11-24</li> + <li>[1152451] High CVE-2021-21110: Use after free in safe + browsing. Reported by Anonymous on 2020-11-24</li> + <li>[1149125] High CVE-2021-21111: Insufficient policy enforcement + in WebUI. Reported by Alesandro Ortiz on 2020-11-15</li> + <li>[1151298] High CVE-2021-21112: Use after free in Blink. + Reported by YoungJoo Lee(@ashuu_lee) of Raon Whitehat on + 2020-11-20</li> + <li>[1155178] High CVE-2021-21113: Heap buffer overflow in Skia. + Reported by tsubmunu on 2020-12-03</li> + <li>[1148309] High CVE-2020-16043: Insufficient data validation in + networking. Reported by Samy Kamkar, Ben Seri at Armis, Gregory + Vishnepolsky at Armis on 2020-11-12</li> + <li>[1150065] High CVE-2021-21114: Use after free in audio. + Reported by Man Yue Mo of GitHub Security Lab on 2020-11-17</li> + <li>[1157790] High CVE-2020-15995: Out of bounds write in V8. + Reported by Bohan Liu (@P4nda20371774) of Tencent Security Xuanwu + Lab on 2020-12-11</li> + <li>[1157814] High CVE-2021-21115: Use after free in safe browsing. + Reported by Leecraso and Guang Gong of 360 Alpha Lab on + 2020-12-11</li> + <li>[1151069] Medium CVE-2021-21116: Heap buffer overflow in audio. + Reported by Alison Huffman, Microsoft Browser Vulnerability + Research on 2020-11-19</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2020-15995</cvename> + <cvename>CVE-2020-16043</cvename> + <cvename>CVE-2021-21106</cvename> + <cvename>CVE-2021-21107</cvename> + <cvename>CVE-2021-21108</cvename> + <cvename>CVE-2021-21109</cvename> + <cvename>CVE-2021-21110</cvename> + <cvename>CVE-2021-21111</cvename> + <cvename>CVE-2021-21112</cvename> + <cvename>CVE-2021-21113</cvename> + <cvename>CVE-2021-21114</cvename> + <cvename>CVE-2021-21115</cvename> + <cvename>CVE-2021-21116</cvename> + <url>https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html</url> + </references> + <dates> + <discovery>2021-01-06</discovery> + <entry>2021-01-07</entry> + </dates> + </vuln> + <vuln vid="bd98066d-4ea4-11eb-b412-e86a64caca56"> <topic>mail/dovecot -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202101071509.107F9MZf014824>