Date: Tue, 21 Sep 2021 20:17:55 GMT From: Rene Ladan <rene@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 8170e64e0eb5 - main - security/vuxml: add chromium < 94.0.4606.54 Message-ID: <202109212017.18LKHtOC060565@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by rene: URL: https://cgit.FreeBSD.org/ports/commit/?id=8170e64e0eb549bdfe91ef605e3a4e6d022e3e7e commit 8170e64e0eb549bdfe91ef605e3a4e6d022e3e7e Author: Rene Ladan <rene@FreeBSD.org> AuthorDate: 2021-09-21 20:16:57 +0000 Commit: Rene Ladan <rene@FreeBSD.org> CommitDate: 2021-09-21 20:17:35 +0000 security/vuxml: add chromium < 94.0.4606.54 Obtained from: https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html --- security/vuxml/vuln-2021.xml | 88 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 88 insertions(+) diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml index 2baf51425253..78428bf81fae 100644 --- a/security/vuxml/vuln-2021.xml +++ b/security/vuxml/vuln-2021.xml @@ -1,3 +1,91 @@ + <vuln vid="3551e106-1b17-11ec-a8a7-704d7b472482"> + <topic>chromium -- multiple vulnerabilities</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>94.0.4606.54</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Chrome Releases reports:</p> + <blockquote cite="https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html"> + <p>This update contains 19 security fixes, including:</p> + <ul> + <li>[1243117] High CVE-2021-37956: Use after free in Offline use. + Reported by Huyna at Viettel Cyber Security on 2021-08-24</li> + <li>[1242269] High CVE-2021-37957: Use after free in WebGPU. + Reported by Looben Yang on 2021-08-23</li> + <li>[1223290] High CVE-2021-37958: Inappropriate implementation in + Navigation. Reported by James Lee (@Windowsrcer) on + 2021-06-24</li> + <li>[1229625] High CVE-2021-37959: Use after free in Task Manager. + Reported by raven (@raid_akame) on 2021-07-15</li> + <li>[1247196] High CVE-2021-37960: Inappropriate implementation in + Blink graphics. Reported by Atte Kettunen of OUSPG on + 2021-09-07</li> + <li>[1228557] Medium CVE-2021-37961: Use after free in Tab Strip. + Reported by Khalil Zhani on 2021-07-13</li> + <li>[1231933] Medium CVE-2021-37962: Use after free in Performance + Manager. Reported by Sri on 2021-07-22</li> + <li>[1199865] Medium CVE-2021-37963: Side-channel information + leakage in DevTools. Reported by Daniel Genkin and Ayush Agarwal, + University of Michigan, Eyal Ronen and Shaked Yehezkel, Tel Aviv + University, Sioli O'Connell, University of Adelaide, and Jason + Kim, Georgia Institute of Technology on 2021-04-16</li> + <li>[1203612] Medium CVE-2021-37964: Inappropriate implementation in + ChromeOS Networking. Reported by Hugo Hue and Sze Yiu Chau of the + Chinese University of Hong Kong on 2021-04-28</li> + <li>[1239709] Medium CVE-2021-37965: Inappropriate implementation in + Background Fetch API. Reported by Maurice Dauer on 2021-08-13</li> + <li>[1238944] Medium CVE-2021-37966: Inappropriate implementation in + Compositing. Reported by Mohit Raj (shadow2639) on 2021-08-11</li> + <li>[1243622] Medium CVE-2021-37967: Inappropriate implementation in + Background Fetch API. Reported by SorryMybad (@S0rryMybad) of + Kunlun Lab on 2021-08-26</li> + <li>[1245053] Medium CVE-2021-37968: Inappropriate implementation in + Background Fetch API. Reported by Maurice Dauer on 2021-08-30</li> + <li>[1245879] Medium CVE-2021-37969: Inappropriate implementation in + Google Updater. Reported by Abdelhamid Naceri (halov) on + 2021-09-02</li> + <li>[1248030] Medium CVE-2021-37970: Use after free in File System + API. Reported by SorryMybad (@S0rryMybad) of Kunlun Lab on + 2021-09-09</li> + <li>[1219354] Low CVE-2021-37971: Incorrect security UI in Web + Browser UI. Reported by Rayyan Bijoora on 2021-06-13</li> + <li>[1234259] Low CVE-2021-37972: Out of bounds read in + libjpeg-turbo. Reported by Xu Hanyu and Lu Yutao from + Panguite-Forensics-Lab of Qianxin on 2021-07-29</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2021-37956</cvename> + <cvename>CVE-2021-37957</cvename> + <cvename>CVE-2021-37958</cvename> + <cvename>CVE-2021-37959</cvename> + <cvename>CVE-2021-37960</cvename> + <cvename>CVE-2021-37961</cvename> + <cvename>CVE-2021-37962</cvename> + <cvename>CVE-2021-37963</cvename> + <cvename>CVE-2021-37964</cvename> + <cvename>CVE-2021-37965</cvename> + <cvename>CVE-2021-37966</cvename> + <cvename>CVE-2021-37967</cvename> + <cvename>CVE-2021-37968</cvename> + <cvename>CVE-2021-37969</cvename> + <cvename>CVE-2021-37970</cvename> + <cvename>CVE-2021-37971</cvename> + <cvename>CVE-2021-37972</cvename> + <url>https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html</url> + </references> + <dates> + <discovery>2021-09-21</discovery> + <entry>2021-09-21</entry> + </dates> + </vuln> + <vuln vid="57b1ee25-1a7c-11ec-9376-0800272221cc"> <topic>libssh -- possible heap-buffer overflow vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202109212017.18LKHtOC060565>