From nobody Wed Feb 2 21:34:45 2022 X-Original-To: dev-commits-ports-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 3B2DC19B9ACC; Wed, 2 Feb 2022 21:34:46 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Jpw7B1Blnz4rCr; Wed, 2 Feb 2022 21:34:46 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1643837686; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=Zr+1VDUOMWNco6RMTjMVUqrPFXqf/8NzbJNJEtMghsQ=; b=PpuoDJ0kd8MNTZQhWBTOLOC2HYKyyJzZUYsUGgr2rzybxeUFKa6IqKmfIzSK6n9oMD2gEZ 2DodBPU8wz/jgJoKyHGh6lIcU9lbL7HzFOSLy3PN/ZskbbtoEvp0R2KqnVwigxqq7zK2k/ 5/Qs5KFi2foWYHuFJWRprCg4wNwsrby0i3ZWhnw5+nGoSuRHhK4jqaTc71x/1RYSSc139q 2nJsvChB+/cvjFdADPmz3yvesezQN6JDzggXDzaEVT5YClsQzQm/8YO3g3arQ76KipVwAP 8Z2z1dr/CAPGEQRlqOmI3a5F1E1wYwmZLTmlUB5Qiaa+dnaRe5TBFLjgzHkNKQ== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 0658F3C02; Wed, 2 Feb 2022 21:34:46 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 212LYj6d072920; Wed, 2 Feb 2022 21:34:45 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 212LYjgJ072919; Wed, 2 Feb 2022 21:34:45 GMT (envelope-from git) Date: Wed, 2 Feb 2022 21:34:45 GMT Message-Id: <202202022134.212LYjgJ072919@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Rene Ladan Subject: git: 023655accca4 - main - security/vuxml: add www/chromium < 98.0.4758.80 List-Id: Commit messages for all branches of the ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-all@freebsd.org X-BeenThere: dev-commits-ports-all@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: rene X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 023655accca46a34661e78baf1df903490616ea5 Auto-Submitted: auto-generated ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1643837686; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=Zr+1VDUOMWNco6RMTjMVUqrPFXqf/8NzbJNJEtMghsQ=; b=OOd+9OGZCwClIZ0kylkIlXDvYhMf6WcOlVtkX8nV0SGEtlqlFS7f9pzwylCYY5fCmMHw3e Q6Fj48o0pdWVi2+UQOBjWwzn0lhs04ARhC1Og+IU936iP75YOjHwaaBOtaz0sWpecc4svv X2G2YsfIz3UH+Qi9BymdpStBgopN/MX4Lwl1NcRdjMbgCTVI8B+XkEszy0j5NbTvrSxD3f xi9x21Lh1Su3kojI83/Mo0Sule2i15IH4C/5VDeDtbNYd1NjuwZPutj1UNLYd7tXFDzwqs 8nmRuz5Hi+8n6B3N1cHl4REYvXcRAC8z6rMoZbG0+R5txbGPRXwIFXhDIHVixw== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1643837686; a=rsa-sha256; cv=none; b=jdyv+vk8ylBAGN+Hi7qb3qx5Gp234pUlyUJSnZUTEHvSv79LVAVhik9/Isn9yUrcfFlrVA S0PI+PLoSyxGeoMNsIGuBdbKXzXXSUFbXvQkw0YUOIYcMijWa0iPwQes1x9KY0FdJONZuS 4RzjcPom4tt+3V3tv6eXWG6y1lccAMmShGzewHcDrVPeKCtx7KETWALJHwhDKyW9L+7324 3H7Q3yrK+1znCzdTM/+RHjz5CS7wVYBlkJhydSE8oBLuZRvm9Id4lsgSZzozPW0+DY8Tw8 PhHp/GB+2qeiPR64dHMUq3OW1ln8/cLlrrXcDRJnDjrBrxDa/Zp7sPl8TYxiow== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by rene: URL: https://cgit.FreeBSD.org/ports/commit/?id=023655accca46a34661e78baf1df903490616ea5 commit 023655accca46a34661e78baf1df903490616ea5 Author: Rene Ladan AuthorDate: 2022-02-02 21:33:47 +0000 Commit: Rene Ladan CommitDate: 2022-02-02 21:33:47 +0000 security/vuxml: add www/chromium < 98.0.4758.80 Obtained from: https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html --- security/vuxml/vuln-2022.xml | 87 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 87 insertions(+) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index 4f4068dff9f1..f619ea9e0a34 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -1,3 +1,90 @@ + + chromium -- multiple vulnerabilities + + + chromium + 98.0.4758.80 + + + + +

Chrome Releases reports:

+
+

This release contains 27 security fixes, including:

+
    +
  • [1284584] High CVE-2022-0452: Use after free in Safe Browsing. + Reported by avaue at S.S.L. on 2022-01-05
  • +
  • [1284916] High CVE-2022-0453: Use after free in Reader Mode. + Reported by Rong Jian of VRI on 2022-01-06
  • +
  • [1287962] High CVE-2022-0454: Heap buffer overflow in ANGLE. + Reported by Seong-Hwan Park (SeHwa) of SecunologyLab on + 2022-01-17
  • +
  • [1270593] High CVE-2022-0455: Inappropriate implementation in + Full Screen Mode. Reported by Irvan Kurniawan (sourc7) on + 2021-11-16
  • +
  • [1289523] High CVE-2022-0456: Use after free in Web Search. + Reported by Zhihua Yao of KunLun Lab on 2022-01-21
  • +
  • [1274445] High CVE-2022-0457: Type Confusion in V8. Reported by + rax of the Group0x58 on 2021-11-29
  • +
  • [1267060] High CVE-2022-0458: Use after free in Thumbnail Tab + Strip. Reported by Leecraso and Guang Gong of 360 Alpha Lab on + 2021-11-05
  • +
  • [1244205] High CVE-2022-0459: Use after free in Screen Capture. + Reported by raven (@raid_akame) on 2021-08-28
  • +
  • [1250227] Medium CVE-2022-0460: Use after free in Window Dialog. + Reported by 0x74960 on 2021-09-16
  • +
  • [1256823] Medium CVE-2022-0461: Policy bypass in COOP. Reported + by NDevTK on 2021-10-05
  • +
  • [1270470] Medium CVE-2022-0462: Inappropriate implementation in + Scroll. Reported by Youssef Sammouda on 2021-11-16
  • +
  • [1268240] Medium CVE-2022-0463: Use after free in Accessibility. + Reported by Zhihua Yao of KunLun Lab on 2021-11-09
  • +
  • [1270095] Medium CVE-2022-0464: Use after free in Accessibility. + Reported by Zhihua Yao of KunLun Lab on 2021-11-14
  • +
  • [1281941] Medium CVE-2022-0465: Use after free in Extensions. + Reported by Samet Bekmezci @sametbekmezci on 2021-12-22
  • +
  • [1115460] Medium CVE-2022-0466: Inappropriate implementation in + Extensions Platform. Reported by David Erceg on 2020-08-12
  • +
  • [1239496] Medium CVE-2022-0467: Inappropriate implementation in + Pointer Lock. Reported by Alesandro Ortiz on 2021-08-13
  • +
  • [1252716] Medium CVE-2022-0468: Use after free in Payments. + Reported by Krace on 2021-09-24
  • +
  • [1279531] Medium CVE-2022-0469: Use after free in Cast. Reported + by Thomas Orlita on 2021-12-14
  • +
  • [1269225] Low CVE-2022-0470: Out of bounds memory access in V8. + Reported by Looben Yang on 2021-11-11
  • +
+
+ +
+ + CVE-2022-0452 + CVE-2022-0453 + CVE-2022-0454 + CVE-2022-0455 + CVE-2022-0456 + CVE-2022-0457 + CVE-2022-0458 + CVE-2022-0459 + CVE-2022-0460 + CVE-2022-0461 + CVE-2022-0462 + CVE-2022-0463 + CVE-2022-0464 + CVE-2022-0465 + CVE-2022-0466 + CVE-2022-0467 + CVE-2022-0468 + CVE-2022-0469 + CVE-2022-0470 + https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html + + + 2022-02-01 + 2022-02-02 + +
+ h2o -- uninitialised memory access in HTTP3