From owner-svn-ports-all@FreeBSD.ORG Thu Mar 6 11:35:20 2014 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id A1B8876; Thu, 6 Mar 2014 11:35:20 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 82BF66C5; Thu, 6 Mar 2014 11:35:20 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s26BZKBV059816; Thu, 6 Mar 2014 11:35:20 GMT (envelope-from rene@svn.freebsd.org) Received: (from rene@localhost) by svn.freebsd.org (8.14.8/8.14.8/Submit) id s26BZKfT059814; Thu, 6 Mar 2014 11:35:20 GMT (envelope-from rene@svn.freebsd.org) Message-Id: <201403061135.s26BZKfT059814@svn.freebsd.org> From: Rene Ladan Date: Thu, 6 Mar 2014 11:35:20 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org Subject: svn commit: r347182 - branches/2014Q1/security/vuxml X-SVN-Group: ports-branches MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 06 Mar 2014 11:35:20 -0000 Author: rene Date: Thu Mar 6 11:35:19 2014 New Revision: 347182 URL: http://svnweb.freebsd.org/changeset/ports/347182 QAT: https://qat.redports.org/buildarchive/r347182/ Log: MFH: r347154 Document new vulnerabilities in www/chromium < 33.0.1750.146 Obtained from: http://googlechromereleases.blogspot.nl/ MFH: r347080 MFH: r347076 security/gnutls for CVE-2014-0092 and CVE-2014-1959 MFH: r346908 Add an entry for the file DOS vulnerability, CVE-2014-1943 Approved by: portmgr (bapt) Modified: branches/2014Q1/security/vuxml/vuln.xml Directory Properties: branches/2014Q1/ (props changed) Modified: branches/2014Q1/security/vuxml/vuln.xml ============================================================================== --- branches/2014Q1/security/vuxml/vuln.xml Thu Mar 6 11:22:02 2014 (r347181) +++ branches/2014Q1/security/vuxml/vuln.xml Thu Mar 6 11:35:19 2014 (r347182) @@ -51,6 +51,127 @@ Note: Please add new entries to the beg --> + + chromium -- multiple vulnerabilities + + + chromium + 33.0.1750.146 + + + + +

Google Chrome Releases reports:

+
+

19 vulnerabilities fixed in this release, including:

+
    +
  • [344492] High CVE-2013-6663: Use-after-free in svg images. + Credit to Atte Kettunen of OUSPG.
  • +
  • [326854] High CVE-2013-6664: Use-after-free in speech + recognition. Credit to Khalil Zhani.
  • +
  • [337882] High CVE-2013-6665: Heap buffer overflow in software + rendering. Credit to cloudfuzzer.
  • +
  • [332023] Medium CVE-2013-6666: Chrome allows requests in flash + header request. Credit to netfuzzerr.
  • +
  • [348175] CVE-2013-6667: Various fixes from internal audits, + fuzzing and other initiatives.
  • +
  • [343964, 344186, 347909] CVE-2013-6668: Multiple + vulnerabilities in V8 fixed in version 3.24.35.10.
  • +
+
+ +
+ + CVE-2013-6663 + CVE-2013-6664 + CVE-2013-6665 + CVE-2013-6666 + CVE-2013-6667 + CVE-2013-6668 + http://googlechromereleases.blogspot.nl/ + + + 2014-03-03 + 2014-03-05 + +
+ + + gnutls -- multiple certificate verification issues + + + gnutls + 2.12.23_4 + + + gnutls-devel + gnutls3 + 3.1.22 + 3.2.03.2.12 + + + + +

GnuTLS project reports:

+
+

A vulnerability was discovered that affects the + certificate verification functions of all gnutls + versions. A specially crafted certificate could + bypass certificate validation checks. The + vulnerability was discovered during an audit of + GnuTLS for Red Hat.

+
+
+

Suman Jana reported a vulnerability that affects + the certificate verification functions of + gnutls 2.11.5 and later versions. A version 1 + intermediate certificate will be considered as + a CA certificate by default (something that + deviates from the documented behavior).

+
+ +
+ + CVE-2014-0092 + CVE-2014-1959 + http://www.gnutls.org/security.html#GNUTLS-SA-2014-1 + http://www.gnutls.org/security.html#GNUTLS-SA-2014-2 + + + 2014-03-03 + 2014-03-04 + 2014-03-04 + +
+ + + file -- denial of service + + + file + 5.17 + + + + +

The Fine Free file project reports:

+
+

... file before 5.17 allows context-dependent attackers to + cause a denial of service (infinite recursion, CPU consumption, and + crash) via a crafted indirect offset value in the magic of a file.

+
+ +
+ + CVE-2014-1943 + http://mx.gw.com/pipermail/file/2014/001327.html + + + 2014-02-16 + 2014-03-03 + +
+ Python -- buffer overflow in socket.recvfrom_into()