git: e132bf708a11 - main - security/vuxml: add www/*chromium < 110.0.5481.177
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 23 Feb 2023 06:17:35 UTC
The branch main has been updated by rnagy: URL: https://cgit.FreeBSD.org/ports/commit/?id=e132bf708a112e487bc690b6d221d1e6a14a530b commit e132bf708a112e487bc690b6d221d1e6a14a530b Author: Robert Nagy <rnagy@FreeBSD.org> AuthorDate: 2023-02-22 19:41:46 +0000 Commit: Robert Nagy <rnagy@FreeBSD.org> CommitDate: 2023-02-23 06:17:11 +0000 security/vuxml: add www/*chromium < 110.0.5481.177 Approved by: rene (mentor) Obtained from: https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html --- security/vuxml/vuln/2023.xml | 47 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 84b6afb7bb69..2ba2c6e0ac95 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,50 @@ + <vuln vid="4d6b5ea9-bc64-4e77-a7ee-d62ba68a80dd"> + <topic>chromium -- multiple vulnerabilities</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>110.0.5481.177</lt></range> + </package> + <package> + <name>ungoogled-chromium</name> + <range><lt>110.0.5481.177</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Chrome Releases reports:</p> + <blockquote cite="https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html"> + <p>This update includes 10 security fixes:</p> + <ul> + <li>[1415366] Critical CVE-2023-0941: Use after free in Prompts. Reported by Anonymous on 2023-02-13</li> + <li>[1414738] High CVE-2023-0927: Use after free in Web Payments API. Reported by Rong Jian of VRI on 2023-02-10</li> + <li>[1309035] High CVE-2023-0928: Use after free in SwiftShader. Reported by Anonymous on 2022-03-22</li> + <li>[1399742] High CVE-2023-0929: Use after free in Vulkan. Reported by Cassidy Kim(@cassidy6564) on 2022-12-09</li> + <li>[1410766] High CVE-2023-0930: Heap buffer overflow in Video. Reported by Cassidy Kim(@cassidy6564) on 2023-01-27</li> + <li>[1407701] High CVE-2023-0931: Use after free in Video. Reported by Cassidy Kim(@cassidy6564) on 2023-01-17</li> + <li>[1413005] High CVE-2023-0932: Use after free in WebRTC. Reported by Omri Bushari (Talon Cyber Security) on 2023-02-05</li> + <li>[1404864] Medium CVE-2023-0933: Integer overflow in PDF. Reported by Zhiyi Zhang from Codesafe Team of Legendsec at QI-ANXIN</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2023-0941</cvename> + <cvename>CVE-2023-0927</cvename> + <cvename>CVE-2023-0928</cvename> + <cvename>CVE-2023-0929</cvename> + <cvename>CVE-2023-0930</cvename> + <cvename>CVE-2023-0931</cvename> + <cvename>CVE-2023-0932</cvename> + <cvename>CVE-2023-0933</cvename> + <url>https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html</url> + </references> + <dates> + <discovery>2023-02-22</discovery> + <entry>2023-02-22</entry> + </dates> + </vuln> + <vuln vid="7a425536-74f7-4ce4-9768-0079a9d44d11"> <topic>zeek -- potential DoS vulnerabilities</topic> <affects>