git: dfcb6a2bd890 - main - security/vuxml: add www/*chromium < 127.0.6533.72
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 30 Jul 2024 11:22:38 UTC
The branch main has been updated by rnagy: URL: https://cgit.FreeBSD.org/ports/commit/?id=dfcb6a2bd8905663520ece3a3a5b614c9275bec6 commit dfcb6a2bd8905663520ece3a3a5b614c9275bec6 Author: Robert Nagy <rnagy@FreeBSD.org> AuthorDate: 2024-07-30 11:21:51 +0000 Commit: Robert Nagy <rnagy@FreeBSD.org> CommitDate: 2024-07-30 11:22:32 +0000 security/vuxml: add www/*chromium < 127.0.6533.72 Obtained from: https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html --- security/vuxml/vuln/2024.xml | 59 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 59 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 16e327cfeb9a..222f32f53f3a 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,62 @@ + <vuln vid="fb0b5574-4e64-11ef-8a0f-a8a1599412c6"> + <topic>chromium -- multiple security fixes</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>127.0.6533.72</lt></range> + </package> + <package> + <name>ungoogled-chromium</name> + <range><lt>127.0.6533.72</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Chrome Releases reports:</p> + <blockquote cite="https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html"> + <p>This update includes 22 security fixes:</p> + <ul> + <li>[349198731] High CVE-2024-6988: Use after free in Downloads. Reported by lime(@limeSec_) from TIANGONG Team of Legendsec at QI-ANXIN Group on 2024-06-25</li> + <li>[349342289] High CVE-2024-6989: Use after free in Loader. Reported by Anonymous on 2024-06-25</li> + <li>[346618785] High CVE-2024-6991: Use after free in Dawn. Reported by wgslfuzz on 2024-06-12</li> + <li>[339686368] Medium CVE-2024-6994: Heap buffer overflow in Layout. Reported by Huang Xilin of Ant Group Light-Year Security Lab on 2024-05-10</li> + <li>[343938078] Medium CVE-2024-6995: Inappropriate implementation in Fullscreen. Reported by Alesandro Ortiz on 2024-06-01</li> + <li>[333708039] Medium CVE-2024-6996: Race in Frames. Reported by Louis Jannett (Ruhr University Bochum) on 2024-04-10</li> + <li>[325293263] Medium CVE-2024-6997: Use after free in Tabs. Reported by Sven Dysthe (@svn-dys) on 2024-02-15</li> + <li>[340098902] Medium CVE-2024-6998: Use after free in User Education. Reported by Sven Dysthe (@svn-dys) on 2024-05-13</li> + <li>[340893685] Medium CVE-2024-6999: Inappropriate implementation in FedCM. Reported by Alesandro Ortiz on 2024-05-15</li> + <li>[339877158] Medium CVE-2024-7000: Use after free in CSS. Reported by Anonymous on 2024-05-11</li> + <li>[347509736] Medium CVE-2024-7001: Inappropriate implementation in HTML. Reported by Jake Archibald on 2024-06-17</li> + <li>[338233148] Low CVE-2024-7003: Inappropriate implementation in FedCM. Reported by Alesandro Ortiz on 2024-05-01</li> + <li>[40063014] Low CVE-2024-7004: Insufficient validation of untrusted input in Safe Browsing. Reported by Anonymous on 2023-02-10</li> + <li>[40068800] Low CVE-2024-7005: Insufficient validation of untrusted input in Safe Browsing. Reported by Umar Farooq on 2023-08-04</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-6988</cvename> + <cvename>CVE-2024-6989</cvename> + <cvename>CVE-2024-6991</cvename> + <cvename>CVE-2024-6994</cvename> + <cvename>CVE-2024-6995</cvename> + <cvename>CVE-2024-6996</cvename> + <cvename>CVE-2024-6997</cvename> + <cvename>CVE-2024-6998</cvename> + <cvename>CVE-2024-6999</cvename> + <cvename>CVE-2024-7000</cvename> + <cvename>CVE-2024-7001</cvename> + <cvename>CVE-2024-7003</cvename> + <cvename>CVE-2024-7004</cvename> + <cvename>CVE-2024-7005</cvename> + <url>https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html</url> + </references> + <dates> + <discovery>2024-07-23</discovery> + <entry>2024-07-30</entry> + </dates> + </vuln> + <vuln vid="8057d198-4d26-11ef-8e64-641c67a117d8"> <topic>znc -- remote code execution vulnerability</topic> <affects>