From nobody Tue Feb 15 15:35:06 2022 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 7B67F1949B47; Tue, 15 Feb 2022 15:35:07 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4JylXC0BRhz3lY2; Tue, 15 Feb 2022 15:35:06 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1644939307; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=kJHkTQkiQ7F/2W5AYivzHHgHkwTOqgyutCcRAeP7RMI=; b=EiLYmDQSYgvNrR7RJhAFtFRzCpgBvoRWa9EW5nyaXZGtPWeJi/27BtaQoYH7lzzQmeZKCc VITB7jDmOjktRztBEkQmX3cWOX9vUTmQ0vWl6ldXVRNEk9NzgqFFl6qq2RkrqDrJGefU/B 2ZgIF+OcwbjvmEIkYQTUN/PYvvyJ1FrUTmosY2Bl2SHVKUKLLi3PZjsbMLdgFin1RTCeIu gVNPNBhDNXYAm9MOxNwPPNmI3JLlWdedpm+FR+E1p9u9+3YIr1uiorOPpMaSKzkhwsX0m0 eukRa2aAOklPx1eRe3PT5Elz0ecFAdCYiPSS2eSzeiMod9tXpdQ/Yj1Xi7zH1g== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id BF39F24DC3; Tue, 15 Feb 2022 15:35:06 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 21FFZ6jd030512; Tue, 15 Feb 2022 15:35:06 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 21FFZ6hP030511; Tue, 15 Feb 2022 15:35:06 GMT (envelope-from git) Date: Tue, 15 Feb 2022 15:35:06 GMT Message-Id: <202202151535.21FFZ6hP030511@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Rene Ladan Subject: git: 8ddfa9e4aa33 - main - security/vuxml: add www/chromium < 98.0.4758.102 List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: rene X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 8ddfa9e4aa33f8c019c76f758df927e4acf9553d Auto-Submitted: auto-generated ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1644939307; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=kJHkTQkiQ7F/2W5AYivzHHgHkwTOqgyutCcRAeP7RMI=; b=O6N7pPer7EjeFPlO/igqOVwBYKXLQcibXlCfXkGlfL5Ov/8CKi5K9vqGW8cVhieKssSd2i QdYLAEAtsCTOyV1HJ1leE+ZecxVDaDWLzyXNSwvf3Oi4zmW9YpsaoLhSk3Nvc+I8/K8qJm xphc1MiAqqp9UDwS4I0IXImOBeRoF5pZItI63TUJcxMtPCd1+Wns3MD6vxSVTKMJEJ937y eigh082T6v0dGBeBfFkoTremADeSAjRqC9Br0C5sKoAkPPUQ5LhDXLfxJgsszPfN5iNgvu BPamNEMKSKPGi4EHo0lW47E2ClL5sH5Hrme/ypQwi+tE3w7IYODCliHCkJhzwQ== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1644939307; a=rsa-sha256; cv=none; b=QqWQSMY3lNmtQ2jb31OD5PuJzJmi0km3rMy7hjVDG+JyiOBcY9JdWbk2B1NZxxdA5C0W6I mk0TxVwjGGuRtlTcBd/bkRr1zxJ4UgdnhaQHGdrRHTbX2C7AsQ4+5D2nwtzVqfwmIfNzPM PIPhrKwZeloX630AuhTs3P3C/AytXtvjpCIooF3PYTHK9lvU0DRJjR0VFWgku4XZa6v23F QXekVyvk1IfPvl6MiYHN8/zAN4pDadMGRCHcYkiLkCRGXEPlMV//LVzSR2/dEO8H2OCxO8 QtCC4kuxhRjaW1l1IOj/ezr/HFkvShog0LCOQey/Nb6NKhUuftXiwbajKgIFjw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by rene: URL: https://cgit.FreeBSD.org/ports/commit/?id=8ddfa9e4aa33f8c019c76f758df927e4acf9553d commit 8ddfa9e4aa33f8c019c76f758df927e4acf9553d Author: Rene Ladan AuthorDate: 2022-02-15 15:34:05 +0000 Commit: Rene Ladan CommitDate: 2022-02-15 15:35:03 +0000 security/vuxml: add www/chromium < 98.0.4758.102 Obtained from: https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html --- security/vuxml/vuln-2022.xml | 53 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 53 insertions(+) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index e83f77790496..dbb32dd8738c 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -1,3 +1,56 @@ + + chromium -- multiple vulnerabilities + + + chromium + 98.0.4758.102 + + + + +

Chrome Releases reports:

+
+

This release contains 11 security fixes, including:

+
    +
  • [1290008] High CVE-2022-0603: Use after free in File Manager. + Reported by Chaoyuan Peng (@ret2happy) on 2022-01-22
  • +
  • [1273397] High CVE-2022-0604: Heap buffer overflow in Tab + Groups. Reported by Krace on 2021-11-24
  • +
  • [1286940] High CVE-2022-0605: Use after free in Webstore API. + Reported by Thomas Orlita on 2022-01-13
  • +
  • [1288020] High CVE-2022-0606: Use after free in ANGLE. Reported + by Cassidy Kim of Amber Security Lab, OPPO Mobile + Telecommunications Corp. Ltd. on 2022-01-17
  • +
  • [1250655] High CVE-2022-0607: Use after free in GPU. Reported by + 0x74960 on 2021-09-17
  • +
  • [1270333] High CVE-2022-0608: Integer overflow in Mojo. Reported + by Sergei Glazunov of Google Project Zero on 2021-11-16
  • +
  • [1296150] High CVE-2022-0609: Use after free in Animation. + Reported by Adam Weidemann and ClĂ©ment Lecigne of Google' + Threat Analysis Group on 2022-02-10
  • +
  • [1285449] Medium CVE-2022-0610: Inappropriate implementation in + Gamepad API. Reported by Anonymous on 2022-01-08
  • +
+
+ +
+ + CVE-2022-0603 + CVE-2022-0604 + CVE-2022-0605 + CVE-2022-0606 + CVE-2022-0607 + CVE-2022-0608 + CVE-2022-0609 + CVE-2022-0610 + https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html + + + 2022-02-14 + 2022-02-15 + +
+ py-twisted -- cookie and authorization headers are leaked when following cross-origin redirects