From nobody Thu Jan 20 16:42:54 2022 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 30103195A06E; Thu, 20 Jan 2022 16:42:55 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4JfpGR0HCGz3DsG; Thu, 20 Jan 2022 16:42:55 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1642696975; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=0ZR0Ia4ZRVHOKBDpfS8uvBKWNyeIuDYEtn2RHmIXXi8=; b=eKaMhqMdYwtuDy0TmafSeR2MpPRy6nJTkNNwjBGQuV/Weceg6Fdq1JIXbBGE1g1sY9F1W8 A4/4BUZyFkEngZZx2AnD9nyqKziIwpSN0i1bdxbZBRyuznB+Byp0xHWJoUYKWCWRHcmbWt BU2u6iyh5cxj+lYYMcqFt4pHxeRgA10xwMlVab0PD7FG5pPuV3JB3exA0JUfwPlqlZs/cX W0o2zlY0Kp8EpOqXIfLCyPYfnnbjpLAPD3nDXOBDbgjIUGVtiraz80CScS6Vn+vlAjFk74 AmbH1iH0YG9j47dV4vH/BIdxUFNdN2KkxVG/94ppE6SIzyRONYtNFS2/cx+q3Q== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id D565F3BC0; Thu, 20 Jan 2022 16:42:54 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 20KGgssR025436; Thu, 20 Jan 2022 16:42:54 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 20KGgsG5025435; Thu, 20 Jan 2022 16:42:54 GMT (envelope-from git) Date: Thu, 20 Jan 2022 16:42:54 GMT Message-Id: <202201201642.20KGgsG5025435@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Rene Ladan Subject: git: 094a9b9a0251 - main - security/vuxml: document www/chromium < 97.0.4692.99 List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: rene X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 094a9b9a0251d346982da02130dae074417c5af2 Auto-Submitted: auto-generated ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1642696975; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=0ZR0Ia4ZRVHOKBDpfS8uvBKWNyeIuDYEtn2RHmIXXi8=; b=M30dTFbTfUB5oqHU+WizShHJFIjO+G31hop73o79MKmijgseTHbdiLG3cpES+F6/8uXezP LyDZe7drU58q0T1K9P1S9P/90eUNAH5Aj8csRvuH1No5pz5MpMQhovqCJdsaDrm7Dd4nwb +0vLMKGFDGN6vvHLdfZSlqVBq+HzzTJ1XB7fJBKJTIT8DYop37lV74KgnZBjBqn2lacaGd K15OBtcRr1T6+9Ua0uWvSfDwurKoihmwfyhrc1RRJRcFGjuXkMgUpImQUnN4DuPl75dwiw JKgNjaPxo99eTfE5vZDuUiq24Wub5yhbV5zO3jnVktncKSootjOupXOrm5Z+cA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1642696975; a=rsa-sha256; cv=none; b=Y50NuU0aumHQqcILNrzwnm8/GNchwSVxSz4/Zo8sKfAqLE+aJPnCgiuYx1dTKzRK6wfuxE sM8C5+myMjPLI5XZJOkLjh6hSzr7kBHVWlYnNdhfDislEDWEYlvnjq0RhC37utF7/gkR+j ktqxsajRQh1PYiSUz+2GuCuEL4ZTKbVwv+oUcIYGLAYNJfgJjrarN8HXzzBUUfn5QaYQ2t d0DH46/65O0We0s8Fpw6nbNAtNd5mHhiI72klTxKXdqdDbh7VblZyCJeuQzAJcqAMH2URR jqlgi0yI4lpVTsqt2y/ta+UOvr2wKeICw2tHIfmT+4wjWiaW1RbOhoxX3mavpQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by rene: URL: https://cgit.FreeBSD.org/ports/commit/?id=094a9b9a0251d346982da02130dae074417c5af2 commit 094a9b9a0251d346982da02130dae074417c5af2 Author: Rene Ladan AuthorDate: 2022-01-20 16:42:12 +0000 Commit: Rene Ladan CommitDate: 2022-01-20 16:42:12 +0000 security/vuxml: document www/chromium < 97.0.4692.99 Obtained from: https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop_19.html --- security/vuxml/vuln-2022.xml | 108 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 108 insertions(+) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index 37a17855b547..d23832312048 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -1,3 +1,111 @@ + + chromium -- multiple vulnerabilities + + + chromium + 97.0.4692.99 + + + + +

Chrome Releases reports:

+
+

This release contains 26 security fixes, including:

+
    +
  • [1284367] Critical CVE-2022-0289: Use after free in Safe + browsing. Reported by Sergei Glazunov of Google Project Zero on + 2022-01-05
  • +
  • [1260134][1260007] High CVE-2022-0290: Use after free in Site + isolation. Reported by Brendon Tiszka and Sergei Glazunov of + Google Project Zero on 2021-10-15
  • +
  • [1281084] High CVE-2022-0291: Inappropriate implementation in + Storage. Reported by Anonymous on 2021-12-19
  • +
  • [1270358] High CVE-2022-0292: Inappropriate implementation in + Fenced Frames. Reported by Brendon Tiszka on 2021-11-16
  • +
  • [1283371] High CVE-2022-0293: Use after free in Web packaging. + Reported by Rong Jian and Guang Gong of 360 Alpha Lab on + 2021-12-30
  • +
  • [1273017] High CVE-2022-0294: Inappropriate implementation in + Push messaging. Reported by Rong Jian and Guang Gong of 360 Alpha + Lab on 2021-11-23
  • +
  • [1278180] High CVE-2022-0295: Use after free in Omnibox. + Reported by Weipeng Jiang (@Krace) and Guang Gong of 360 + Vulnerability Research Institute on 2021-12-09
  • +
  • [1283375] High CVE-2022-0296: Use after free in Printing. + Reported by koocola(@alo_cook) and Guang Gong of 360 Vulnerability + Research Institute on 2021-12-30
  • +
  • [1274316] High CVE-2022-0297: Use after free in Vulkan. Reported + by Cassidy Kim of Amber Security Lab, OPPO Mobile + Telecommunications Corp. Ltd. on 2021-11-28
  • +
  • [1212957] High CVE-2022-0298: Use after free in Scheduling. + Reported by Yangkang (@dnpushme) of 360 ATA on 2021-05-25
  • +
  • [1275438] High CVE-2022-0300: Use after free in Text Input + Method Editor. Reported by Rong Jian and Guang Gong of 360 Alpha + Lab on 2021-12-01
  • +
  • [1276331] High CVE-2022-0301: Heap buffer overflow in DevTools. + Reported by Abdulrahman Alqabandi, Microsoft Browser Vulnerability + Research on 2021-12-03
  • +
  • [1278613] High CVE-2022-0302: Use after free in Omnibox. + Reported by Weipeng Jiang (@Krace) and Guang Gong of 360 + Vulnerability Research Institute on 2021-12-10
  • +
  • [1281979] High CVE-2022-0303: Race in GPU Watchdog. Reported by + Yigit Can YILMAZ (@yilmazcanyigit) on 2021-12-22
  • +
  • [1282118] High CVE-2022-0304: Use after free in Bookmarks. + Reported by Rong Jian and Guang Gong of 360 Alpha Lab on + 2021-12-22
  • +
  • [1282354] High CVE-2022-0305: Inappropriate implementation in + Service Worker API. Reported by @uwu7586 on 2021-12-23
  • +
  • [1283198] High CVE-2022-0306: Heap buffer overflow in PDFium. + Reported by Sergei Glazunov of Google Project Zero on + 2021-12-29
  • +
  • [1281881] Medium CVE-2022-0307: Use after free in Optimization + Guide. Reported by Samet Bekmezci @sametbekmezci on + 2021-12-21
  • +
  • [1282480] Medium CVE-2022-0308: Use after free in Data Transfer. + Reported by @ginggilBesel on 2021-12-24
  • +
  • [1240472] Medium CVE-2022-0309: Inappropriate implementation in + Autofill. Reported by Alesandro Ortiz on 2021-08-17
  • +
  • [1283805] Medium CVE-2022-0310: Heap buffer overflow in Task + Manager. Reported by Samet Bekmezci @sametbekmezci on + 2022-01-03
  • +
  • [1283807] Medium CVE-2022-0311: Heap buffer overflow in Task + Manager. Reported by Samet Bekmezci @sametbekmezci on + 2022-01-03
  • +
+
+ +
+ + CVE-2022-0289 + CVE-2022-0290 + CVE-2022-0291 + CVE-2022-0292 + CVE-2022-0293 + CVE-2022-0294 + CVE-2022-0295 + CVE-2022-0296 + CVE-2022-0297 + CVE-2022-0298 + CVE-2022-0300 + CVE-2022-0301 + CVE-2022-0302 + CVE-2022-0303 + CVE-2022-0304 + CVE-2022-0305 + CVE-2022-0306 + CVE-2022-0307 + CVE-2022-0308 + CVE-2022-0309 + CVE-2022-0310 + CVE-2022-0311 + https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop_19.html + + + 2022-01-19 + 2022-01-20 + +
+ MySQL -- Multiple vulnerabilities