git: 3e70f65ff74f - main - security/vuxml: add www/*chromium < 125.0.6422.141
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Mon, 03 Jun 2024 12:32:16 UTC
The branch main has been updated by rnagy: URL: https://cgit.FreeBSD.org/ports/commit/?id=3e70f65ff74fec100971d0243dde52c5ebe12d3d commit 3e70f65ff74fec100971d0243dde52c5ebe12d3d Author: Robert Nagy <rnagy@FreeBSD.org> AuthorDate: 2024-06-03 12:31:31 +0000 Commit: Robert Nagy <rnagy@FreeBSD.org> CommitDate: 2024-06-03 12:32:09 +0000 security/vuxml: add www/*chromium < 125.0.6422.141 Obtained from: https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html --- security/vuxml/vuln/2024.xml | 45 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 03eadfe8f1f0..b1ef1325f5b3 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,48 @@ + <vuln vid="b058380e-21a4-11ef-8a0f-a8a1599412c6"> + <topic>chromium -- multiple security fixes</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>125.0.6422.141</lt></range> + </package> + <package> + <name>ungoogled-chromium</name> + <range><lt>125.0.6422.141</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Chrome Releases reports:</p> + <blockquote cite="https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html"> + <p>This update includes 11 security fixes:</p> + <ul> + <li>[339877165] High CVE-2024-5493: Heap buffer overflow in WebRTC. Reported by Cassidy Kim(@cassidy6564) on 2024-05-11</li> + <li>[338071106] High CVE-2024-5494: Use after free in Dawn. Reported by wgslfuzz on 2024-05-01</li> + <li>[338103465] High CVE-2024-5495: Use after free in Dawn. Reported by wgslfuzz on 2024-05-01</li> + <li>[338929744] High CVE-2024-5496: Use after free in Media Session. Reported by Cassidy Kim(@cassidy6564) on 2024-05-06</li> + <li>[339061099] High CVE-2024-5497: Out of bounds memory access in Keyboard Inputs. Reported by zh1x1an1221 of Ant Group Tianqiong Security Lab on 2024-05-07</li> + <li>[339588211] High CVE-2024-5498: Use after free in Presentation API. Reported by anymous on 2024-05-09</li> + <li>[339877167] High CVE-2024-5499: Out of bounds write in Streams API. Reported by anonymous on 2024-05-11</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-5493</cvename> + <cvename>CVE-2024-5494</cvename> + <cvename>CVE-2024-5495</cvename> + <cvename>CVE-2024-5496</cvename> + <cvename>CVE-2024-5497</cvename> + <cvename>CVE-2024-5498</cvename> + <cvename>CVE-2024-5499</cvename> + <url>https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html</url> + </references> + <dates> + <discovery>2024-05-30</discovery> + <entry>2024-06-03</entry> + </dates> + </vuln> + <vuln vid="320a19f7-1ddd-11ef-a2ae-8c164567ca3c"> <topic>nginx-devel -- Multiple Vulnerabilities in HTTP/3</topic> <affects>