svn commit: r425023 - head/security/vuxml

Rene Ladan rene at FreeBSD.org
Mon Oct 31 20:36:52 UTC 2016


Author: rene
Date: Mon Oct 31 20:36:50 2016
New Revision: 425023
URL: https://svnweb.freebsd.org/changeset/ports/425023

Log:
  Document new vulnerabilities in www/chromium < 54.0.2840.59
  
  Obtained from:	https://googlechromereleases.blogspot.nl/2016/10/stable-channel-update-for-desktop.html

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Mon Oct 31 20:07:34 2016	(r425022)
+++ head/security/vuxml/vuln.xml	Mon Oct 31 20:36:50 2016	(r425023)
@@ -58,6 +58,112 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="9118961b-9fa5-11e6-a265-3065ec8fd3ec">
+    <topic>chromium -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>chromium</name>
+	<name>chromium-npapi</name>
+	<name>chromium-pulse</name>
+	<range><lt>54.0.2840.59</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Google Chrome Releases reports:</p>
+	<blockquote cite="https://googlechromereleases.blogspot.nl/2016/10/stable-channel-update-for-desktop.html">
+	  <p>21 security fixes in this release, including:</p>
+	  <ul>
+	    <li>[645211] High CVE-2016-5181: Universal XSS in Blink. Credit to
+	      Anonymous</li>
+	    <li>[638615] High CVE-2016-5182: Heap overflow in Blink. Credit to
+	      Giwan Go of STEALIEN</li>
+	    <li>[645122] High CVE-2016-5183: Use after free in PDFium. Credit
+	      to Anonymous</li>
+	    <li>[630654] High CVE-2016-5184: Use after free in PDFium. Credit
+	      to Anonymous</li>
+	    <li>[621360] High CVE-2016-5185: Use after free in Blink. Credit to
+	      cloudfuzzer</li>
+	    <li>[639702] High CVE-2016-5187: URL spoofing. Credit to Luan
+	      Herrera</li>
+	    <li>[565760] Medium CVE-2016-5188: UI spoofing. Credit to Luan
+	      Herrera</li>
+	    <li>[633885] Medium CVE-2016-5192: Cross-origin bypass in Blink.
+	      Credit to haojunhou at gmail.com</li>
+	    <li>[646278] Medium CVE-2016-5189: URL spoofing. Credit to xisigr
+	      of Tencent's Xuanwu Lab</li>
+	    <li>[644963] Medium CVE-2016-5186: Out of bounds read in DevTools.
+	      Credit to Abdulrahman Alqabandi (@qab)</li>
+	    <li>[639126] Medium CVE-2016-5191: Universal XSS in Bookmarks.
+	      Credit to Gareth Hughes</li>
+	    <li>[642067] Medium CVE-2016-5190: Use after free in Internals.
+	      Credit to Atte Kettunen of OUSPG</li>
+	    <li>[639658] Low CVE-2016-5193: Scheme bypass. Credit to Yuyang
+	      ZHOU (martinzhou96)</li>
+	    <li>[654782] CVE-2016-5194: Various fixes from internal audits,
+	      fuzzing and other initiatives</li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-5181</cvename>
+      <cvename>CVE-2016-5182</cvename>
+      <cvename>CVE-2016-5183</cvename>
+      <cvename>CVE-2016-5184</cvename>
+      <cvename>CVE-2016-5185</cvename>
+      <cvename>CVE-2016-5186</cvename>
+      <cvename>CVE-2016-5187</cvename>
+      <cvename>CVE-2016-5188</cvename>
+      <cvename>CVE-2016-5189</cvename>
+      <cvename>CVE-2016-5190</cvename>
+      <cvename>CVE-2016-5191</cvename>
+      <cvename>CVE-2016-5192</cvename>
+      <cvename>CVE-2016-5193</cvename>
+      <cvename>CVE-2016-5194</cvename>
+      <url>https://googlechromereleases.blogspot.nl/2016/10/stable-channel-update-for-desktop.html</url>
+    </references>
+    <dates>
+      <discovery>2016-10-12</discovery>
+      <entry>2016-10-31</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="9c135c7e-9fa4-11e6-a265-3065ec8fd3ec">
+    <topic>chromium -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>chromium</name>
+	<name>chromium-npapi</name>
+	<name>chromium-pulse</name>
+	<range><lt>53.0.2785.143</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Google Chrome Releases reports:</p>
+	<blockquote cite="https://googlechromereleases.blogspot.nl/2016/09/stable-channel-update-for-desktop_29.html">
+	  <p>3 security fixes in this release, including:</p>
+	  <ul>
+	    <li>[642496] High CVE-2016-5177: Use after free in V8. Credit to
+	      Anonymous</li>
+	    <li>[651092] CVE-2016-5178: Various fixes from internal audits,
+fuzzing and other initiatives.</li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-5177</cvename>
+      <cvename>CVE-2016-5178</cvename>
+      <url>https://googlechromereleases.blogspot.nl/2016/09/stable-channel-update-for-desktop_29.html</url>
+    </references>
+    <dates>
+      <discovery>2016-09-29</discovery>
+      <entry>2016-10-31</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="6a2cfcdc-9dea-11e6-a298-14dae9d210b8">
     <topic>openssh -- denial of service</topic>
     <affects>


More information about the svn-ports-all mailing list