svn commit: r425023 - head/security/vuxml
Rene Ladan
rene at FreeBSD.org
Mon Oct 31 20:36:52 UTC 2016
Author: rene
Date: Mon Oct 31 20:36:50 2016
New Revision: 425023
URL: https://svnweb.freebsd.org/changeset/ports/425023
Log:
Document new vulnerabilities in www/chromium < 54.0.2840.59
Obtained from: https://googlechromereleases.blogspot.nl/2016/10/stable-channel-update-for-desktop.html
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Mon Oct 31 20:07:34 2016 (r425022)
+++ head/security/vuxml/vuln.xml Mon Oct 31 20:36:50 2016 (r425023)
@@ -58,6 +58,112 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="9118961b-9fa5-11e6-a265-3065ec8fd3ec">
+ <topic>chromium -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <name>chromium-npapi</name>
+ <name>chromium-pulse</name>
+ <range><lt>54.0.2840.59</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Google Chrome Releases reports:</p>
+ <blockquote cite="https://googlechromereleases.blogspot.nl/2016/10/stable-channel-update-for-desktop.html">
+ <p>21 security fixes in this release, including:</p>
+ <ul>
+ <li>[645211] High CVE-2016-5181: Universal XSS in Blink. Credit to
+ Anonymous</li>
+ <li>[638615] High CVE-2016-5182: Heap overflow in Blink. Credit to
+ Giwan Go of STEALIEN</li>
+ <li>[645122] High CVE-2016-5183: Use after free in PDFium. Credit
+ to Anonymous</li>
+ <li>[630654] High CVE-2016-5184: Use after free in PDFium. Credit
+ to Anonymous</li>
+ <li>[621360] High CVE-2016-5185: Use after free in Blink. Credit to
+ cloudfuzzer</li>
+ <li>[639702] High CVE-2016-5187: URL spoofing. Credit to Luan
+ Herrera</li>
+ <li>[565760] Medium CVE-2016-5188: UI spoofing. Credit to Luan
+ Herrera</li>
+ <li>[633885] Medium CVE-2016-5192: Cross-origin bypass in Blink.
+ Credit to haojunhou at gmail.com</li>
+ <li>[646278] Medium CVE-2016-5189: URL spoofing. Credit to xisigr
+ of Tencent's Xuanwu Lab</li>
+ <li>[644963] Medium CVE-2016-5186: Out of bounds read in DevTools.
+ Credit to Abdulrahman Alqabandi (@qab)</li>
+ <li>[639126] Medium CVE-2016-5191: Universal XSS in Bookmarks.
+ Credit to Gareth Hughes</li>
+ <li>[642067] Medium CVE-2016-5190: Use after free in Internals.
+ Credit to Atte Kettunen of OUSPG</li>
+ <li>[639658] Low CVE-2016-5193: Scheme bypass. Credit to Yuyang
+ ZHOU (martinzhou96)</li>
+ <li>[654782] CVE-2016-5194: Various fixes from internal audits,
+ fuzzing and other initiatives</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-5181</cvename>
+ <cvename>CVE-2016-5182</cvename>
+ <cvename>CVE-2016-5183</cvename>
+ <cvename>CVE-2016-5184</cvename>
+ <cvename>CVE-2016-5185</cvename>
+ <cvename>CVE-2016-5186</cvename>
+ <cvename>CVE-2016-5187</cvename>
+ <cvename>CVE-2016-5188</cvename>
+ <cvename>CVE-2016-5189</cvename>
+ <cvename>CVE-2016-5190</cvename>
+ <cvename>CVE-2016-5191</cvename>
+ <cvename>CVE-2016-5192</cvename>
+ <cvename>CVE-2016-5193</cvename>
+ <cvename>CVE-2016-5194</cvename>
+ <url>https://googlechromereleases.blogspot.nl/2016/10/stable-channel-update-for-desktop.html</url>
+ </references>
+ <dates>
+ <discovery>2016-10-12</discovery>
+ <entry>2016-10-31</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="9c135c7e-9fa4-11e6-a265-3065ec8fd3ec">
+ <topic>chromium -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <name>chromium-npapi</name>
+ <name>chromium-pulse</name>
+ <range><lt>53.0.2785.143</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Google Chrome Releases reports:</p>
+ <blockquote cite="https://googlechromereleases.blogspot.nl/2016/09/stable-channel-update-for-desktop_29.html">
+ <p>3 security fixes in this release, including:</p>
+ <ul>
+ <li>[642496] High CVE-2016-5177: Use after free in V8. Credit to
+ Anonymous</li>
+ <li>[651092] CVE-2016-5178: Various fixes from internal audits,
+fuzzing and other initiatives.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-5177</cvename>
+ <cvename>CVE-2016-5178</cvename>
+ <url>https://googlechromereleases.blogspot.nl/2016/09/stable-channel-update-for-desktop_29.html</url>
+ </references>
+ <dates>
+ <discovery>2016-09-29</discovery>
+ <entry>2016-10-31</entry>
+ </dates>
+ </vuln>
+
<vuln vid="6a2cfcdc-9dea-11e6-a298-14dae9d210b8">
<topic>openssh -- denial of service</topic>
<affects>
More information about the svn-ports-all
mailing list