diff options
author | cpm <cpm@FreeBSD.org> | 2017-10-28 17:59:31 +0800 |
---|---|---|
committer | Koop Mast <kwm@rainbow-runner.nl> | 2018-02-04 05:50:06 +0800 |
commit | a6eda4f3caaa55d56c4cef266b3b20cca1c9d48f (patch) | |
tree | 8b5a968df2475021ffef184fa89e5ca83ed27ae9 | |
parent | daa1ecdad5790d8fcd40103639ffb58ea24c420d (diff) | |
download | freebsd-ports-gnome-a6eda4f3caaa55d56c4cef266b3b20cca1c9d48f.tar.gz freebsd-ports-gnome-a6eda4f3caaa55d56c4cef266b3b20cca1c9d48f.tar.zst freebsd-ports-gnome-a6eda4f3caaa55d56c4cef266b3b20cca1c9d48f.zip |
Document new vulnerability in www/chromium < 62.0.3202.75
Obtained from: https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop_26.html
Security: CVE-2017-15396
-rw-r--r-- | security/vuxml/vuln.xml | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 34ca68e76e8a..a6f04492992d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,36 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3cd46257-bbc5-11e7-a3bc-e8e0b747a45a"> + <topic>chromium -- Stack overflow in V8</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>62.0.3202.75</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Google Chrome Releases reports:</p> + <blockquote cite="https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop_26.html"> + <p>1 security fix in this release, including:</p> + <ul> + <li>[770452] High CVE-2017-15396: Stack overflow in V8. Reported by + Yuan Deng of Ant-financial Light-Year Security Lab on 2017-09-30</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2017-15396</cvename> + <url>https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop_26.html</url> + </references> + <dates> + <discovery>2017-10-26</discovery> + <entry>2017-10-28</entry> + </dates> + </vuln> + <vuln vid="d77ceb8c-bb13-11e7-8357-3065ec6f3643"> <topic>wget -- Heap overflow in HTTP protocol handling</topic> <affects> |