aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorrene <rene@FreeBSD.org>2012-03-22 18:57:29 +0800
committerrene <rene@FreeBSD.org>2012-03-22 18:57:29 +0800
commit8f51435fca22f7ce86c06f8a9a48efebdcf1a432 (patch)
tree9e145525d64c74cd32ad8d5ced993a1e72f1288e /security
parent7a89f4fb2f73cde59346e05a179b17c8023d77d4 (diff)
downloadfreebsd-ports-gnome-8f51435fca22f7ce86c06f8a9a48efebdcf1a432.tar.gz
freebsd-ports-gnome-8f51435fca22f7ce86c06f8a9a48efebdcf1a432.tar.zst
freebsd-ports-gnome-8f51435fca22f7ce86c06f8a9a48efebdcf1a432.zip
Document vulnerabilities for www/chromium < 17.0.963.83
Obtained from: http://googlechromereleases.blogspot.com/search/label/Stable%20updates Security: CVE-2011-[3045,3049-3057] Feature safe: yes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml56
1 files changed, 56 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 18a71c462daf..843f1b7c2669 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -52,6 +52,62 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="330106da-7406-11e1-a1d7-00262d5ed8ee">
+ <topic>chromium -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <range><lt>17.0.963.83</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Google Chrome Releases reports:</p>
+ <blockquote
+cite="http://googlechromereleases.blogspot.com/search/label/Stable%20updates">
+ <p>[113902] High CVE-2011-3050: Use-after-free with first-letter
+ handling. Credit to miaubiz.</p>
+ <p>[116162] High CVE-2011-3045: libpng integer issue from upstream.
+ Credit to Glenn Randers-Pehrson of the libpng project.</p>
+ <p>[116461] High CVE-2011-3051: Use-after-free in CSS cross-fade
+ handling. Credit to Arthur Gerkis.</p>
+ <p>[116637] High CVE-2011-3052: Memory corruption in WebGL canvas
+ handling. Credit to Ben Vanik of Google.</p>
+ <p>[116746] High CVE-2011-3053: Use-after-free in block splitting.
+ Credit to miaubiz.</p>
+ <p>[117418] Low CVE-2011-3054: Apply additional isolations to webui
+ privileges. Credit to Sergey Glazunov.</p>
+ <p>[117736] Low CVE-2011-3055: Prompt in the browser native UI for
+ unpacked extension installation. Credit to PinkiePie.</p>
+ <p>[117550] High CVE-2011-3056: Cross-origin violation with "magic
+ iframe". Credit to Sergey Glazunov.</p>
+ <p>[117794] Medium CVE-2011-3057: Invalid read in v8. Credit to
+ Christian Holler.</p>
+ <p>[108648] Low CVE-2011-3049: Extension web request API can interfere
+ with system requests. Credit to Michael Gundlach. Fixed in an
+ earlier release.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2011-3045</cvename>
+ <cvename>CVE-2011-3049</cvename>
+ <cvename>CVE-2011-3050</cvename>
+ <cvename>CVE-2011-3051</cvename>
+ <cvename>CVE-2011-3052</cvename>
+ <cvename>CVE-2011-3053</cvename>
+ <cvename>CVE-2011-3054</cvename>
+ <cvename>CVE-2011-3055</cvename>
+ <cvename>CVE-2011-3056</cvename>
+ <cvename>CVE-2011-3057</cvename>
+ <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url>
+ </references>
+ <dates>
+ <discovery>2012-03-21</discovery>
+ <entry>2012-03-22</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2e7e9072-73a0-11e1-a883-001cc0a36e12">
<topic>libtasn1 -- ASN.1 length decoding vulnerability</topic>
<affects>