diff options
author | cpm <cpm@FreeBSD.org> | 2017-09-06 20:01:29 +0800 |
---|---|---|
committer | cpm <cpm@FreeBSD.org> | 2017-09-06 20:01:29 +0800 |
commit | b35ce2ecf9db53ce171421769b42f02f651e261a (patch) | |
tree | fd436ebf463df1862c7a82b0172b918b550f1c6c /security | |
parent | 2fd585864cdf0933e5901d215e3ee6a0e3e9e22f (diff) | |
download | freebsd-ports-gnome-b35ce2ecf9db53ce171421769b42f02f651e261a.tar.gz freebsd-ports-gnome-b35ce2ecf9db53ce171421769b42f02f651e261a.tar.zst freebsd-ports-gnome-b35ce2ecf9db53ce171421769b42f02f651e261a.zip |
Document new vulnerabilities in www/chromium < 61.0.3163.79
Obtained from: https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 58 |
1 files changed, 58 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 2a6282cffd29..01ba29681be4 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,64 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="e1100e63-92f7-11e7-bd95-e8e0b747a45a"> + <topic>chromium -- multiple vulnerabilities</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>61.0.3163.79</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Google Chrome releases reports:</p> + <blockquote cite="https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html"> + <p>22 security fixes in this release, including:</p> + <ul> + <li>[737023] High CVE-2017-5111: Use after free in PDFium. Reported by + Luat Nguyen on KeenLab, Tencent on 2017-06-27</li> + <li>[740603] High CVE-2017-5112: Heap buffer overflow in WebGL. Reported by + Tobias Klein on 2017-07-10</li> + <li>[747043] High CVE-2017-5113: Heap buffer overflow in Skia. Reported by + Anonymous on 2017-07-20</li> + <li>[752829] High CVE-2017-5114: Memory lifecycle issue in PDFium. Reported by + Ke Liu of Tencent's Xuanwu LAB on 2017-08-07</li> + <li>[744584] High CVE-2017-5115: Type confusion in V8. Reported by + Marco Giovannini on 2017-07-17</li> + <li>[759624] High CVE-2017-5116: Type confusion in V8. Reported by + Anonymous on 2017-08-28</li> + <li>[739190] Medium CVE-2017-5117: Use of uninitialized value in Skia. Reported by + Tobias Klein on 2017-07-04</li> + <li>[747847] Medium CVE-2017-5118: Bypass of Content Security Policy in Blink. Reported by + WenXu Wu of Tencent's Xuanwu Lab on 2017-07-24</li> + <li>[725127] Medium CVE-2017-5119: Use of uninitialized value in Skia. Reported by + Anonymous on 2017-05-22</li> + <li>[718676] Low CVE-2017-5120: Potential HTTPS downgrade during redirect navigation. Reported by + Xiaoyin Liu on 2017-05-05</li> + <li>[762099] Various fixes from internal audits, fuzzing and other initiatives</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2017-5111</cvename> + <cvename>CVE-2017-5112</cvename> + <cvename>CVE-2017-5113</cvename> + <cvename>CVE-2017-5114</cvename> + <cvename>CVE-2017-5115</cvename> + <cvename>CVE-2017-5116</cvename> + <cvename>CVE-2017-5117</cvename> + <cvename>CVE-2017-5118</cvename> + <cvename>CVE-2017-5119</cvename> + <cvename>CVE-2017-5120</cvename> + <url>https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html</url> + </references> + <dates> + <discovery>2017-09-05</discovery> + <entry>2017-09-06</entry> + </dates> + </vuln> + <vuln vid="44101b31-8ffd-11e7-b5af-a4badb2f4699"> <cancelled/> </vuln> |