diff options
author | rene <rene@FreeBSD.org> | 2012-08-10 22:38:47 +0800 |
---|---|---|
committer | rene <rene@FreeBSD.org> | 2012-08-10 22:38:47 +0800 |
commit | ba7469aa4b6aed6d0604f32ed5f200e1fec481ec (patch) | |
tree | 39fac4539e71de2604415e1ae6478f1bb3850314 /security | |
parent | 0dcf10a2e0731315bcff445ab12692d9999f5d3e (diff) | |
download | freebsd-ports-gnome-ba7469aa4b6aed6d0604f32ed5f200e1fec481ec.tar.gz freebsd-ports-gnome-ba7469aa4b6aed6d0604f32ed5f200e1fec481ec.tar.zst freebsd-ports-gnome-ba7469aa4b6aed6d0604f32ed5f200e1fec481ec.zip |
- Document vulnerabilities in www/chromium 20.0.1132.57 and 21.0.1180.60.
- Keep the latest chromium vulnerabilies on top.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 110 |
1 files changed, 110 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d683d4fa4963..40ad2061d8d5 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -84,6 +84,116 @@ Note: Please add new entries to the beginning of this file. </dates> </vuln> + <vuln vid="ce84e136-e2f6-11e1-a8ca-00262d5ed8ee"> + <topic>chromium -- multiple vulnerabilities</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>21.0.1180.60</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Google Chrome Releases reports:</p> + <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates"> + <p>[Linux only] [125225] Medium CVE-2012-2846: Cross-process + interference in renderers. Credit to Google Chrome Security Team + (Julien Tinnes).</p> + <p>[127522] Low CVE-2012-2847: Missing re-prompt to user upon + excessive downloads. Credit to Matt Austin of Aspect Security.</p> + <p>[127525] Medium CVE-2012-2848: Overly broad file access granted + after drag+drop. Credit to Matt Austin of Aspect Security.</p> + <p>[128163] Low CVE-2012-2849: Off-by-one read in GIF decoder. Credit + to Atte Kettunen of OUSPG.</p> + <p>[130251] [130592] [130611] [131068] [131237] [131252] [131621] + [131690] [132860] Medium CVE-2012-2850: Various lower severity + issues in the PDF viewer. Credit to Mateusz Jurczyk of Google + Security Team, with contributions by Gynvael Coldwind of Google + Security Team.</p> + <p>[132585] [132694] [132861] High CVE-2012-2851: Integer overflows in + PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with + contributions by Gynvael Coldwind of Google Security Team.</p> + <p>[134028] High CVE-2012-2852: Use-after-free with bad object linkage + in PDF. Credit to Alexey Samsonov of Google.</p> + <p>[134101] Medium CVE-2012-2853: webRequest can interfere with the + Chrome Web Store. Credit to Trev of Adblock.</p> + <p>[134519] Low CVE-2012-2854: Leak of pointer values to WebUI + renderers. Credit to Nasko Oskov of the Chromium development + community.</p> + <p>[134888] High CVE-2012-2855: Use-after-free in PDF viewer. Credit + to Mateusz Jurczyk of Google Security Team, with contributions by + Gynvael Coldwind of Google Security Team.</p> + <p>[134954] [135264] High CVE-2012-2856: Out-of-bounds writes in PDF + viewer. Credit to Mateusz Jurczyk of Google Security Team, with + contributions by Gynvael Coldwind of Google Security Team.</p> + <p>[136235] High CVE-2012-2857: Use-after-free in CSS DOM. Credit to + Arthur Gerkis.</p> + <p>[136894] High CVE-2012-2858: Buffer overflow in WebP decoder. + Credit to Juri Aedla.</p> + <p>[Linux only] [137541] Critical CVE-2012-2859: Crash in tab + handling. Credit to Jeff Roberts of Google Security Team.</p> + <p>[137671] Medium CVE-2012-2860: Out-of-bounds access when clicking + in date picker. Credit to Chamal de Silva.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-2846</cvename> + <cvename>CVE-2012-2847</cvename> + <cvename>CVE-2012-2848</cvename> + <cvename>CVE-2012-2849</cvename> + <cvename>CVE-2012-2850</cvename> + <cvename>CVE-2012-2851</cvename> + <cvename>CVE-2012-2852</cvename> + <cvename>CVE-2012-2853</cvename> + <cvename>CVE-2012-2854</cvename> + <cvename>CVE-2012-2855</cvename> + <cvename>CVE-2012-2856</cvename> + <cvename>CVE-2012-2857</cvename> + <cvename>CVE-2012-2858</cvename> + <cvename>CVE-2012-2859</cvename> + <cvename>CVE-2012-2860</cvename> + <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url> + </references> + <dates> + <discovery>2012-07-31</discovery> + <entry>2012-08-10</entry> + </dates> + </vuln> + + <vuln vid="2092a45b-e2f6-11e1-a8ca-00262d5ed8ee"> + <topic>www/chromium -- multiple vulnerabilities</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>20.0.1132.57</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Google Chrome Releases reports:</p> + <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates"> + <p>[129898] High CVE-2012-2842: Use-after-free in counter handling. + Credit to miaubiz.</p> + <p>[130595] High CVE-2012-2843: Use-after-free in layout height + tracking. Credit to miaubiz.</p> + <p>[133450] High CVE-2012-2844: Bad object access with JavaScript in + PDF. Credit to Alexey Samsonov of Google.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-2842</cvename> + <cvename>CVE-2012-2843</cvename> + <cvename>CVE-2012-2844</cvename> + <url>http://googlechromereleases.blogspot.com/search/label/Stable%20updates</url> + </references> + <dates> + <discovery>2012-07-11</discovery> + <entry>2012-08-10</entry> + </dates> + </vuln> + <vuln vid="31db9a18-e289-11e1-a57d-080027a27dbf"> <topic>rubygem-rails -- multiple vulnerabilities</topic> <affects> |