diff options
author | rene <rene@FreeBSD.org> | 2012-08-31 07:08:54 +0800 |
---|---|---|
committer | rene <rene@FreeBSD.org> | 2012-08-31 07:08:54 +0800 |
commit | c6d01b83dc3ccdb2d357e5a37bfa6d95a6ddedcb (patch) | |
tree | 2092ed9e811fa726ade7f8362f1fc2478ca0deff /security | |
parent | cf096a4851d137cf441e695a836f5207848c4091 (diff) | |
download | freebsd-ports-gnome-c6d01b83dc3ccdb2d357e5a37bfa6d95a6ddedcb.tar.gz freebsd-ports-gnome-c6d01b83dc3ccdb2d357e5a37bfa6d95a6ddedcb.tar.zst freebsd-ports-gnome-c6d01b83dc3ccdb2d357e5a37bfa6d95a6ddedcb.zip |
Document vulnerabilities in www/chromium < 21.0.1180.89
Obtained from: http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 47 |
1 files changed, 47 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d9d3f5967c4e..c185b5582c6b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,53 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ee68923d-f2f5-11e1-8014-00262d5ed8ee"> + <topic>chromium -- multiple vulnerabilities</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>21.0.1180.89</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Google Chrome Releases reports:</p> + <blockquote cite="http://googlechromereleases.blogspot.nl/search/label/Stable%20updates"> + <p>[121347] Medium CVE-2012-2865: Out-of-bounds read in line breaking. + Credit to miaubiz.</p> + <p>[134897] High CVE-2012-2866: Bad cast with run-ins. Credit to + miaubiz.</p> + <p>[135485] Low CVE-2012-2867: Browser crash with SPDY.</p> + <p>[136881] Medium CVE-2012-2868: Race condition with workers and XHR. + Credit to miaubiz.</p> + <p>[137778] High CVE-2012-2869: Avoid stale buffer in URL loading. + Credit to Fermin Serna of the Google Security Team.</p> + <p>[138672] [140368] Low CVE-2012-2870: Lower severity memory + management issues in XPath. Credit to Nicolas Gregoire.</p> + <p>[138673] High CVE-2012-2871: Bad cast in XSL transforms. Credit to + Nicolas Gregoire.</p> + <p>[142956] Medium CVE-2012-2872: XSS in SSL interstitial. Credit to + Emmanuel Bronshtein.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-2865</cvename> + <cvename>CVE-2012-2866</cvename> + <cvename>CVE-2012-2867</cvename> + <cvename>CVE-2012-2868</cvename> + <cvename>CVE-2012-2869</cvename> + <cvename>CVE-2012-2870</cvename> + <cvename>CVE-2012-2871</cvename> + <cvename>CVE-2012-2872</cvename> + <url>http://googlechromereleases.blogspot.nl/search/label/Stable%20updates</url> + </references> + <dates> + <discovery>2012-08-30</discovery> + <entry>2012-08-30</entry> + </dates> + </vuln> + <vuln vid="4c53f007-f2ed-11e1-a215-14dae9ebcf89"> <topic>asterisk -- multiple vulnerabilities</topic> <affects> |