svn commit: r410211 - head/security/vuxml
Christoph Moench-Tegeder
cmt at FreeBSD.org
Sat Mar 5 20:39:51 UTC 2016
Author: cmt
Date: Sat Mar 5 20:39:49 2016
New Revision: 410211
URL: https://svnweb.freebsd.org/changeset/ports/410211
Log:
Document recent chromium vulnerabilities
Approved by: miwi (mentor), rene (mentor)
Obtained from: http://googlechromereleases.blogspot.de/2016/03/stable-channel-update.html
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sat Mar 5 20:36:18 2016 (r410210)
+++ head/security/vuxml/vuln.xml Sat Mar 5 20:39:49 2016 (r410211)
@@ -58,6 +58,59 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="f85fa236-e2a6-412e-b5c7-c42120892de5">
+ <topic>chromium -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <name>chromium-npapi</name>
+ <name>chromium-pulse</name>
+ <range><lt>49.0.2623.75</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Google Chrome Releases reports:</p>
+ <blockquote cite="http://googlechromereleases.blogspot.de/2016/03/stable-channel-update.html">
+ <p>[560011] High CVE-2016-1630: Same-origin bypass in Blink.</p>
+ <p>[569496] High CVE-2016-1631: Same-origin bypass in Pepper Plugin.</p>
+ <p>[549986] High CVE-2016-1632: Bad cast in Extensions.</p>
+ <p>[572537] High CVE-2016-1633: Use-after-free in Blink.</p>
+ <p>[559292] High CVE-2016-1634: Use-after-free in Blink.</p>
+ <p>[585268] High CVE-2016-1635: Use-after-free in Blink.</p>
+ <p>[584155] High CVE-2016-1636: SRI Validation Bypass.</p>
+ <p>[555544] Medium CVE-2016-1637: Information Leak in Skia.</p>
+ <p>[585282] Medium CVE-2016-1638: WebAPI Bypass.</p>
+ <p>[572224] Medium CVE-2016-1639: Use-after-free in WebRTC.</p>
+ <p>[550047] Medium CVE-2016-1640: Origin confusion in Extensions UI.</p>
+ <p>[583718] Medium CVE-2016-1641: Use-after-free in Favicon.</p>
+ <p>[591402] CVE-2016-1642: Various fixes from internal audits, fuzzing and other initiatives.</p>
+ <p>Multiple vulnerabilities in V8 fixed.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-1630</cvename>
+ <cvename>CVE-2016-1631</cvename>
+ <cvename>CVE-2016-1632</cvename>
+ <cvename>CVE-2016-1633</cvename>
+ <cvename>CVE-2016-1634</cvename>
+ <cvename>CVE-2016-1635</cvename>
+ <cvename>CVE-2016-1636</cvename>
+ <cvename>CVE-2016-1637</cvename>
+ <cvename>CVE-2016-1638</cvename>
+ <cvename>CVE-2016-1639</cvename>
+ <cvename>CVE-2016-1640</cvename>
+ <cvename>CVE-2016-1641</cvename>
+ <cvename>CVE-2016-1642</cvename>
+ <url>http://googlechromereleases.blogspot.de/2016/03/stable-channel-update.html</url>
+ </references>
+ <dates>
+ <discovery>2016-03-02</discovery>
+ <entry>2016-03-05</entry>
+ </dates>
+ </vuln>
+
<vuln vid="6b3591ea-e2d2-11e5-a6be-5453ed2e2b49">
<topic>libssh -- weak Diffie-Hellman secret generation</topic>
<affects>
More information about the svn-ports-all
mailing list