svn commit: r543621 - head/security/vuxml
Rene Ladan
rene at FreeBSD.org
Tue Jul 28 17:42:47 UTC 2020
Author: rene
Date: Tue Jul 28 17:42:46 2020
New Revision: 543621
URL: https://svnweb.freebsd.org/changeset/ports/543621
Log:
Document new vulnerabilities in www/chromium < 84.0.4147.105
Obtained from: https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop_27.html
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Tue Jul 28 17:39:55 2020 (r543620)
+++ head/security/vuxml/vuln.xml Tue Jul 28 17:42:46 2020 (r543621)
@@ -58,6 +58,52 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="9a447f78-d0f8-11ea-9837-e09467587c17">
+ <topic>chromium -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <range><lt>84.0.4147.105</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Chrome Releases reports:</p>
+ <blockquote cite="https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop_27.html">
+ <p>This update contains 8 security fixes, including:</p>
+ <ul>
+ <li>[1105318] High CVE-2020-6537: Type Confusion in V8. Reported by
+ Alphalaab on 2020-07-14</li>
+ <li>[1096677] High CVE-2020-6538: Inappropriate implementation in
+ WebView. Reported by Yongke Wang(@Rudykewang) and Aryb1n(@aryb1n)
+ of Tencent Security Xuanwu Lab on 2020-06-18</li>
+ <li>[1104061] High CVE-2020-6532: Use after free in SCTP. Reported
+ by Anonymous on 2020-07-09</li>
+ <li>[1105635] High CVE-2020-6539: Use after free in CSS. Reported
+ by Oriol Brufau on 2020-07-14</li>
+ <li>[1105720] High CVE-2020-6540: Heap buffer overflow in Skia.
+ Reported by Zhen Zhou of NSFOCUS Security Team on 2020-07-15</li>
+ <li>[1106773] High CVE-2020-6541: Use after free in WebUSB. Reported
+ by Sergei Glazunov of Google Project Zero on 2020-07-17</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2020-6532</cvename>
+ <cvename>CVE-2020-6537</cvename>
+ <cvename>CVE-2020-6538</cvename>
+ <cvename>CVE-2020-6539</cvename>
+ <cvename>CVE-2020-6540</cvename>
+ <cvename>CVE-2020-6541</cvename>
+ <url>https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop_27.html</url>
+ </references>
+ <dates>
+ <discovery>2020-07-27</discovery>
+ <entry>2020-07-28</entry>
+ </dates>
+ </vuln>
+
<vuln vid="086c96cd-d0cb-11ea-b922-5404a68ad561">
<topic>libsndfile -- out-of-bounds read memory access</topic>
<affects>
More information about the svn-ports-all
mailing list