svn commit: r417173 - head/security/vuxml
Mark Felder
feld at FreeBSD.org
Mon Jun 20 19:08:33 UTC 2016
Author: feld
Date: Mon Jun 20 19:08:31 2016
New Revision: 417173
URL: https://svnweb.freebsd.org/changeset/ports/417173
Log:
Update vuxml for libxslt vulnerabilities
These vulnerabilities were previously reported by Google as they bundle
libxslt with Chrome. When we patched Chromium to address these
vulnerabilites it was overlooked that we do not bundle libxslt library
with Chromium, but instead use textproc/libxslt. Chromium users have
continued to be vulnerable to these CVEs as a result. This update fixes
the Chromium CVE entry and adds a separate one for libxslt.
PR: 210298
Security: CVE-2016-1683
Security: CVE-2016-1684
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Mon Jun 20 18:58:36 2016 (r417172)
+++ head/security/vuxml/vuln.xml Mon Jun 20 19:08:31 2016 (r417173)
@@ -58,6 +58,38 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="1a2aa04f-3718-11e6-b3c8-14dae9d210b8">
+ <topic>libxslt -- Denial of Service</topic>
+ <affects>
+ <package>
+ <name>libxslt</name>
+ <range><lt>1.1.29</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Google reports:</p>
+ <blockquote cite="http://seclists.org/bugtraq/2016/Jun/81">
+ <ul>
+ <li>[583156] Medium CVE-2016-1683: Out-of-bounds access in libxslt.
+ Credit to Nicolas Gregoire.</li>
+ <li>[583171] Medium CVE-2016-1684: Integer overflow in libxslt.
+ Credit to Nicolas Gregoire.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html</url>
+ <cvename>CVE-2016-1683</cvename>
+ <cvename>CVE-2016-1684</cvename>
+ </references>
+ <dates>
+ <discovery>2016-05-25</discovery>
+ <entry>2016-06-20</entry>
+ </dates>
+ </vuln>
+
<vuln vid="0e3dfdde-35c4-11e6-8e82-002590263bf5">
<topic>flash -- multiple vulnerabilities</topic>
<affects>
@@ -1093,10 +1125,6 @@ Notes:
Aleksandar Nikolic of Cisco Talos.</li>
<li>[579801] Medium CVE-2016-1682: CSP bypass for ServiceWorker.
Credit to KingstonTime.</li>
- <li>[583156] Medium CVE-2016-1683: Out-of-bounds access in libxslt.
- Credit to Nicolas Gregoire.</li>
- <li>[583171] Medium CVE-2016-1684: Integer overflow in libxslt.
- Credit to Nicolas Gregoire.</li>
<li>[601362] Medium CVE-2016-1685: Out-of-bounds read in PDFium.
Credit to Ke Liu of Tencent's Xuanwu LAB.</li>
<li>[603518] Medium CVE-2016-1686: Out-of-bounds read in PDFium.
@@ -1135,8 +1163,6 @@ Notes:
<cvename>CVE-2016-1680</cvename>
<cvename>CVE-2016-1681</cvename>
<cvename>CVE-2016-1682</cvename>
- <cvename>CVE-2016-1683</cvename>
- <cvename>CVE-2016-1684</cvename>
<cvename>CVE-2016-1685</cvename>
<cvename>CVE-2016-1686</cvename>
<cvename>CVE-2016-1687</cvename>
@@ -1153,6 +1179,7 @@ Notes:
<dates>
<discovery>2016-05-25</discovery>
<entry>2016-05-28</entry>
+ <modified>2016-06-20</modified>
</dates>
</vuln>
More information about the svn-ports-head
mailing list