svn commit: r560715 - head/security/vuxml

Rene Ladan rene at FreeBSD.org
Thu Jan 7 15:09:22 UTC 2021


Author: rene
Date: Thu Jan  7 15:09:21 2021
New Revision: 560715
URL: https://svnweb.freebsd.org/changeset/ports/560715

Log:
  Document new vulnerabilities in www/chromium < 87.0.4280.141
  
  Obtained from:	https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Jan  7 14:41:03 2021	(r560714)
+++ head/security/vuxml/vuln.xml	Thu Jan  7 15:09:21 2021	(r560715)
@@ -58,6 +58,81 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="d153c4d2-50f8-11eb-8046-3065ec8fd3ec">
+    <topic>chromium -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>chromium</name>
+	<range><lt>87.0.4280.141</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Chrome Releases reports:</p>
+	<blockquote cite="https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html">
+	  <p>This release includes 16 security fixes, including:</p>
+	  <ul>
+	    <li>[1148749] High CVE-2021-21106: Use after free in autofill.
+	      Reported by Weipeng Jiang (@Krace) from Codesafe Team of
+	      Legendsec at Qi'anxin Group on 2020-11-13</li>
+	    <li>[1153595] High CVE-2021-21107: Use after free in drag and
+	      drop. Reported by Leecraso and Guang Gong of 360 Alpha Lab on
+	      2020-11-30</li>
+	    <li>[1155426] High CVE-2021-21108: Use after free in media.
+	      Reported by Leecraso and Guang Gong of 360 Alpha Lab on
+	      2020-12-04</li>
+	    <li>[1152334] High CVE-2021-21109: Use after free in payments.
+	      Reported by Rong Jian and Guang Gong of 360 Alpha Lab on
+	      2020-11-24</li>
+	    <li>[1152451] High CVE-2021-21110: Use after free in safe
+	      browsing. Reported by Anonymous on 2020-11-24</li>
+	    <li>[1149125] High CVE-2021-21111: Insufficient policy enforcement
+	      in WebUI. Reported by Alesandro Ortiz on 2020-11-15</li>
+	    <li>[1151298] High CVE-2021-21112: Use after free in Blink.
+	     Reported by YoungJoo Lee(@ashuu_lee) of Raon Whitehat on
+	      2020-11-20</li>
+	    <li>[1155178] High CVE-2021-21113: Heap buffer overflow in Skia.
+	      Reported by tsubmunu on 2020-12-03</li>
+	    <li>[1148309] High CVE-2020-16043: Insufficient data validation in
+	      networking. Reported by Samy Kamkar, Ben Seri at Armis, Gregory
+	      Vishnepolsky at Armis on 2020-11-12</li>
+	    <li>[1150065] High CVE-2021-21114: Use after free in audio.
+	      Reported by Man Yue Mo of GitHub Security Lab on 2020-11-17</li>
+	    <li>[1157790] High CVE-2020-15995: Out of bounds write in V8.
+	      Reported by Bohan Liu (@P4nda20371774) of Tencent Security Xuanwu
+	      Lab on 2020-12-11</li>
+	    <li>[1157814] High CVE-2021-21115: Use after free in safe browsing.
+	      Reported by Leecraso and Guang Gong of 360 Alpha Lab on
+	      2020-12-11</li>
+	    <li>[1151069] Medium CVE-2021-21116: Heap buffer overflow in audio.
+	      Reported by Alison Huffman, Microsoft Browser Vulnerability
+	      Research on 2020-11-19</li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2020-15995</cvename>
+      <cvename>CVE-2020-16043</cvename>
+      <cvename>CVE-2021-21106</cvename>
+      <cvename>CVE-2021-21107</cvename>
+      <cvename>CVE-2021-21108</cvename>
+      <cvename>CVE-2021-21109</cvename>
+      <cvename>CVE-2021-21110</cvename>
+      <cvename>CVE-2021-21111</cvename>
+      <cvename>CVE-2021-21112</cvename>
+      <cvename>CVE-2021-21113</cvename>
+      <cvename>CVE-2021-21114</cvename>
+      <cvename>CVE-2021-21115</cvename>
+      <cvename>CVE-2021-21116</cvename>
+      <url>https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html</url>
+    </references>
+    <dates>
+      <discovery>2021-01-06</discovery>
+      <entry>2021-01-07</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="bd98066d-4ea4-11eb-b412-e86a64caca56">
     <topic>mail/dovecot -- multiple vulnerabilities</topic>
     <affects>


More information about the svn-ports-head mailing list