From owner-svn-ports-head@freebsd.org Mon Jun 20 19:08:33 2016 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 328C0AC4966; Mon, 20 Jun 2016 19:08:33 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 0A6692926; Mon, 20 Jun 2016 19:08:32 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u5KJ8WcD063492; Mon, 20 Jun 2016 19:08:32 GMT (envelope-from feld@FreeBSD.org) Received: (from feld@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u5KJ8Wuf063490; Mon, 20 Jun 2016 19:08:32 GMT (envelope-from feld@FreeBSD.org) Message-Id: <201606201908.u5KJ8Wuf063490@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: feld set sender to feld@FreeBSD.org using -f From: Mark Felder Date: Mon, 20 Jun 2016 19:08:32 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r417173 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 20 Jun 2016 19:08:33 -0000 Author: feld Date: Mon Jun 20 19:08:31 2016 New Revision: 417173 URL: https://svnweb.freebsd.org/changeset/ports/417173 Log: Update vuxml for libxslt vulnerabilities These vulnerabilities were previously reported by Google as they bundle libxslt with Chrome. When we patched Chromium to address these vulnerabilites it was overlooked that we do not bundle libxslt library with Chromium, but instead use textproc/libxslt. Chromium users have continued to be vulnerable to these CVEs as a result. This update fixes the Chromium CVE entry and adds a separate one for libxslt. PR: 210298 Security: CVE-2016-1683 Security: CVE-2016-1684 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Jun 20 18:58:36 2016 (r417172) +++ head/security/vuxml/vuln.xml Mon Jun 20 19:08:31 2016 (r417173) @@ -58,6 +58,38 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + libxslt -- Denial of Service + + + libxslt + 1.1.29 + + + + +

Google reports:

+
+
    +
  • [583156] Medium CVE-2016-1683: Out-of-bounds access in libxslt. + Credit to Nicolas Gregoire.
  • +
  • [583171] Medium CVE-2016-1684: Integer overflow in libxslt. + Credit to Nicolas Gregoire.
  • +
+
+ +
+ + http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html + CVE-2016-1683 + CVE-2016-1684 + + + 2016-05-25 + 2016-06-20 + +
+ flash -- multiple vulnerabilities @@ -1093,10 +1125,6 @@ Notes: Aleksandar Nikolic of Cisco Talos.
  • [579801] Medium CVE-2016-1682: CSP bypass for ServiceWorker. Credit to KingstonTime.
  • -
  • [583156] Medium CVE-2016-1683: Out-of-bounds access in libxslt. - Credit to Nicolas Gregoire.
  • -
  • [583171] Medium CVE-2016-1684: Integer overflow in libxslt. - Credit to Nicolas Gregoire.
  • [601362] Medium CVE-2016-1685: Out-of-bounds read in PDFium. Credit to Ke Liu of Tencent's Xuanwu LAB.
  • [603518] Medium CVE-2016-1686: Out-of-bounds read in PDFium. @@ -1135,8 +1163,6 @@ Notes: CVE-2016-1680 CVE-2016-1681 CVE-2016-1682 - CVE-2016-1683 - CVE-2016-1684 CVE-2016-1685 CVE-2016-1686 CVE-2016-1687 @@ -1153,6 +1179,7 @@ Notes: 2016-05-25 2016-05-28 + 2016-06-20