From owner-freebsd-chromium@FreeBSD.ORG Wed Sep 10 07:55:17 2014 Return-Path: Delivered-To: freebsd-chromium@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 88A1E954; Wed, 10 Sep 2014 07:55:17 +0000 (UTC) Received: from erelay5.ox.registrar-servers.com (erelay5.ox.registrar-servers.com [192.64.117.65]) by mx1.freebsd.org (Postfix) with ESMTP id 63E4AA06; Wed, 10 Sep 2014 07:55:16 +0000 (UTC) Received: from localhost (unknown [127.0.0.1]) by erelay1.ox.registrar-servers.com (Postfix) with ESMTP id 4ACC22200A04; Wed, 10 Sep 2014 07:44:57 +0000 (UTC) Received: from erelay1.ox.registrar-servers.com ([127.0.0.1]) by localhost (erelay.ox.registrar-servers.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id IVSknxg9u3QS; Wed, 10 Sep 2014 03:44:56 -0400 (EDT) Received: from imap10.ox.privateemail.com (imap10.ox.privateemail.com [192.64.116.221]) by erelay1.ox.registrar-servers.com (Postfix) with ESMTP id 35A222201B9D; Wed, 10 Sep 2014 03:44:56 -0400 (EDT) Received: from localhost (localhost [127.0.0.1]) by mail.privateemail.com (Postfix) with ESMTP id CB3652400D1; Wed, 10 Sep 2014 03:44:55 -0400 (EDT) X-Virus-Scanned: Debian amavisd-new at imap10.ox.privateemail.com Received: from mail.privateemail.com ([127.0.0.1]) by localhost (imap10.ox.privateemail.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id xVk1-eXnerA6; Wed, 10 Sep 2014 03:44:55 -0400 (EDT) Received: from localhost (140.Red-83-57-187.dynamicIP.rima-tde.net [83.57.187.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.privateemail.com (Postfix) with ESMTPSA id 846282400C2; Wed, 10 Sep 2014 03:44:53 -0400 (EDT) Date: Wed, 10 Sep 2014 09:43:15 +0200 From: Carlos Jacobo Puga Medina To: rene@freebsd.org Subject: Document new vulnerabilities in www/chromium < 37.0.2062.120 Message-Id: <20140910094315.957a635d28c73570b0eccb2a@fbsd.es> X-Mailer: Sylpheed 3.4.2 (GTK+ 2.24.22; i386-portbld-freebsd11.0) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: freebsd-chromium@freebsd.org X-BeenThere: freebsd-chromium@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: FreeBSD-specific Chromium issues List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 10 Sep 2014 07:55:17 -0000 Current www/chromium is marked as vulnerable on Google Chrome website [1]. Added a new entry in vuxml. diff -urN vuln.xml.old vuln.xml --- vuln.xml.old 2014-09-10 09:24:32.000000000 +0200 +++ vuln.xml 2014-09-10 09:37:49.000000000 +0200 @@ -57,6 +57,39 @@ --> + + chromium -- multiple vulnerabilities + + + chromium + 37.0.2062.120 + + + + +

Google Chrome Releases reports:

+
+

4 security fixes in this release, including:

+
    +
  • [401362] High CVE-2014-3178: Use-after-free in rendering. Credit + to miaubiz.
  • +
  • [411014] CVE-2014-3179: Various fixes from internal audits, fuzzing + and other initiatives.
  • +
+
+ +
+ + CVE-2014-3178 + CVE-2014-3179 + http://googlechromereleases.blogspot.nl + + + 2014-09-09 + 2014-09-10 + +
+ trafficserver -- unspecified vulnerability [1] http://googlechromereleases.blogspot.nl -- Carlos Jacobo Puga Medina