Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Sep 2014 09:43:15 +0200
From:      Carlos Jacobo Puga Medina <cpm@fbsd.es>
To:        rene@freebsd.org
Cc:        freebsd-chromium@freebsd.org
Subject:   Document new vulnerabilities in www/chromium < 37.0.2062.120
Message-ID:  <20140910094315.957a635d28c73570b0eccb2a@fbsd.es>

next in thread | raw e-mail | index | archive | help
Current www/chromium is marked as vulnerable on Google Chrome website [1]. Added a new entry in vuxml.

diff -urN vuln.xml.old vuln.xml
--- vuln.xml.old	2014-09-10 09:24:32.000000000 +0200
+++ vuln.xml	2014-09-10 09:37:49.000000000 +0200
@@ -57,6 +57,39 @@
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="86508b1d-38bb-11e4-827c-000c6e25e3e9">
+    <topic>chromium -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>chromium</name>
+	<range><lt>37.0.2062.120</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Google Chrome Releases reports:</p>
+	<blockquote cite="http://googlechromereleases.blogspot.nl">;
+	  <p>4 security fixes in this release, including:</p>
+          <ul>
+            <li>[401362] High CVE-2014-3178: Use-after-free in rendering. Credit
+              to miaubiz.</li>
+            <li>[411014] CVE-2014-3179: Various fixes from internal audits, fuzzing
+              and other initiatives.</li>
+          </ul> 
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2014-3178</cvename>
+      <cvename>CVE-2014-3179</cvename> 
+      <url>http://googlechromereleases.blogspot.nl</url>;
+    </references>
+    <dates>
+      <discovery>2014-09-09</discovery>
+      <entry>2014-09-10</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="6318b303-3507-11e4-b76c-0011d823eebd">
     <topic>trafficserver -- unspecified vulnerability</topic>
     <affects>

[1] http://googlechromereleases.blogspot.nl
-- 
Carlos Jacobo Puga Medina <cpm@fbsd.es>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20140910094315.957a635d28c73570b0eccb2a>