From owner-svn-ports-all@FreeBSD.ORG Wed Jan 15 22:18:01 2014 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 159AE613; Wed, 15 Jan 2014 22:18:01 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 010331B68; Wed, 15 Jan 2014 22:18:01 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id s0FMI0lB053010; Wed, 15 Jan 2014 22:18:00 GMT (envelope-from rene@svn.freebsd.org) Received: (from rene@localhost) by svn.freebsd.org (8.14.7/8.14.7/Submit) id s0FMI039053008; Wed, 15 Jan 2014 22:18:00 GMT (envelope-from rene@svn.freebsd.org) Message-Id: <201401152218.s0FMI039053008@svn.freebsd.org> From: Rene Ladan Date: Wed, 15 Jan 2014 22:18:00 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org Subject: svn commit: r339828 - branches/2014Q1/security/vuxml X-SVN-Group: ports-branches MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 15 Jan 2014 22:18:01 -0000 Author: rene Date: Wed Jan 15 22:18:00 2014 New Revision: 339828 URL: http://svnweb.freebsd.org/changeset/ports/339828 QAT: https://qat.redports.org/buildarchive/r339828/ Log: MFH: r339825 Document new vulnerabilities in www/chromium < 32.0.1700.77 Obtained from: http://googlechromereleases.blogspot.nl/ MFH: r339721 Merge latest ntpd entry from remko@ which came in as a merge conflict. Approved by: portmgr (erwin) Modified: branches/2014Q1/security/vuxml/vuln.xml Directory Properties: branches/2014Q1/ (props changed) Modified: branches/2014Q1/security/vuxml/vuln.xml ============================================================================== --- branches/2014Q1/security/vuxml/vuln.xml Wed Jan 15 22:11:43 2014 (r339827) +++ branches/2014Q1/security/vuxml/vuln.xml Wed Jan 15 22:18:00 2014 (r339828) @@ -51,6 +51,87 @@ Note: Please add new entries to the beg --> + + chromium -- multiple vulnerabilities + + + chromium + 32.0.1700.77 + + + + +

Google Chrome Releases reports:

+
+

11 security fixes in this release, including:

+
    +
  • [249502] High CVE-2013-6646: Use-after-free in web workers. + Credit to Collin Payne.
  • +
  • [326854] High CVE-2013-6641: Use-after-free related to forms. + Credit to Atte Kettunen of OUSPG.
  • +
  • [324969] High CVE-2013-6642: Address bar spoofing in Chrome for + Android. Credit to lpilorz.
  • +
  • [321940] High CVE-2013-6643: Unprompted sync with an attacker’s + Google account. Credit to Joao Lucas Melo Brasio.
  • +
  • [318791] Medium CVE-2013-6645 Use-after-free related to speech + input elements. Credit to Khalil Zhani.
  • +
  • [333036] CVE-2013-6644: Various fixes from internal audits, + fuzzing and other initiatives.
  • +
+
+ +
+ + CVE-2013-6641 + CVE-2013-6642 + CVE-2013-6643 + CVE-2013-6644 + CVE-2013-6645 + CVE-2013-6646 + http://googlechromereleases.blogspot.nl/ + + + 2014-01-14 + 2014-01-15 + +
+ + + ntpd DRDoS / Amplification Attack using ntpdc monlist command + + + ntp + 4.2.7p26 + + + + +

ntp.org reports:

+
+

Unrestricted access to the monlist feature in + ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote + attackers to cause a denial of service (traffic + amplification) via forged (1) REQ_MON_GETLIST or (2) + REQ_MON_GETLIST_1 requests, as exploited in the wild in + December 2013

+

Use noquery to your default restrictions to block all + status queries.

+

Use disable monitor to disable the ``ntpdc -c monlist'' + command while still allowing other status queries.

+
+ +
+ + CVE-2013-5211 + SA-14:02.ntpd + http://support.ntp.org/bin/view/Main/SecurityNotice#DRDoS_Amplification_Attack_using + + + 2014-01-01 + 2014-01-14 + +
+ nagios -- denial of service vulnerability