Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 24 Feb 2014 13:32:32 +0000 (UTC)
From:      Rene Ladan <rene@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org
Subject:   svn commit: r345840 - branches/2014Q1/security/vuxml
Message-ID:  <201402241332.s1ODWWaj032304@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: rene
Date: Mon Feb 24 13:32:31 2014
New Revision: 345840
URL: http://svnweb.freebsd.org/changeset/ports/345840
QAT: https://qat.redports.org/buildarchive/r345840/

Log:
  MFH: r345835
  
  Document new vulnerabilities in www/chromium < 33.0.1750.117
  
  Obtained from:	http://googlechromereleases.blogspot.nl/
  
  MFH r345256 (postgresql)
  
  MFH r344371 (phpmyadmin)
  
  Approved by:	portmgr (antoine/bapt)

Modified:
  branches/2014Q1/security/vuxml/vuln.xml
Directory Properties:
  branches/2014Q1/   (props changed)

Modified: branches/2014Q1/security/vuxml/vuln.xml
==============================================================================
--- branches/2014Q1/security/vuxml/vuln.xml	Mon Feb 24 13:31:31 2014	(r345839)
+++ branches/2014Q1/security/vuxml/vuln.xml	Mon Feb 24 13:32:31 2014	(r345840)
@@ -51,6 +51,148 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="9dd47fa3-9d53-11e3-b20f-00262d5ed8ee">
+    <topic>chromium -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>chromium</name>
+	<range><lt>33.0.1750.117</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Google Chrome Releases reports:</p>
+	<blockquote cite="http://googlechromereleases.blogspot.nl/">;
+	  <p>28 security fixes in this release, including:</p>
+	  <ul>
+	    <li>[334897] High CVE-2013-6652: Issue with relative paths in
+	      Windows sandbox named pipe policy. Credit to tyranid.</li>
+	    <li>[331790] High CVE-2013-6653: Use-after-free related to web
+	      contents. Credit to Khalil Zhani.</li>
+	    <li>[333176] High CVE-2013-6654: Bad cast in SVG. Credit to
+	      TheShow3511.</li>
+	    <li>[293534] High CVE-2013-6655: Use-after-free in layout. Credit
+	      to cloudfuzzer.</li>
+	    <li>[331725] High CVE-2013-6656: Information leak in XSS auditor.
+	      Credit to NeexEmil.</li>
+	    <li>[331060] Medium CVE-2013-6657: Information leak in XSS auditor.
+	      Credit to NeexEmil.</li>
+	    <li>[322891] Medium CVE-2013-6658: Use-after-free in layout. Credit
+	      to cloudfuzzer.</li>
+	    <li>[306959] Medium CVE-2013-6659: Issue with certificates
+	      validation in TLS handshake. Credit to Antoine Delignat-Lavaud
+	      and Karthikeyan Bhargavan from Prosecco, Inria Paris.</li>
+	    <li>[332579] Low CVE-2013-6660: Information leak in drag and drop.
+	      Credit to bishopjeffreys.</li>
+	    <li>[344876] Low-High CVE-2013-6661: Various fixes from internal
+	      audits, fuzzing and other initiatives. Of these, seven are fixes
+	      for issues that could have allowed for sandbox escapes from
+	      compromised renderers.</li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2013-6652</cvename>
+      <cvename>CVE-2013-6653</cvename>
+      <cvename>CVE-2013-6654</cvename>
+      <cvename>CVE-2013-6655</cvename>
+      <cvename>CVE-2013-6656</cvename>
+      <cvename>CVE-2013-6657</cvename>
+      <cvename>CVE-2013-6658</cvename>
+      <cvename>CVE-2013-6659</cvename>
+      <cvename>CVE-2013-6660</cvename>
+      <cvename>CVE-2013-6661</cvename>
+      <url>http://googlechromereleases.blogspot.nl/</url>;
+    </references>
+    <dates>
+      <discovery>2014-02-20</discovery>
+      <entry>2014-02-24</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="42d42090-9a4d-11e3-b029-08002798f6ff">
+    <topic>PostgreSQL -- multiple privilege issues</topic>
+    <affects>
+      <package>
+	<name>postgresql-server</name>
+	<range><lt>8.4.20</lt></range>
+	<range><ge>9.0.0</ge><lt>9.0.16</lt></range>
+	<range><ge>9.1.0</ge><lt>9.1.12</lt></range>
+	<range><ge>9.2.0</ge><lt>9.2.7</lt></range>
+	<range><ge>9.3.0</ge><lt>9.3.3</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>PostgreSQL Project reports:</p>
+	<blockquote cite="http://www.postgresql.org/about/news/1506/">;
+	  <p>This update fixes CVE-2014-0060, in which PostgreSQL did not
+	  properly enforce the WITH ADMIN OPTION permission for ROLE management.
+	  Before this fix, any member of a ROLE was able to grant others access
+	  to the same ROLE regardless if the member was given the WITH ADMIN
+	  OPTION permission. It also fixes multiple privilege escalation issues,
+	  including: CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064,
+	  CVE-2014-0065, and CVE-2014-0066. More information on these issues can
+	  be found on our security page and the security issue detail wiki page.
+	 </p>
+	 <p>
+	  With this release, we are also alerting users to a known security hole
+	  that allows other users on the same machine to gain access to an
+	  operating system account while it is doing "make check":
+	  CVE-2014-0067. "Make check" is normally part of building PostgreSQL
+	  from source code. As it is not possible to fix this issue without
+	  causing significant issues to our testing infrastructure, a patch will
+	  be released separately and publicly. Until then, users are strongly
+	  advised not to run "make check" on machines where untrusted users have
+	  accounts.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2014-0060</cvename>
+      <cvename>CVE-2014-0061</cvename>
+      <cvename>CVE-2014-0062</cvename>
+      <cvename>CVE-2014-0063</cvename>
+      <cvename>CVE-2014-0064</cvename>
+      <cvename>CVE-2014-0065</cvename>
+      <cvename>CVE-2014-0066</cvename>
+      <cvename>CVE-2014-0067</cvename>
+    </references>
+    <dates>
+      <discovery>2014-02-20</discovery>
+      <entry>2014-02-20</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="0871d18b-9638-11e3-a371-6805ca0b3d42">
+    <topic>phpMyAdmin -- Self-XSS due to unescaped HTML output in import.</topic>
+    <affects>
+      <package>
+	<name>phpMyAdmin</name>
+	<range><ge>3.3.1</ge><lt>4.1.7</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The phpMyAdmin development team reports:</p>
+	<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-1.php">;
+	  <p> When importing a file with crafted filename, it is
+	    possible to trigger an XSS.  We consider this vulnerability
+	    to be non critical.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-1.php</url>;
+      <cvename>CVE-2014-1879</cvename>
+    </references>
+    <dates>
+      <discovery>2014-02-15</discovery>
+      <entry>2014-02-15</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="3e0507c6-9614-11e3-b3a5-00e0814cab4e">
     <topic>jenkins -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201402241332.s1ODWWaj032304>