mirror of
https://git.FreeBSD.org/ports.git
synced 2024-11-21 00:25:50 +00:00
Document new vulnerabilities in www/chromium < 36.0.1985.143
Submitted by: Carlos Jacobo Puga Media <cpm@fbsd.es> Obtained from: http://googlechromereleases.blogspot.nl/ MFH: 2014Q3
This commit is contained in:
parent
c82202f3ae
commit
bd5028c8d0
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=364755
@ -57,6 +57,42 @@ Notes:
|
||||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="df7754c0-2294-11e4-b505-000c6e25e3e9">
|
||||
<topic>chromium -- multiple vulnerabilities</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>chromium</name>
|
||||
<range><lt>36.0.1985.143</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Google Chrome Releases reports:</p>
|
||||
<blockquote cite="http://googlechromereleases.blogspot.nl">
|
||||
<p>12 security fixes in this release, including</p>
|
||||
<ul>
|
||||
<li>[390174] High CVE-2014-3165: Use-after-free in web sockets.
|
||||
Credit to Collin Payne.</li>
|
||||
<li>[398925] High CVE-2014-3166: Information disclosure in SPDY.
|
||||
Credit to Antoine Delignat-Lavaud.</li>
|
||||
<li>[400950] CVE-2014-3167: Various fixes from internal audits,
|
||||
fuzzing and other initiatives.</li>
|
||||
</ul>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CVE-2014-3165</cvename>
|
||||
<cvename>CVE-2014-3166</cvename>
|
||||
<cvename>CVE-2014-3167</cvename>
|
||||
<url>http://googlechromereleases.blogspot.nl</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2014-08-12</discovery>
|
||||
<entry>2014-08-13</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="69048656-2187-11e4-802c-20cf30e32f6d">
|
||||
<topic>serf -- SSL Certificate Null Byte Poisoning</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user