aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRene Ladan <rene@FreeBSD.org>2014-06-11 08:30:01 +0000
committerRene Ladan <rene@FreeBSD.org>2014-06-11 08:30:01 +0000
commitb8bfc20b5c83fd58f61d66c989a46589c1d7fd58 (patch)
treea4f350b0b225e8440a3d865230c7b4d6cf56cb45
parentbc37a4a795b384ad9fd93b69837889e399b619b2 (diff)
downloadports-b8bfc20b5c83fd58f61d66c989a46589c1d7fd58.tar.gz
ports-b8bfc20b5c83fd58f61d66c989a46589c1d7fd58.zip
MFH: r357427
Document new vulnerabilities in www/chromium < 35.0.1916.153 Submitted by: Carlos Jacobo Puga Medina <cpm@fbsd.es> Obtained from: http://www.googlechromereleases.blogspot.nl/ Also merge entries for mozilla, openssl, gnutls (2), mumble (2), and linux-flashplugin Approved by: portmgr (erwin)
Notes
Notes: svn path=/branches/2014Q2/; revision=357430
-rw-r--r--security/vuxml/vuln.xml314
1 files changed, 314 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index a8e4d5a82914..b630b628f4dc 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,320 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="0b0fb9b0-f0fb-11e3-9bcd-000c6e25e3e9">
+ <topic>chromium -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <range><lt>35.0.1916.153</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Google Chrome Releases reports:</p>
+ <blockquote cite="http://googlechromereleases.blogspot.nl">
+ <p>4 security fixes in this release, including:</p>
+ <ul>
+ <li>[369525] High CVE-2014-3154: Use-after-free in filesystem api. Credit
+ to Collin Payne.</li>
+ <li>[369539] High CVE-2014-3155: Out-if-bounds read in SPDY. Credit
+ to James March, Daniel Sommermann and Alan Frindell of Facebook.</li>
+ <li>[369621] Medium CVE-2014-3156: Buffer overflow in clipboard. Credit
+ to Atte Kettunen of OUSPG.</li>
+ <li>[368980] CVE-2014-3157: Heap overflow in media.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-3154</cvename>
+ <cvename>CVE-2014-3155</cvename>
+ <cvename>CVE-2014-3156</cvename>
+ <cvename>CVE-2014-3157</cvename>
+ <url>http://googlechromereleases.blogspot.nl</url>
+ </references>
+ <dates>
+ <discovery>2014-06-10</discovery>
+ <entry>2014-06-10</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="888a0262-f0d9-11e3-ba0c-b4b52fce4ce8">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>30.0,1</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>24.6.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>30.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-thunderbird</name>
+ <range><lt>24.6.0</lt></range>
+ </package>
+ <package>
+ <name>nspr</name>
+ <range><lt>4.10.6</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>24.6.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Mozilla Project reports:</p>
+ <blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
+ <p>MFSA 2014-48 Miscellaneous memory safety hazards
+ (rv:30.0 / rv:24.6)</p>
+ <p>MFSA 2014-49 Use-after-free and out of bounds
+ issues found using Address Sanitizer</p>
+ <p>MFSA 2014-51 Use-after-free in Event Listener
+ Manager</p>
+ <p>MFSA 2014-52 Use-after-free with SMIL Animation
+ Controller</p>
+ <p>MFSA 2014-53 Buffer overflow in Web Audio Speex
+ resampler</p>
+ <p>MFSA 2014-54 Buffer overflow in Gamepad API</p>
+ <p>MFSA 2014-55 Out of bounds write in NSPR</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-1533</cvename>
+ <cvename>CVE-2014-1534</cvename>
+ <cvename>CVE-2014-1536</cvename>
+ <cvename>CVE-2014-1537</cvename>
+ <cvename>CVE-2014-1540</cvename>
+ <cvename>CVE-2014-1541</cvename>
+ <cvename>CVE-2014-1542</cvename>
+ <cvename>CVE-2014-1543</cvename>
+ <cvename>CVE-2014-1545</cvename>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-48.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-49.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-51.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-52.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-53.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-54.html</url>
+ <url>https://www.mozilla.org/security/announce/2014/mfsa2014-55.html</url>
+ </references>
+ <dates>
+ <discovery>2014-06-10</discovery>
+ <entry>2014-06-10</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="5ac53801-ec2e-11e3-9cf3-3c970e169bc2">
+ <topic>OpenSSL -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>openssl</name>
+ <range><ge>1.0.1</ge><lt>1.0.1_13</lt></range>
+ </package>
+ <package>
+ <name>mingw32-openssl</name>
+ <range><ge>1.0.1</ge><lt>1.0.1h</lt></range>
+ </package>
+ <system>
+ <name>FreeBSD</name>
+ <range><ge>8.0</ge><lt>8.4_12</lt></range>
+ <range><ge>9.1</ge><lt>9.1_15</lt></range>
+ <range><ge>9.2</ge><lt>9.2_8</lt></range>
+ <range><ge>10.0</ge><lt>10.0_5</lt></range>
+ </system>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The OpenSSL Project reports:</p>
+ <blockquote cite="http://www.openssl.org/news/secadv_20140605.txt">
+ <p>An attacker using a carefully crafted handshake can force
+ the use of weak keying material in OpenSSL SSL/TLS clients
+ and servers. This can be exploited by a Man-in-the-middle
+ (MITM) attack where the attacker can decrypt and modify
+ traffic from the attacked client and server. [CVE-2014-0224]</p>
+ <p>By sending an invalid DTLS handshake to an OpenSSL DTLS
+ client the code can be made to recurse eventually crashing
+ in a DoS attack. [CVE-2014-0221]</p>
+ <p>A buffer overrun attack can be triggered by sending invalid
+ DTLS fragments to an OpenSSL DTLS client or server. This is
+ potentially exploitable to run arbitrary code on a vulnerable
+ client or server. [CVE-2014-0195]</p>
+ <p>OpenSSL TLS clients enabling anonymous ECDH ciphersuites are
+ subject to a denial of service attack. [CVE-2014-3470]</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-0195</cvename>
+ <cvename>CVE-2014-0221</cvename>
+ <cvename>CVE-2014-0224</cvename>
+ <cvename>CVE-2014-3470</cvename>
+ <url>http://www.freebsd.org/security/advisories/FreeBSD-SA-14:14.openssl.asc</url>
+ <url>http://www.openssl.org/news/secadv_20140605.txt</url>
+ </references>
+ <dates>
+ <discovery>2014-06-05</discovery>
+ <entry>2014-06-05</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="9733c480-ebff-11e3-970b-206a8a720317">
+ <topic>gnutls -- client-side memory corruption</topic>
+ <affects>
+ <package>
+ <name>gnutls</name>
+ <range><lt>2.12.23_6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>GnuTLS project reports:</p>
+ <blockquote cite="www.gnutls.org/security.html#GNUTLS-SA-2014-3">
+ <p>This vulnerability affects the client side of the gnutls library.
+ A server that sends a specially crafted ServerHello could corrupt
+ the memory of a requesting client.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-3466</cvename>
+ <url>http://www.gnutls.org/security.html#GNUTLS-SA-2014-3</url>
+ </references>
+ <dates>
+ <discovery>2014-05-14</discovery>
+ <entry>2014-06-04</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="027af74d-eb56-11e3-9032-000c2980a9f3">
+ <topic>gnutls -- client-side memory corruption</topic>
+ <affects>
+ <package>
+ <name>gnutls3</name>
+ <range><ge>3.1</ge><lt>3.1.25</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>GnuTLS project reports:</p>
+ <blockquote cite="www.gnutls.org/security.html#GNUTLS-SA-2014-3">
+ <p>This vulnerability affects the client side of the gnutls library.
+ A server that sends a specially crafted ServerHello could corrupt
+ the memory of a requesting client.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-3466</cvename>
+ <url>http://www.gnutls.org/security.html#GNUTLS-SA-2014-3</url>
+ </references>
+ <dates>
+ <discovery>2014-05-14</discovery>
+ <entry>2014-06-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="77e2e631-e742-11e3-9a25-5404a6a6412c">
+ <topic>mumble -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mumble</name>
+ <range><ge>1.2.0</ge><lt>1.2.6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mumble reports:</p>
+ <blockquote cite="http://blog.mumble.info/mumble-1-2-6/">
+ <p>SVG images with local file references could trigger client DoS</p>
+ <p>The Mumble client did not properly HTML-escape some external strings
+ before using them in a rich-text (HTML) context.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://mumble.info/security/Mumble-SA-2014-005.txt</url>
+ <url>http://mumble.info/security/Mumble-SA-2014-006.txt</url>
+ </references>
+ <dates>
+ <discovery>2014-04-16</discovery>
+ <entry>2014-05-29</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c2c8c84b-e734-11e3-9a25-5404a6a6412c">
+ <topic>mumble -- NULL pointer dereference and heap-based buffer overflow</topic>
+ <affects>
+ <package>
+ <name>mumble</name>
+ <range><ge>1.2.4</ge><le>1.2.4_6</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mumble reports:</p>
+ <blockquote cite="http://blog.mumble.info/mumble-1-2-5/">
+ <p>A malformed Opus voice packet sent to a Mumble client could trigger
+ a NULL pointer dereference or an out-of-bounds array access.</p>
+ <p>A malformed Opus voice packet sent to a Mumble client could trigger a
+ heap-based buffer overflow.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-0044</cvename>
+ <cvename>CVE-2014-0045</cvename>
+ <url>http://mumble.info/security/Mumble-SA-2014-001.txt</url>
+ <url>http://mumble.info/security/Mumble-SA-2014-002.txt</url>
+ </references>
+ <dates>
+ <discovery>2014-01-25</discovery>
+ <entry>2014-05-29</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="f99a4686-e694-11e3-9032-000c2980a9f3">
+ <cancelled/>
+ </vuln>
+
+ <vuln vid="688e73a2-e514-11e3-a52a-98fc11cdc4f5">
+ <topic>linux-flashplugin -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>linux-f10-flashplugin</name>
+ <range><lt>11.2r202.359</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Adobe reports:</p>
+ <blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb14-14.html">
+ <p>These updates address vulnerabilities that could cause a crash
+ and potentially allow an attacker to take control of the affected system.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-0510</cvename>
+ <cvename>CVE-2014-0516</cvename>
+ <cvename>CVE-2014-0517</cvename>
+ <cvename>CVE-2014-0518</cvename>
+ <cvename>CVE-2014-0519</cvename>
+ <cvename>CVE-2014-0520</cvename>
+ <url>https://helpx.adobe.com/security/products/flash-player/apsb14-14.html</url>
+ </references>
+ <dates>
+ <discovery>2014-03-13</discovery>
+ <entry>2014-05-26</entry>
+ </dates>
+ </vuln>
+
<vuln vid="02db20d7-e34a-11e3-bd92-bcaec565249c">
<topic>openjpeg -- Multiple vulnabilities</topic>
<affects>