Update vuxml for libxslt vulnerabilities
These vulnerabilities were previously reported by Google as they bundle libxslt with Chrome. When we patched Chromium to address these vulnerabilites it was overlooked that we do not bundle libxslt library with Chromium, but instead use textproc/libxslt. Chromium users have continued to be vulnerable to these CVEs as a result. This update fixes the Chromium CVE entry and adds a separate one for libxslt. PR: 210298 Security: CVE-2016-1683 Security: CVE-2016-1684
This commit is contained in:
parent
ff10e5d3fb
commit
aade2eccbb
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=417173
1 changed files with 33 additions and 6 deletions
|
@ -58,6 +58,38 @@ Notes:
|
|||
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="1a2aa04f-3718-11e6-b3c8-14dae9d210b8">
|
||||
<topic>libxslt -- Denial of Service</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>libxslt</name>
|
||||
<range><lt>1.1.29</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Google reports:</p>
|
||||
<blockquote cite="http://seclists.org/bugtraq/2016/Jun/81">
|
||||
<ul>
|
||||
<li>[583156] Medium CVE-2016-1683: Out-of-bounds access in libxslt.
|
||||
Credit to Nicolas Gregoire.</li>
|
||||
<li>[583171] Medium CVE-2016-1684: Integer overflow in libxslt.
|
||||
Credit to Nicolas Gregoire.</li>
|
||||
</ul>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<url>http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html</url>
|
||||
<cvename>CVE-2016-1683</cvename>
|
||||
<cvename>CVE-2016-1684</cvename>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2016-05-25</discovery>
|
||||
<entry>2016-06-20</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="0e3dfdde-35c4-11e6-8e82-002590263bf5">
|
||||
<topic>flash -- multiple vulnerabilities</topic>
|
||||
<affects>
|
||||
|
@ -1093,10 +1125,6 @@ Notes:
|
|||
Aleksandar Nikolic of Cisco Talos.</li>
|
||||
<li>[579801] Medium CVE-2016-1682: CSP bypass for ServiceWorker.
|
||||
Credit to KingstonTime.</li>
|
||||
<li>[583156] Medium CVE-2016-1683: Out-of-bounds access in libxslt.
|
||||
Credit to Nicolas Gregoire.</li>
|
||||
<li>[583171] Medium CVE-2016-1684: Integer overflow in libxslt.
|
||||
Credit to Nicolas Gregoire.</li>
|
||||
<li>[601362] Medium CVE-2016-1685: Out-of-bounds read in PDFium.
|
||||
Credit to Ke Liu of Tencent's Xuanwu LAB.</li>
|
||||
<li>[603518] Medium CVE-2016-1686: Out-of-bounds read in PDFium.
|
||||
|
@ -1135,8 +1163,6 @@ Notes:
|
|||
<cvename>CVE-2016-1680</cvename>
|
||||
<cvename>CVE-2016-1681</cvename>
|
||||
<cvename>CVE-2016-1682</cvename>
|
||||
<cvename>CVE-2016-1683</cvename>
|
||||
<cvename>CVE-2016-1684</cvename>
|
||||
<cvename>CVE-2016-1685</cvename>
|
||||
<cvename>CVE-2016-1686</cvename>
|
||||
<cvename>CVE-2016-1687</cvename>
|
||||
|
@ -1153,6 +1179,7 @@ Notes:
|
|||
<dates>
|
||||
<discovery>2016-05-25</discovery>
|
||||
<entry>2016-05-28</entry>
|
||||
<modified>2016-06-20</modified>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
|
|
Loading…
Reference in a new issue