Date: Tue, 25 Jul 2017 18:17:21 +0000 (UTC) From: Koop Mast <kwm@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r446617 - head/security/vuxml Message-ID: <201707251817.v6PIHLgI020225@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: kwm Date: Tue Jul 25 18:17:21 2017 New Revision: 446617 URL: https://svnweb.freebsd.org/changeset/ports/446617 Log: Document webkit2-gtk3 CVE's Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Jul 25 17:52:35 2017 (r446616) +++ head/security/vuxml/vuln.xml Tue Jul 25 18:17:21 2017 (r446617) @@ -58,6 +58,224 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="0f66b901-715c-11e7-ad1f-bcaec565249c"> + <topic>webkit2-gtk3 -- multiple vulnabilities</topic> + <affects> + <package> + <name>webkit2-gtk3</name> + <range><lt>2.16.6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Webkit gtk team reports:</p> + <blockquote cite="https://webkitgtk.org/security/WSA-2017-0006.html"> + <p>CVE-2017-7006: Versions affected: WebKitGTK+ before 2.16.2.<br/> + Credit to David Kohlbrenner of UC San Diego, an anonymous + researcher.<br/> + Impact: A malicious website may exfiltrate data cross-origin. + Description: Processing maliciously crafted web content may + allow cross-origin data to be exfiltrated by using SVG filters + to conduct a timing side-channel attack. This issue was addressed by not painting the cross-origin buffer into the frame that gets filtered.</p> + + <p>CVE-2017-7011: Versions affected: WebKitGTK+ before 2.16.3.<br/> + Credit to xisigr of Tencent’s Xuanwu Lab (tencent.com).<br/> + Impact: Visiting a malicious website may lead to address bar + spoofing. Description: A state management issue was addressed + with improved frame handling.</p> + + <p>CVE-2017-7012: Versions affected: WebKitGTK+ before 2.16.2.<br/> + Credit to Apple.<br/> + Impact: Processing maliciously crafted web content may lead to + arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7018: Versions affected: WebKitGTK+ before 2.16.6.<br/> + Credit to lokihardt of Google Project Zero.<br/> + Impact: Processing maliciously crafted web content may lead to + arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7019: Versions affected: WebKitGTK+ before 2.16.2.<br/> + Credit to Zhiyang Zeng of Tencent Security Platform Department.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7020: Versions affected: WebKitGTK+ before 2.16.1.<br/> + Credit to likemeng of Baidu Security Lab.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7030: Versions affected: WebKitGTK+ before 2.16.6.<br/> + Credit to chenqin of Ant-financial Light-Year Security Lab + (蚂蚁金服巴斯光年安全实验室).<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7034: Versions affected: WebKitGTK+ before 2.16.6.<br/> + Credit to chenqin of Ant-financial Light-Year Security Lab + (蚂蚁金服巴斯光年安全实验室).<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7037: Versions affected: WebKitGTK+ before 2.16.6.<br/> + Credit to lokihardt of Google Project Zero.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7038: Versions affected: WebKitGTK+ before 2.16.2.<br/> + Credit to Neil Jenkins of FastMail Pty Ltd, Egor Karbutov + (@ShikariSenpai) of Digital Security and Egor Saltykov + (@ansjdnakjdnajkd) of Digital Security.<br/> + Impact: Processing maliciously crafted web content with + DOMParser may lead to cross site scripting. Description: + A logic issue existed in the handling of DOMParser. This + issue was addressed with improved state management.</p> + + <p>CVE-2017-7039: Versions affected: WebKitGTK+ before 2.16.6.<br/> + Credit to Ivan Fratric of Google Project Zero.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7040: Versions affected: WebKitGTK+ before 2.16.3.<br/> + Credit to Ivan Fratric of Google Project Zero.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7041: Versions affected: WebKitGTK+ before 2.16.2.<br/> + Credit to Ivan Fratric of Google Project Zero.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7042: Versions affected: WebKitGTK+ before 2.16.2.<br/> + Credit to Ivan Fratric of Google Project Zero.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7043: Versions affected: WebKitGTK+ before 2.16.2.<br/> + Credit to Ivan Fratric of Google Project Zero.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7046: Versions affected: WebKitGTK+ before 2.16.6.<br/> + Credit to Ivan Fratric of Google Project Zero.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7048: Versions affected: WebKitGTK+ before 2.16.6.<br/> + Credit to Ivan Fratric of Google Project Zero.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7049: Versions affected: WebKitGTK+ before 2.16.2.<br/> + Credit to Ivan Fratric of Google Project Zero.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed through improved memory + handling.</p> + + <p>CVE-2017-7052: Versions affected: WebKitGTK+ before 2.16.4.<br/> + Credit to cc working with Trend Micro’s Zero Day Initiative.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7055: Versions affected: WebKitGTK+ before 2.16.6.<br/> + Credit to The UK’s National Cyber Security Centre (NCSC).<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7056: Versions affected: WebKitGTK+ before 2.16.6.<br/> + Credit to lokihardt of Google Project Zero.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7059: Versions affected: WebKitGTK+ before 2.16.3.<br/> + Credit to an anonymous researcher.<br/> + Impact: Processing maliciously crafted web content with + DOMParser may lead to cross site scripting. Description: + A logic issue existed in the handling of DOMParser. This + issue was addressed with improved state management.</p> + + <p>CVE-2017-7061: Versions affected: WebKitGTK+ before 2.16.6.<br/> + Credit to lokihardt of Google Project Zero.<br/> + Impact: Processing maliciously crafted web content may lead + to arbitrary code execution. Description: Multiple memory + corruption issues were addressed with improved memory + handling.</p> + + <p>CVE-2017-7064: Versions affected: WebKitGTK+ before 2.16.6.<br/> + Credit to lokihardt of Google Project Zero.<br/> + Impact: An application may be able to read restricted + memory. Description: A memory initialization issue was + addressed through improved memory handling.</p> + </blockquote> + </body> + </description> + <references> + <url>https://webkitgtk.org/security/WSA-2017-0006.html</url> + <cvename>CVE-2017-7006</cvename> + <cvename>CVE-2017-7011</cvename> + <cvename>CVE-2017-7012</cvename> + <cvename>CVE-2017-7018</cvename> + <cvename>CVE-2017-7019</cvename> + <cvename>CVE-2017-7020</cvename> + <cvename>CVE-2017-7030</cvename> + <cvename>CVE-2017-7034</cvename> + <cvename>CVE-2017-7037</cvename> + <cvename>CVE-2017-7038</cvename> + <cvename>CVE-2017-7039</cvename> + <cvename>CVE-2017-7040</cvename> + <cvename>CVE-2017-7041</cvename> + <cvename>CVE-2017-7042</cvename> + <cvename>CVE-2017-7043</cvename> + <cvename>CVE-2017-7046</cvename> + <cvename>CVE-2017-7048</cvename> + <cvename>CVE-2017-7049</cvename> + <cvename>CVE-2017-7052</cvename> + <cvename>CVE-2017-7055</cvename> + <cvename>CVE-2017-7056</cvename> + <cvename>CVE-2017-7059</cvename> + <cvename>CVE-2017-7061</cvename> + <cvename>CVE-2017-7064</cvename> + </references> + <dates> + <discovery>2017-07-24</discovery> + <entry>2017-07-25</entry> + </dates> + </vuln> + <vuln vid="8745c67e-7dd1-4165-96e2-fcf9da2dc5b5"> <topic>gsoap -- remote code execution via via overflow</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201707251817.v6PIHLgI020225>