From nobody Tue Jan 30 00:41:44 2024 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TP5vr4YHGz57pMb; Tue, 30 Jan 2024 00:41:44 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TP5vr3Rvmz41Vf; Tue, 30 Jan 2024 00:41:44 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1706575304; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=h2XNcw5FGn7MnmgYVFA6tGq2OZgNuPLPV0yYXKHHINQ=; b=S1jK14EbDVucuT1vvb4x6CVXIV9Wh5MYuHVy0g9Q1Zq9flwaJVzn1Kil7Rze2j7xS59SW2 PEBa7I4Rb+cR71VF4/JATnY3RVWaSKnBH37gJpATn54wuCX8YwTqmvgYESIjuojsYNlG3+ GsLyjy9L/HChhaOtONtjVagIs5IXxAsBgHffon/vDbvmCMltd3gqDUEGYbzwtbb3zkO60w 0L2MMNZCIJpqRKd8+VVVsFHz78O/k6xxp8lp+mKZPDeiCiNEX/+nOZ4sOyNvgqSb46qv2r GklO3ELOxroVpXmLz98lelm6MXZxBDEp6xr34+zVVlAsp86gZb7Lpf1Ypb6ODg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1706575304; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=h2XNcw5FGn7MnmgYVFA6tGq2OZgNuPLPV0yYXKHHINQ=; b=DTsg8u0NmKtHAhc+PqVqdfjTiB8uvMVkin0tf4NTthIcgUOgV0VCg96mIcbPuy/OZc1XGS gjlSPahPlTPH5VvBd3M322Lj54chTWe4b/twqA3735GfxFmVzM/smT3w/jZ//5iIx0zYsj qJouIbl5XaiJYspBo5SqG0JNVPbNSrsNhryrNMO/v65VLNb4Xpnm/me04frfrW+eY8PRuM qCxiaPty9fxBVOl73r2Y/irqxJlI+LYnHixo2TJ+z3qPdaB03RFCLWzuul8AHOP7bV/8oU NMxAh59a55UOeIHh7m0Cc68FcO41+DP1okoMSopcTy2UqN2cJ83k9k6h0taXiA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1706575304; a=rsa-sha256; cv=none; b=u4ovWh4RxK0cAcehaOiuKODFeIpkmbcFBLxngAui5TEy30lQo/OmRWnqdfs9iCqBoMVWIk scp3pQwbO5vcNwA8A/bLD8v/9aUKrUOqZqwx2Dp8rdQikSnEkmVvTIatVewQ02fBdYKI3J dr9L10ChiJI81HFDjWttvr6+zETbtDsGisorTkMmEmPuykMuAZGvReJtauxWUsvxNaXzJ8 JUN1oGsl9rj3ZQF4ByHcwUltec1n0M106KOyyvW4vUxJaQUvd0BOvA7h1qsJ+wWFjioqfU ptFknsAhPIGcxjAs15cP7fwkNGeKlTJ2diEQ9p16hb360CG8DcbAzQrs2stgkg== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4TP5vr1h4dzDyc; Tue, 30 Jan 2024 00:41:44 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 40U0fi2c026450; Tue, 30 Jan 2024 00:41:44 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 40U0fiEj026447; Tue, 30 Jan 2024 00:41:44 GMT (envelope-from git) Date: Tue, 30 Jan 2024 00:41:44 GMT Message-Id: <202401300041.40U0fiEj026447@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: "Jason E. Hale" Subject: git: 72702c707b1b - main - security/vuxml: Document qt(5|6)-webengine vulnerabilities List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: jhale X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 72702c707b1b55cfdd9b6cf35d4f7286d73ce16d Auto-Submitted: auto-generated The branch main has been updated by jhale: URL: https://cgit.FreeBSD.org/ports/commit/?id=72702c707b1b55cfdd9b6cf35d4f7286d73ce16d commit 72702c707b1b55cfdd9b6cf35d4f7286d73ce16d Author: Jason E. Hale AuthorDate: 2024-01-30 00:31:04 +0000 Commit: Jason E. Hale CommitDate: 2024-01-30 00:41:36 +0000 security/vuxml: Document qt(5|6)-webengine vulnerabilities --- security/vuxml/vuln/2024.xml | 100 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 100 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index cce37a2872b2..190cd8118f16 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,103 @@ + + qt6-webengine -- Multiple vulnerabilities + + + qt6-webengine + 6.6.1_3 + + + + +

Qt qtwebengine-chromium repo reports:

+
+

Backports for 15 security bugs in Chromium:

+
    +
  • [1505053] High CVE-2023-6345: Integer overflow in Skia
  • +
  • [1500856] High CVE-2023-6346: Use after free in WebAudio
  • +
  • [1494461] High CVE-2023-6347: Use after free in Mojo
  • +
  • [1501326] High CVE-2023-6702: Type Confusion in V8
  • +
  • [1502102] High CVE-2023-6703: Use after free in Blink
  • +
  • [1505708] High CVE-2023-6705: Use after free in WebRTC
  • +
  • [1500921] High CVE-2023-6706: Use after free in FedCM
  • +
  • [1513170] High CVE-2023-7024: Heap buffer overflow in WebRTC
  • +
  • [1501798] High CVE-2024-0222: Use after free in ANGLE
  • +
  • [1505009] High CVE-2024-0223: Heap buffer overflow in ANGLE
  • +
  • [1505086] High CVE-2024-0224: Use after free in WebAudio
  • +
  • [1506923] High CVE-2024-0225: Use after free in WebGPU
  • +
  • [1513379] High CVE-2024-0333: Insufficient data validation in Extensions
  • +
  • [1507412] High CVE-2024-0518: Type Confusion in V8
  • +
  • [1517354] High CVE-2024-0519: Out of bounds memory access in V8
  • +
+
+ +
+ + CVE-2023-6345 + CVE-2023-6346 + CVE-2023-6347 + CVE-2023-6702 + CVE-2023-6703 + CVE-2023-6705 + CVE-2023-6706 + CVE-2023-7024 + CVE-2024-0222 + CVE-2024-0223 + CVE-2024-0224 + CVE-2024-0225 + CVE-2024-0333 + CVE-2024-0518 + CVE-2024-0519 + https://code.qt.io/cgit/qt/qtwebengine-chromium.git/log/?h=112-based + + + 2024-01-08 + 2024-01-29 + +
+ + + qt5-webengine -- Multiple vulnerabilities + + + qt5-webengine + 5.15.16.p5_4 + + + + +

Qt qtwebengine-chromium repo reports:

+
+

Backports for 8 security bugs in Chromium:

+
    +
  • [1505053] High CVE-2023-6345: Integer overflow in Skia
  • +
  • [1501326] High CVE-2023-6702: Type Confusion in V8
  • +
  • [1513170] High CVE-2023-7024: Heap buffer overflow in WebRTC
  • +
  • [1501798] High CVE-2024-0222: Use after free in ANGLE
  • +
  • [1505086] High CVE-2024-0224: Use after free in WebAudio
  • +
  • [1513379] High CVE-2024-0333: Insufficient data validation in Extensions
  • +
  • [1507412] High CVE-2024-0518: Type Confusion in V8
  • +
  • [1517354] High CVE-2024-0519: Out of bounds memory access in V8
  • +
+
+ +
+ + CVE-2023-6345 + CVE-2023-6702 + CVE-2023-7024 + CVE-2024-0222 + CVE-2024-0224 + CVE-2024-0333 + CVE-2024-0518 + CVE-2024-0519 + https://code.qt.io/cgit/qt/qtwebengine-chromium.git/log/?h=87-based + + + 2024-01-08 + 2024-01-29 + +
+ rclone -- Multiple vulnerabilities