Date: Fri, 18 Sep 2020 09:26:23 +0000 (UTC) From: Matthias Andree <mandree@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r548878 - head/security/vuxml Message-ID: <202009180926.08I9QNPE058327@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: mandree Date: Fri Sep 18 09:26:23 2020 New Revision: 548878 URL: https://svnweb.freebsd.org/changeset/ports/548878 Log: www/webkit2-gtk3: Multiple Vulnerabilities (vuxml entry) PR: 247892 Submitted by: rob2g2 <spam123@bitbert.com> Security: CVE-2020-9802 Security: CVE-2020-9803 Security: CVE-2020-9805 Security: CVE-2020-9806 Security: CVE-2020-9807 Security: CVE-2020-9843 Security: CVE-2020-9850 Security: CVE-2020-13753 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Sep 18 08:01:37 2020 (r548877) +++ head/security/vuxml/vuln.xml Fri Sep 18 09:26:23 2020 (r548878) @@ -58,6 +58,48 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="efd03116-c2a9-11ea-82bc-b42e99a1b9c3"> + <topic>webkit2-gtk3 -- multible vulnerabilities</topic> + <affects> + <package> + <name>webkit2-gtk3</name> + <range><lt>2.28.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The WebKitGTK project reports vulnerabilities:</p> + <blockquote cite="https://webkitgtk.org/security/WSA-2020-0006.html"> + <ul> + <li>CVE-2020-9802: Processing maliciously crafted web content may lead to arbitrary code execution.</li> + <li>CVE-2020-9803: Processing maliciously crafted web content may lead to arbitrary code execution.</li> + <li>CVE-2020-9805: Processing maliciously crafted web content may lead to universal cross site scripting.</li> + <li>CVE-2020-9806: Processing maliciously crafted web content may lead to arbitrary code execution.</li> + <li>CVE-2020-9807: Processing maliciously crafted web content may lead to arbitrary code execution.</li> + <li>CVE-2020-9843: Processing maliciously crafted web content may lead to a cross site scripting attack.</li> + <li>CVE-2020-9850: A remote attacker may be able to cause arbitrary code execution.</li> + <li>CVE-2020-13753: CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal’s input buffer.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <url>https://webkitgtk.org/security/WSA-2020-0006.html</url> + <cvename>CVE-2020-9802</cvename> + <cvename>CVE-2020-9803</cvename> + <cvename>CVE-2020-9805</cvename> + <cvename>CVE-2020-9806</cvename> + <cvename>CVE-2020-9807</cvename> + <cvename>CVE-2020-9843</cvename> + <cvename>CVE-2020-9850</cvename> + <cvename>CVE-2020-13753</cvename> + </references> + <dates> + <discovery>2020-07-10</discovery> + <entry>2020-07-10</entry> + </dates> + </vuln> + <vuln vid="4ca5894c-f7f1-11ea-8ff8-0022489ad614"> <topic>Node.js -- September 2020 Security Releases</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202009180926.08I9QNPE058327>