Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 18 Sep 2020 09:26:23 +0000 (UTC)
From:      Matthias Andree <mandree@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r548878 - head/security/vuxml
Message-ID:  <202009180926.08I9QNPE058327@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: mandree
Date: Fri Sep 18 09:26:23 2020
New Revision: 548878
URL: https://svnweb.freebsd.org/changeset/ports/548878

Log:
  www/webkit2-gtk3: Multiple Vulnerabilities (vuxml entry)
  
  PR:		247892
  Submitted by:	rob2g2 <spam123@bitbert.com>
  Security:	CVE-2020-9802
  Security:	CVE-2020-9803
  Security:	CVE-2020-9805
  Security:	CVE-2020-9806
  Security:	CVE-2020-9807
  Security:	CVE-2020-9843
  Security:	CVE-2020-9850
  Security:	CVE-2020-13753

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Sep 18 08:01:37 2020	(r548877)
+++ head/security/vuxml/vuln.xml	Fri Sep 18 09:26:23 2020	(r548878)
@@ -58,6 +58,48 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="efd03116-c2a9-11ea-82bc-b42e99a1b9c3">
+    <topic>webkit2-gtk3 -- multible vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>webkit2-gtk3</name>
+	<range><lt>2.28.3</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The WebKitGTK project reports vulnerabilities:</p>
+	<blockquote cite="https://webkitgtk.org/security/WSA-2020-0006.html">;
+	  <ul>
+      <li>CVE-2020-9802: Processing maliciously crafted web content may lead to arbitrary code execution.</li>
+      <li>CVE-2020-9803: Processing maliciously crafted web content may lead to arbitrary code execution.</li>
+      <li>CVE-2020-9805: Processing maliciously crafted web content may lead to universal cross site scripting.</li>
+      <li>CVE-2020-9806: Processing maliciously crafted web content may lead to arbitrary code execution.</li>
+      <li>CVE-2020-9807: Processing maliciously crafted web content may lead to arbitrary code execution.</li>
+      <li>CVE-2020-9843: Processing maliciously crafted web content may lead to a cross site scripting attack.</li>
+      <li>CVE-2020-9850: A remote attacker may be able to cause arbitrary code execution.</li>
+      <li>CVE-2020-13753: CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal’s input buffer.</li>
+      </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://webkitgtk.org/security/WSA-2020-0006.html</url>;
+      <cvename>CVE-2020-9802</cvename>
+      <cvename>CVE-2020-9803</cvename>
+      <cvename>CVE-2020-9805</cvename>
+      <cvename>CVE-2020-9806</cvename>
+      <cvename>CVE-2020-9807</cvename>
+      <cvename>CVE-2020-9843</cvename>
+      <cvename>CVE-2020-9850</cvename>
+      <cvename>CVE-2020-13753</cvename>
+    </references>
+    <dates>
+      <discovery>2020-07-10</discovery>
+      <entry>2020-07-10</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="4ca5894c-f7f1-11ea-8ff8-0022489ad614">
     <topic>Node.js -- September 2020 Security Releases</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202009180926.08I9QNPE058327>