Date: Fri, 8 Nov 2024 11:24:51 GMT From: Hiroki Tagato <tagattie@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 7ce45b8e01c8 - main - security/vuxml: document electron32 multiple vulnerabilities Message-ID: <202411081124.4A8BOpM2071274@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by tagattie: URL: https://cgit.FreeBSD.org/ports/commit/?id=7ce45b8e01c85a6fdbf1f703e70d05f49843f33c commit 7ce45b8e01c85a6fdbf1f703e70d05f49843f33c Author: Hiroki Tagato <tagattie@FreeBSD.org> AuthorDate: 2024-11-08 11:24:02 +0000 Commit: Hiroki Tagato <tagattie@FreeBSD.org> CommitDate: 2024-11-08 11:24:02 +0000 security/vuxml: document electron32 multiple vulnerabilities Obtained from: https://github.com/electron/electron/releases/tag/v32.2.3 --- security/vuxml/vuln/2024.xml | 38 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index eba9548e4997..9bd7e6da5558 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,41 @@ + <vuln vid="96266fc9-1200-43b5-8393-4c51f54bb7bc"> + <topic>electron32 -- multiple vulnerabilities</topic> + <affects> + <package> + <name>electron32</name> + <range><lt>32.2.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Electron developers report:</p> + <blockquote cite="https://github.com/electron/electron/releases/tag/v32.2.3"> + <p>This update fixes the following vulnerabilities:</p> + <ul> + <li>Security: backported fix for CVE-2024-10230.</li> + <li>Security: backported fix for CVE-2024-10231.</li> + <li>Security: backported fix for CVE-2024-10229.</li> + <li>Security: backported fix for CVE-2024-10487.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-10230</cvename> + <url>https://github.com/advisories/GHSA-g4gj-m346-585c</url> + <cvename>CVE-2024-10231</cvename> + <url>https://github.com/advisories/GHSA-3wfx-mj93-vf8v</url> + <cvename>CVE-2024-10229</cvename> + <url>https://github.com/advisories/GHSA-3hjp-j522-245f</url> + <cvename>CVE-2024-10487</cvename> + <url>https://github.com/advisories/GHSA-h72p-7xmw-gpp8</url> + </references> + <dates> + <discovery>2024-11-08</discovery> + <entry>2024-11-08</entry> + </dates> + </vuln> + <vuln vid="d48a2224-9b4c-11ef-bdd9-4ccc6adda413"> <topic>gstreamer1-rtsp-server -- Potential Denial-of-Service (DoS) with specially crafted client requests</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202411081124.4A8BOpM2071274>