svn commit: r548878 - head/security/vuxml
Matthias Andree
mandree at FreeBSD.org
Fri Sep 18 09:26:24 UTC 2020
Author: mandree
Date: Fri Sep 18 09:26:23 2020
New Revision: 548878
URL: https://svnweb.freebsd.org/changeset/ports/548878
Log:
www/webkit2-gtk3: Multiple Vulnerabilities (vuxml entry)
PR: 247892
Submitted by: rob2g2 <spam123 at bitbert.com>
Security: CVE-2020-9802
Security: CVE-2020-9803
Security: CVE-2020-9805
Security: CVE-2020-9806
Security: CVE-2020-9807
Security: CVE-2020-9843
Security: CVE-2020-9850
Security: CVE-2020-13753
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri Sep 18 08:01:37 2020 (r548877)
+++ head/security/vuxml/vuln.xml Fri Sep 18 09:26:23 2020 (r548878)
@@ -58,6 +58,48 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="efd03116-c2a9-11ea-82bc-b42e99a1b9c3">
+ <topic>webkit2-gtk3 -- multible vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>webkit2-gtk3</name>
+ <range><lt>2.28.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The WebKitGTK project reports vulnerabilities:</p>
+ <blockquote cite="https://webkitgtk.org/security/WSA-2020-0006.html">
+ <ul>
+ <li>CVE-2020-9802: Processing maliciously crafted web content may lead to arbitrary code execution.</li>
+ <li>CVE-2020-9803: Processing maliciously crafted web content may lead to arbitrary code execution.</li>
+ <li>CVE-2020-9805: Processing maliciously crafted web content may lead to universal cross site scripting.</li>
+ <li>CVE-2020-9806: Processing maliciously crafted web content may lead to arbitrary code execution.</li>
+ <li>CVE-2020-9807: Processing maliciously crafted web content may lead to arbitrary code execution.</li>
+ <li>CVE-2020-9843: Processing maliciously crafted web content may lead to a cross site scripting attack.</li>
+ <li>CVE-2020-9850: A remote attacker may be able to cause arbitrary code execution.</li>
+ <li>CVE-2020-13753: CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal’s input buffer.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://webkitgtk.org/security/WSA-2020-0006.html</url>
+ <cvename>CVE-2020-9802</cvename>
+ <cvename>CVE-2020-9803</cvename>
+ <cvename>CVE-2020-9805</cvename>
+ <cvename>CVE-2020-9806</cvename>
+ <cvename>CVE-2020-9807</cvename>
+ <cvename>CVE-2020-9843</cvename>
+ <cvename>CVE-2020-9850</cvename>
+ <cvename>CVE-2020-13753</cvename>
+ </references>
+ <dates>
+ <discovery>2020-07-10</discovery>
+ <entry>2020-07-10</entry>
+ </dates>
+ </vuln>
+
<vuln vid="4ca5894c-f7f1-11ea-8ff8-0022489ad614">
<topic>Node.js -- September 2020 Security Releases</topic>
<affects>
More information about the svn-ports-all
mailing list