mirror of
https://git.FreeBSD.org/ports.git
synced 2024-10-20 20:09:11 +00:00
www/webkit2-gtk3: Multiple Vulnerabilities (vuxml entry)
PR: 247892 Submitted by: rob2g2 <spam123@bitbert.com> Security: CVE-2020-9802 Security: CVE-2020-9803 Security: CVE-2020-9805 Security: CVE-2020-9806 Security: CVE-2020-9807 Security: CVE-2020-9843 Security: CVE-2020-9850 Security: CVE-2020-13753
This commit is contained in:
parent
39b2eac7fd
commit
9ad5dcaf07
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=548878
@ -58,6 +58,48 @@ Notes:
|
||||
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="efd03116-c2a9-11ea-82bc-b42e99a1b9c3">
|
||||
<topic>webkit2-gtk3 -- multible vulnerabilities</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>webkit2-gtk3</name>
|
||||
<range><lt>2.28.3</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>The WebKitGTK project reports vulnerabilities:</p>
|
||||
<blockquote cite="https://webkitgtk.org/security/WSA-2020-0006.html">
|
||||
<ul>
|
||||
<li>CVE-2020-9802: Processing maliciously crafted web content may lead to arbitrary code execution.</li>
|
||||
<li>CVE-2020-9803: Processing maliciously crafted web content may lead to arbitrary code execution.</li>
|
||||
<li>CVE-2020-9805: Processing maliciously crafted web content may lead to universal cross site scripting.</li>
|
||||
<li>CVE-2020-9806: Processing maliciously crafted web content may lead to arbitrary code execution.</li>
|
||||
<li>CVE-2020-9807: Processing maliciously crafted web content may lead to arbitrary code execution.</li>
|
||||
<li>CVE-2020-9843: Processing maliciously crafted web content may lead to a cross site scripting attack.</li>
|
||||
<li>CVE-2020-9850: A remote attacker may be able to cause arbitrary code execution.</li>
|
||||
<li>CVE-2020-13753: CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal’s input buffer.</li>
|
||||
</ul>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<url>https://webkitgtk.org/security/WSA-2020-0006.html</url>
|
||||
<cvename>CVE-2020-9802</cvename>
|
||||
<cvename>CVE-2020-9803</cvename>
|
||||
<cvename>CVE-2020-9805</cvename>
|
||||
<cvename>CVE-2020-9806</cvename>
|
||||
<cvename>CVE-2020-9807</cvename>
|
||||
<cvename>CVE-2020-9843</cvename>
|
||||
<cvename>CVE-2020-9850</cvename>
|
||||
<cvename>CVE-2020-13753</cvename>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2020-07-10</discovery>
|
||||
<entry>2020-07-10</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="4ca5894c-f7f1-11ea-8ff8-0022489ad614">
|
||||
<topic>Node.js -- September 2020 Security Releases</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user