FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-27 18:04:16 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
41fe4724-06a2-11e7-8e3e-5453ed2e2b49kde-runtime -- kdesu: displayed command truncated by unicode string terminator

Albert Aastals Cid reports:

A maliciously crafted command line for kdesu can result in the user only seeing part of the commands that will actually get executed as super user.


Discovery 2016-09-30
Entry 2017-03-11
kde-runtime
< 4.14.3_5

CVE-2016-7787
http://www.openwall.com/lists/oss-security/2016/09/29/7
https://www.kde.org/info/security/advisory-20160930-1.txt
890b6b22-70fa-11e4-91ae-5453ed2e2b49kwebkitpart, kde-runtime -- insufficient input validation

Albert Aastals Cid reports:

kwebkitpart and the bookmarks:// io slave were not sanitizing input correctly allowing to some javascript being executed on the context of the referenced hostname.

Whilst in most cases, the JavaScript will be executed in an untrusted context, with the bookmarks IO slave, it will be executed in the context of the referenced hostname. It should however be noted that KDE mitigates this risk by attempting to ensure that such URLs cannot be embedded directly into Internet hosted content.


Discovery 2014-11-13
Entry 2014-11-20
kde-runtime
< 4.14.2_2

kwebkitpart
< 1.3.2_4

https://www.kde.org/info/security/advisory-20141113-1.txt
CVE-2014-8600
7a8a74d1-9c34-11e4-a40b-5453ed2e2b49kde-runtime -- incorrect CBC encryption handling

Valentin Rusu reports:

Until KDE Applications 14.12.0, kwalletd incorrectly handled CBC encryption blocks when encrypting secrets in kwl files. The secrets were still encrypted, but the result binary data corresponded to an ECB encrypted block instead of CBC.

The ECB encryption algorithm, even if it'll scramble user data, will produce same encrypted byte sequence for the same input text. As a result, attackers may eventually find-out the encrypted text.


Discovery 2015-01-09
Entry 2015-01-14
kde-runtime
< 4.12_3

CVE-2013-7252
https://www.kde.org/info/security/advisory-20150109-1.txt