FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-28 15:43:32 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
5b0ae405-cdc7-11ed-bb39-901b0e9408dcMatrix clients -- Prototype pollution in matrix-js-sdk

Matrix developers report:

Today we are issuing security releases of matrix-js-sdk and matrix-react-sdk to patch a pair of High severity vulnerabilities (CVE-2023-28427 / GHSA-mwq8-fjpf-c2gr for matrix-js-sdk and CVE-2023-28103 / GHSA-6g43-88cp-w5gv for matrix-react-sdk).

The issues involve prototype pollution via events containing special strings in key locations, which can temporarily disrupt normal functioning of matrix-js-sdk and matrix-react-sdk, potentially impacting the consumer's ability to process data safely.


Discovery 2023-03-28
Entry 2023-03-29
element-web
< 1.11.26

cinny
le 2.2.4

CVE-2023-28103
CVE-2023-28427
https://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0
93eb0e48-14ba-11ec-875e-901b0e9408dcMatrix clients -- several vulnerabilities

Matrix developers report:

Today we are disclosing a critical security issue affecting multiple Matrix clients and libraries including Element (Web/Desktop/Android), FluffyChat, Nheko, Cinny, and SchildiChat.

Specifically, in certain circumstances it may be possible to trick vulnerable clients into disclosing encryption keys for messages previously sent by that client to user accounts later compromised by an attacker.

Exploiting this vulnerability to read encrypted messages requires gaining control over the recipient’s account. This requires either compromising their credentials directly or compromising their homeserver.


Discovery 2021-08-23
Entry 2021-09-13
cinny
< 1.2.1

element-web
< 1.8.3

nheko
le 0.8.2_2

CVE-2021-40823
CVE-2021-40824
https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing
0dcf68fa-5c31-11ec-875e-901b0e9408dcMatrix clients -- several vulnerabilities

Matrix developers report:

Today we are releasing security updates to libolm, matrix-js-sdk, and several clients including Element Web / Desktop. Users are encouraged to upgrade as soon as possible.

These releases mitigate a buffer overflow in olm_session_describe, a libolm debugging function used by matrix-js-sdk in its end-to-end encryption (E2EE) implementation. If you rely on matrix-js-sdk for E2EE, you are affected.


Discovery 2021-12-03
Entry 2021-12-13
cinny
< 1.6.0

element-web
< 1.9.7

https://matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-matrix-js-sdk
e4d93d07-297a-11ed-95f8-901b0e9408dcMatrix clients -- several vulnerabilities

Matrix developers report:

The vulnerabilities give an adversary who you share a room with the ability to carry out a denial-of-service attack against the affected clients, making it not show all of a user's rooms or spaces and/or causing minor temporary corruption.


Discovery 2022-08-31
Entry 2022-08-31
cinny
< 2.1.3

element-web
< 1.11.4

CVE-2022-36059
CVE-2022-36060
https://matrix.org/blog/2022/08/31/security-releases-matrix-js-sdk-19-4-0-and-matrix-react-sdk-3-53-0
c676bb1b-e3f8-11ed-b37b-901b0e9408dcelement-web -- matrix-react-sdk vulnerable to HTML injection in search results via plaintext message highlighting

Matrix developers report:

matrix-react-sdk is a react-based SDK for inserting a Matrix chat/VoIP client into a web page. Prior to version 3.71.0, plain text messages containing HTML tags are rendered as HTML in the search results. To exploit this, an attacker needs to trick a user into searching for a specific message containing an HTML injection payload. No cross-site scripting attack is possible due to the hardcoded content security policy. Version 3.71.0 of the SDK patches over the issue. As a workaround, restarting the client will clear the HTML injection.


Discovery 2023-04-25
Entry 2023-04-26
element-web
< 1.11.30

CVE-2023-30609
https://github.com/advisories/GHSA-xv83-x443-7rmw
cb902a77-3f43-11ed-9402-901b0e9408dcMatrix clients -- several vulnerabilities

Matrix developers report:

Two critical severity vulnerabilities in end-to-end encryption were found in the SDKs which power Element, Beeper, Cinny, SchildiChat, Circuli, Synod.im and any other clients based on matrix-js-sdk, matrix-ios-sdk or matrix-android-sdk2.


Discovery 2022-09-23
Entry 2022-09-28
cinny
< 2.2.1

element-web
< 1.11.7

CVE-2022-39249
CVE-2022-39250
CVE-2022-39251
CVE-2022-39236
https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients