|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2023-41074: libQtWebKit4,libqt5-qtwebkit,webkit2gtk3,webkitgtk: WebKitGTK and WPE WebKit Security Advisory WSA-2023-0009 | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Major | ||
| Priority: | P3 - Medium | CC: | abergmann, mgorse, stoyan.manolov |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/380007/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-41074:8.8:(AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
SMASH SMASH
2023-10-02 10:16:45 UTC
https://github.com/WebKit/WebKit/commit/d60bafb0be1bf24b79a858f9208e5047c58f0d06 patched files do not exist in libQtWebKit4 and qt5-qtwebkit SUSE-SU-2023:4211-1: An update that solves eight vulnerabilities and has three security fixes can now be installed. Category: security (important) Bug References: 1213379, 1213581, 1213905, 1215072, 1215661, 1215866, 1215867, 1215868, 1215869, 1215870, 1216483 CVE References: CVE-2023-32393, CVE-2023-35074, CVE-2023-37450, CVE-2023-39434, CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-41993 Sources used: SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): webkit2gtk3-2.42.1-150000.3.153.1 SUSE CaaS Platform 4.0 (src): webkit2gtk3-2.42.1-150000.3.153.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.42.1-150000.3.153.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.42.1-150000.3.153.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4209-1: An update that solves eight vulnerabilities and has three security fixes can now be installed. Category: security (important) Bug References: 1213379, 1213581, 1213905, 1215072, 1215661, 1215866, 1215867, 1215868, 1215869, 1215870, 1216483 CVE References: CVE-2023-32393, CVE-2023-35074, CVE-2023-37450, CVE-2023-39434, CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-41993 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): webkit2gtk3-2.42.1-2.155.1 SUSE Linux Enterprise Server 12 SP5 (src): webkit2gtk3-2.42.1-2.155.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): webkit2gtk3-2.42.1-2.155.1 SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): webkit2gtk3-2.42.1-2.155.1 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): webkit2gtk3-2.42.1-2.155.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4294-1: An update that solves six vulnerabilities and has five security fixes can now be installed. Category: security (important) Bug References: 1214093, 1214640, 1214835, 1215072, 1215661, 1215866, 1215867, 1215868, 1215869, 1215870, 1216483 CVE References: CVE-2023-35074, CVE-2023-39434, CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-41993 Sources used: openSUSE Leap 15.4 (src): webkit2gtk3-soup2-2.42.1-150400.4.57.2, webkit2gtk3-2.42.1-150400.4.57.2, webkit2gtk4-2.42.1-150400.4.57.3 openSUSE Leap 15.5 (src): webkit2gtk3-soup2-2.42.1-150400.4.57.2, webkit2gtk3-2.42.1-150400.4.57.2, webkit2gtk4-2.42.1-150400.4.57.3 Basesystem Module 15-SP4 (src): webkit2gtk3-soup2-2.42.1-150400.4.57.2 Basesystem Module 15-SP5 (src): webkit2gtk3-soup2-2.42.1-150400.4.57.2 Desktop Applications Module 15-SP4 (src): webkit2gtk3-2.42.1-150400.4.57.2 Desktop Applications Module 15-SP5 (src): webkit2gtk3-2.42.1-150400.4.57.2 Development Tools Module 15-SP4 (src): webkit2gtk4-2.42.1-150400.4.57.3 Development Tools Module 15-SP5 (src): webkit2gtk4-2.42.1-150400.4.57.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4339-1: An update that solves eight vulnerabilities and has two security fixes can now be installed. Category: security (important) Bug References: 1213379, 1213581, 1215072, 1215661, 1215866, 1215867, 1215868, 1215869, 1215870, 1216483 CVE References: CVE-2023-32393, CVE-2023-35074, CVE-2023-37450, CVE-2023-39434, CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-41993 Sources used: SUSE Enterprise Storage 7.1 (src): webkit2gtk3-2.42.1-150200.87.4 SUSE Enterprise Storage 7 (src): webkit2gtk3-2.42.1-150200.87.4 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.42.1-150200.87.4 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): webkit2gtk3-2.42.1-150200.87.4 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): webkit2gtk3-2.42.1-150200.87.4 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.42.1-150200.87.4 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): webkit2gtk3-2.42.1-150200.87.4 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): webkit2gtk3-2.42.1-150200.87.4 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): webkit2gtk3-2.42.1-150200.87.4 SUSE Manager Proxy 4.2 (src): webkit2gtk3-2.42.1-150200.87.4 SUSE Manager Retail Branch Server 4.2 (src): webkit2gtk3-2.42.1-150200.87.4 SUSE Manager Server 4.2 (src): webkit2gtk3-2.42.1-150200.87.4 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4978-1: An update that solves five vulnerabilities can now be installed. Category: security (important) Bug References: 1215868, 1215869, 1215870, 1218032, 1218033 CVE References: CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-42883, CVE-2023-42890 Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): webkit2gtk3-2.42.4-2.164.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): webkit2gtk3-2.42.4-2.164.1 SUSE Linux Enterprise Server 12 SP5 (src): webkit2gtk3-2.42.4-2.164.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): webkit2gtk3-2.42.4-2.164.1 SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): webkit2gtk3-2.42.4-2.164.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2024:0004-1: An update that solves six vulnerabilities can now be installed. Category: security (important) Bug References: 1215868, 1215869, 1215870, 1218032, 1218033 CVE References: CVE-2023-32359, CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-42883, CVE-2023-42890 Sources used: Basesystem Module 15-SP4 (src): webkit2gtk3-soup2-2.42.4-150400.4.70.3 Basesystem Module 15-SP5 (src): webkit2gtk3-soup2-2.42.4-150400.4.70.3 Desktop Applications Module 15-SP4 (src): webkit2gtk3-2.42.4-150400.4.70.3 Desktop Applications Module 15-SP5 (src): webkit2gtk3-2.42.4-150400.4.70.3 Development Tools Module 15-SP5 (src): webkit2gtk4-2.42.4-150400.4.70.3 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3 SUSE Linux Enterprise Real Time 15 SP4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3 SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3 SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3 SUSE Manager Proxy 4.3 (src): webkit2gtk3-soup2-2.42.4-150400.4.70.3 SUSE Manager Retail Branch Server 4.3 (src): webkit2gtk3-soup2-2.42.4-150400.4.70.3 SUSE Manager Server 4.3 (src): webkit2gtk3-soup2-2.42.4-150400.4.70.3 openSUSE Leap 15.4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3 openSUSE Leap 15.5 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2024:0003-1: An update that solves five vulnerabilities can now be installed. Category: security (important) Bug References: 1215868, 1215870, 1218032, 1218033 CVE References: CVE-2023-32359, CVE-2023-39928, CVE-2023-41074, CVE-2023-42883, CVE-2023-42890 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.42.4-150200.97.3 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): webkit2gtk3-2.42.4-150200.97.3 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): webkit2gtk3-2.42.4-150200.97.3 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.42.4-150200.97.3 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): webkit2gtk3-2.42.4-150200.97.3 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): webkit2gtk3-2.42.4-150200.97.3 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): webkit2gtk3-2.42.4-150200.97.3 SUSE Enterprise Storage 7.1 (src): webkit2gtk3-2.42.4-150200.97.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2024:0002-1: An update that solves six vulnerabilities can now be installed. Category: security (important) Bug References: 1215868, 1215869, 1215870, 1218032, 1218033 CVE References: CVE-2023-32359, CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-42883, CVE-2023-42890 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.42.4-150000.3.163.2 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.42.4-150000.3.163.2 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): webkit2gtk3-2.42.4-150000.3.163.2 SUSE CaaS Platform 4.0 (src): webkit2gtk3-2.42.4-150000.3.163.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2024:1976-1: An update that solves 10 vulnerabilities can now be installed. Category: security (important) Bug References: 1215868, 1215869, 1215870, 1218033, 1222905, 1225071 CVE References: CVE-2023-42843, CVE-2023-42950, CVE-2023-42956, CVE-2024-23226, CVE-2024-23252, CVE-2024-23254, CVE-2024-23263, CVE-2024-23280, CVE-2024-23284, CVE-2024-27834 Maintenance Incident: [SUSE:Maintenance:34144](https://smelt.suse.de/incident/34144/) Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): webkit2gtk3-2.44.2-4.7.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): webkit2gtk3-2.44.2-4.7.1 SUSE Linux Enterprise Server 12 SP5 (src): webkit2gtk3-2.44.2-4.7.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): webkit2gtk3-2.44.2-4.7.1 SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): webkit2gtk3-2.44.2-4.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. |