Bug 1210295 (CVE-2023-28205) - VUL-0: CVE-2023-28205: libQtWebKit4,webkit2gtk3,libqt5-qtwebkit,webkitgtk: WebKitGTK: use-after-free leads to arbitrary code execution
Summary: VUL-0: CVE-2023-28205: libQtWebKit4,webkit2gtk3,libqt5-qtwebkit,webkitgtk: We...
Status: RESOLVED FIXED
Alias: CVE-2023-28205
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: E-mail List
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/362925/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-28205:8.8:(AV:...
Keywords:
Depends on: CVE-2023-2203
Blocks:
  Show dependency treegraph
 
Reported: 2023-04-11 07:23 UTC by Stoyan Manolov
Modified: 2023-09-03 16:15 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stoyan Manolov 2023-04-11 07:23:47 UTC
CVE-2023-28205 (WebKit)

It is a use-after-free vulnerability that allows attackers to process maliciously crafted web content that may lead to arbitrary code execution.

By tricking targets into loading malicious websites under the control of attackers, it is possible to exploit the vulnerability, which could lead to the execution of malware on compromised systems. Maliciously designed web content can cause the execution of arbitrary code, giving attackers access to your device without your knowledge. Apple has fixed this vulnerability with improved memory management.

WebKit Bugzilla: 254797

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28205
https://bugzilla.redhat.com/show_bug.cgi?id=2185724
https://www.cve.org/CVERecord?id=CVE-2023-28205
http://seclists.org/fulldisclosure/2023/Apr/1
http://seclists.org/fulldisclosure/2023/Apr/2
http://seclists.org/fulldisclosure/2023/Apr/3
http://seclists.org/fulldisclosure/2023/Apr/5
https://support.apple.com/en-us/HT213720
https://support.apple.com/en-us/HT213721
https://support.apple.com/en-us/HT213722
https://support.apple.com/en-us/HT213723
Comment 2 Maintenance Automation 2023-04-27 12:30:08 UTC
SUSE-SU-2023:2056-1: An update that solves 12 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1210295, 1210731
CVE References: CVE-2022-0108, CVE-2022-32885, CVE-2022-32886, CVE-2022-32912, CVE-2023-25358, CVE-2023-25360, CVE-2023-25361, CVE-2023-25362, CVE-2023-25363, CVE-2023-27932, CVE-2023-27954, CVE-2023-28205
Sources used:
SUSE OpenStack Cloud 9 (src): webkit2gtk3-2.38.6-2.136.1
SUSE OpenStack Cloud Crowbar 9 (src): webkit2gtk3-2.38.6-2.136.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): webkit2gtk3-2.38.6-2.136.1
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): webkit2gtk3-2.38.6-2.136.1
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): webkit2gtk3-2.38.6-2.136.1
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): webkit2gtk3-2.38.6-2.136.1
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): webkit2gtk3-2.38.6-2.136.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): webkit2gtk3-2.38.6-2.136.1
SUSE Linux Enterprise Server 12 SP5 (src): webkit2gtk3-2.38.6-2.136.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): webkit2gtk3-2.38.6-2.136.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 3 Maintenance Automation 2023-04-28 14:01:14 UTC
SUSE-SU-2023:2065-1: An update that solves 12 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1210295, 1210731
CVE References: CVE-2022-0108, CVE-2022-32885, CVE-2022-32886, CVE-2022-32912, CVE-2023-25358, CVE-2023-25360, CVE-2023-25361, CVE-2023-25362, CVE-2023-25363, CVE-2023-27932, CVE-2023-27954, CVE-2023-28205
Sources used:
openSUSE Leap 15.4 (src): webkit2gtk3-2.38.6-150400.4.39.1, webkit2gtk3-soup2-2.38.6-150400.4.39.1, webkit2gtk4-2.38.6-150400.4.39.1
Basesystem Module 15-SP4 (src): webkit2gtk3-soup2-2.38.6-150400.4.39.1
Desktop Applications Module 15-SP4 (src): webkit2gtk3-2.38.6-150400.4.39.1
Development Tools Module 15-SP4 (src): webkit2gtk4-2.38.6-150400.4.39.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 4 Maintenance Automation 2023-05-01 08:30:01 UTC
SUSE-SU-2023:2078-1: An update that solves 12 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1210295, 1210731
CVE References: CVE-2022-0108, CVE-2022-32885, CVE-2022-32886, CVE-2022-32912, CVE-2023-25358, CVE-2023-25360, CVE-2023-25361, CVE-2023-25362, CVE-2023-25363, CVE-2023-27932, CVE-2023-27954, CVE-2023-28205
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.38.6-150000.3.139.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.38.6-150000.3.139.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): webkit2gtk3-2.38.6-150000.3.139.1
SUSE CaaS Platform 4.0 (src): webkit2gtk3-2.38.6-150000.3.139.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Maintenance Automation 2023-05-01 08:30:03 UTC
SUSE-SU-2023:2077-1: An update that solves 12 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1210295, 1210731
CVE References: CVE-2022-0108, CVE-2022-32885, CVE-2022-32886, CVE-2022-32912, CVE-2023-25358, CVE-2023-25360, CVE-2023-25361, CVE-2023-25362, CVE-2023-25363, CVE-2023-27932, CVE-2023-27954, CVE-2023-28205
Sources used:
openSUSE Leap 15.4 (src): webkit2gtk3-2.38.6-150200.72.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.38.6-150200.72.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): webkit2gtk3-2.38.6-150200.72.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): webkit2gtk3-2.38.6-150200.72.1
SUSE Linux Enterprise Real Time 15 SP3 (src): webkit2gtk3-2.38.6-150200.72.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.38.6-150200.72.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): webkit2gtk3-2.38.6-150200.72.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): webkit2gtk3-2.38.6-150200.72.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): webkit2gtk3-2.38.6-150200.72.1
SUSE Manager Proxy 4.2 (src): webkit2gtk3-2.38.6-150200.72.1
SUSE Manager Retail Branch Server 4.2 (src): webkit2gtk3-2.38.6-150200.72.1
SUSE Manager Server 4.2 (src): webkit2gtk3-2.38.6-150200.72.1
SUSE Enterprise Storage 7.1 (src): webkit2gtk3-2.38.6-150200.72.1
SUSE Enterprise Storage 7 (src): webkit2gtk3-2.38.6-150200.72.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 OBSbugzilla Bot 2023-09-03 16:15:27 UTC
This is an autogenerated message for OBS integration:
This bug (1210295) was mentioned in
https://build.opensuse.org/request/show/1108719 15.4 / webkit2gtk3