Bugzilla – Bug 1210731
VUL-0: webkit2gtk3: WebKitGTK and WPE WebKit Security Advisory WSA-2023-0003
Last modified: 2024-05-06 12:46:33 UTC
Several vulnerabilities were discovered in WebKitGTK and WPE WebKit. CVE-2023-25358 Versions affected: WebKitGTK and WPE WebKit before 2.36.8. Credit to Chijin Zhou of ShuiMuYuLin Ltd and Tsinghua wingtecher lab. A use-after-free vulnerability exists in WebCore::RenderLayer. This issue allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. This is the same issue than CVE-2023-25360, CVE-2023-25361, CVE-2023-25362 and CVE-2023-25363. CVE-2022-0108 Versions affected: WebKitGTK and WPE WebKit before 2.38.6 and 2.40 branch before 2.40.1. Credit to Luan Herrera (@lbherrera_). Impact: An HTML document may be able to render iframes with sensitive user information. Description: This issue was addressed with improved iframe sandbox enforcement. CVE-2022-32885 Versions affected: WebKitGTK and WPE WebKit before 2.38.6 and 2.40 branch before 2.40.1. Credit to P1umer(@p1umer) and Q1IQ(@q1iqF). Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Description: A memory corruption issue was addressed with improved validation. CVE-2023-27932 Versions affected: WebKitGTK and WPE WebKit before 2.38.6 and 2.40 branch before 2.40.1. Credit to an anonymous researcher. Impact: Processing maliciously crafted web content may bypass Same Origin Policy. Description: This issue was addressed with improved state management. CVE-2023-27954 Versions affected: WebKitGTK and WPE WebKit before 2.38.6 and 2.40 branch before 2.40.1. Credit to an anonymous researcher. Impact: A website may be able to track sensitive user information. Description: The issue was addressed by removing origin information. CVE-2023-28205 Versions affected: WebKitGTK and WPE WebKit before 2.38.6 and 2.40 branch before 2.40.1. Credit to Clément Lecigne of Google’s Threat Analysis Group and Donncha Ó Cearbhaill of Amnesty International’s Security Lab. Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Description: A use after free issue was addressed with improved memory management. Reference: https://webkitgtk.org/security/WSA-2023-0003.html
SUSE-SU-2023:2056-1: An update that solves 12 vulnerabilities can now be installed. Category: security (important) Bug References: 1210295, 1210731 CVE References: CVE-2022-0108, CVE-2022-32885, CVE-2022-32886, CVE-2022-32912, CVE-2023-25358, CVE-2023-25360, CVE-2023-25361, CVE-2023-25362, CVE-2023-25363, CVE-2023-27932, CVE-2023-27954, CVE-2023-28205 Sources used: SUSE OpenStack Cloud 9 (src): webkit2gtk3-2.38.6-2.136.1 SUSE OpenStack Cloud Crowbar 9 (src): webkit2gtk3-2.38.6-2.136.1 SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): webkit2gtk3-2.38.6-2.136.1 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): webkit2gtk3-2.38.6-2.136.1 SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): webkit2gtk3-2.38.6-2.136.1 SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): webkit2gtk3-2.38.6-2.136.1 SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): webkit2gtk3-2.38.6-2.136.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): webkit2gtk3-2.38.6-2.136.1 SUSE Linux Enterprise Server 12 SP5 (src): webkit2gtk3-2.38.6-2.136.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): webkit2gtk3-2.38.6-2.136.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2065-1: An update that solves 12 vulnerabilities can now be installed. Category: security (important) Bug References: 1210295, 1210731 CVE References: CVE-2022-0108, CVE-2022-32885, CVE-2022-32886, CVE-2022-32912, CVE-2023-25358, CVE-2023-25360, CVE-2023-25361, CVE-2023-25362, CVE-2023-25363, CVE-2023-27932, CVE-2023-27954, CVE-2023-28205 Sources used: openSUSE Leap 15.4 (src): webkit2gtk3-2.38.6-150400.4.39.1, webkit2gtk3-soup2-2.38.6-150400.4.39.1, webkit2gtk4-2.38.6-150400.4.39.1 Basesystem Module 15-SP4 (src): webkit2gtk3-soup2-2.38.6-150400.4.39.1 Desktop Applications Module 15-SP4 (src): webkit2gtk3-2.38.6-150400.4.39.1 Development Tools Module 15-SP4 (src): webkit2gtk4-2.38.6-150400.4.39.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2078-1: An update that solves 12 vulnerabilities can now be installed. Category: security (important) Bug References: 1210295, 1210731 CVE References: CVE-2022-0108, CVE-2022-32885, CVE-2022-32886, CVE-2022-32912, CVE-2023-25358, CVE-2023-25360, CVE-2023-25361, CVE-2023-25362, CVE-2023-25363, CVE-2023-27932, CVE-2023-27954, CVE-2023-28205 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.38.6-150000.3.139.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.38.6-150000.3.139.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): webkit2gtk3-2.38.6-150000.3.139.1 SUSE CaaS Platform 4.0 (src): webkit2gtk3-2.38.6-150000.3.139.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2077-1: An update that solves 12 vulnerabilities can now be installed. Category: security (important) Bug References: 1210295, 1210731 CVE References: CVE-2022-0108, CVE-2022-32885, CVE-2022-32886, CVE-2022-32912, CVE-2023-25358, CVE-2023-25360, CVE-2023-25361, CVE-2023-25362, CVE-2023-25363, CVE-2023-27932, CVE-2023-27954, CVE-2023-28205 Sources used: openSUSE Leap 15.4 (src): webkit2gtk3-2.38.6-150200.72.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.38.6-150200.72.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): webkit2gtk3-2.38.6-150200.72.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): webkit2gtk3-2.38.6-150200.72.1 SUSE Linux Enterprise Real Time 15 SP3 (src): webkit2gtk3-2.38.6-150200.72.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.38.6-150200.72.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): webkit2gtk3-2.38.6-150200.72.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): webkit2gtk3-2.38.6-150200.72.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): webkit2gtk3-2.38.6-150200.72.1 SUSE Manager Proxy 4.2 (src): webkit2gtk3-2.38.6-150200.72.1 SUSE Manager Retail Branch Server 4.2 (src): webkit2gtk3-2.38.6-150200.72.1 SUSE Manager Server 4.2 (src): webkit2gtk3-2.38.6-150200.72.1 SUSE Enterprise Storage 7.1 (src): webkit2gtk3-2.38.6-150200.72.1 SUSE Enterprise Storage 7 (src): webkit2gtk3-2.38.6-150200.72.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1210731) was mentioned in https://build.opensuse.org/request/show/1108719 15.4 / webkit2gtk3
done, closing