Bug 1215230 - VUL-0: webkit2gtk3: WebKitGTK and WPE WebKit Security Advisory WSA-2023-0008
Summary: VUL-0: webkit2gtk3: WebKitGTK and WPE WebKit Security Advisory WSA-2023-0008
Status: RESOLVED FIXED
Alias: None
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/377401/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-28198:8.8:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-09-12 06:06 UTC by Carlos López
Modified: 2024-06-03 21:20 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlos López 2023-09-12 06:06:30 UTC
------------------------------------------------------------------------
WebKitGTK and WPE WebKit Security Advisory                 WSA-2023-0008
------------------------------------------------------------------------

Date reported           : September 11, 2023
Advisory ID             : WSA-2023-0008
WebKitGTK Advisory URL  : https://webkitgtk.org/security/WSA-2023-0008.html
WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2023-0008.html
CVE identifiers         : CVE-2023-28198, CVE-2023-32370,
                          CVE-2023-40397.

Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.

CVE-2023-28198
    Versions affected: WebKitGTK and WPE WebKit before 2.40.1.
    Credit to hazbinhotel working with Trend Micro Zero Day Initiative.
    Impact: Processing web content may lead to arbitrary code execution.
    Description: A use-after-free issue was addressed with improved
    memory management.

CVE-2023-32370
    Versions affected: WebKitGTK and WPE WebKit before 2.40.1.
    Credit to Gertjan Franken of imec-DistriNet, KU Leuven.
    Impact: Content Security Policy to block domains with wildcards may
    fail. Description: A logic issue was addressed with improved
    validation.

CVE-2023-40397
    Versions affected: WebKitGTK and WPE WebKit before 2.40.5.
    Credit to Johan Carlsson (joaxcar).
    Impact: A remote attacker may be able to cause arbitrary javascript
    code execution. Description: The issue was addressed with improved
    checks.


We recommend updating to the latest stable versions of WebKitGTK and WPE
WebKit. It is the best way to ensure that you are running safe versions
of WebKit. Please check our websites for information about the latest
stable releases.

Further information about WebKitGTK and WPE WebKit security advisories
can be found at: https://webkitgtk.org/security.html or
https://wpewebkit.org/security/.

The WebKitGTK and WPE WebKit team,
September 11, 2023
Comment 5 Maintenance Automation 2023-09-25 08:30:07 UTC
SUSE-SU-2023:3753-1: An update that solves 10 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1213379, 1213581, 1213905, 1214093, 1214640, 1214835, 1215072, 1215230
CVE References: CVE-2023-28198, CVE-2023-32370, CVE-2023-37450, CVE-2023-38594, CVE-2023-38595, CVE-2023-38597, CVE-2023-38599, CVE-2023-38600, CVE-2023-38611, CVE-2023-40397
Sources used:
Development Tools Module 15-SP5 (src): webkit2gtk4-2.40.5-150400.4.51.1
openSUSE Leap 15.4 (src): webkit2gtk3-soup2-2.40.5-150400.4.51.1, webkit2gtk3-2.40.5-150400.4.51.1, webkit2gtk4-2.40.5-150400.4.51.1
openSUSE Leap 15.5 (src): webkit2gtk3-soup2-2.40.5-150400.4.51.1, webkit2gtk3-2.40.5-150400.4.51.1, webkit2gtk4-2.40.5-150400.4.51.1
Basesystem Module 15-SP4 (src): webkit2gtk3-soup2-2.40.5-150400.4.51.1
Basesystem Module 15-SP5 (src): webkit2gtk3-soup2-2.40.5-150400.4.51.1
Desktop Applications Module 15-SP4 (src): webkit2gtk3-2.40.5-150400.4.51.1
Desktop Applications Module 15-SP5 (src): webkit2gtk3-2.40.5-150400.4.51.1
Development Tools Module 15-SP4 (src): webkit2gtk4-2.40.5-150400.4.51.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Carlos López 2024-02-22 14:54:32 UTC
Done, closing.