Bug 1215869 (CVE-2023-40451) - VUL-0: CVE-2023-40451: libQtWebKit4,libqt5-qtwebkit,webkit2gtk3,webkitgtk: WebKitGTK and WPE WebKit Security Advisory WSA-2023-0009
Summary: VUL-0: CVE-2023-40451: libQtWebKit4,libqt5-qtwebkit,webkit2gtk3,webkitgtk: We...
Status: RESOLVED FIXED
Alias: CVE-2023-40451
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/379980/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-40451:8.8:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-10-02 10:16 UTC by SMASH SMASH
Modified: 2024-06-11 08:30 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-10-02 10:16:40 UTC
This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 17. An attacker with JavaScript execution may be able to execute arbitrary code.

CVE-2023-40451

Versions affected: WebKitGTK and WPE WebKit before 2.40.5.
Credit to an anonymous researcher.
Impact: An attacker with JavaScript execution may be able to execute arbitrary code. Description: This issue was addressed with improved iframe sandbox enforcement.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40451
https://webkitgtk.org/security/WSA-2023-0009.html#CVE-2023-40451
Comment 1 Dirk Mueller 2023-10-05 20:34:18 UTC
https://bugs.webkit.org/show_bug.cgi?id=251276

https://github.com/WebKit/WebKit/commit/dbfde8312289088b7720a0a50d2676d740b6eaf8

patch doesn't seem to apply for libQtWebKit4 and libqt5-qtwebkit
Comment 6 Maintenance Automation 2023-10-26 12:30:21 UTC
SUSE-SU-2023:4211-1: An update that solves eight vulnerabilities and has three security fixes can now be installed.

Category: security (important)
Bug References: 1213379, 1213581, 1213905, 1215072, 1215661, 1215866, 1215867, 1215868, 1215869, 1215870, 1216483
CVE References: CVE-2023-32393, CVE-2023-35074, CVE-2023-37450, CVE-2023-39434, CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-41993
Sources used:
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): webkit2gtk3-2.42.1-150000.3.153.1
SUSE CaaS Platform 4.0 (src): webkit2gtk3-2.42.1-150000.3.153.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.42.1-150000.3.153.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.42.1-150000.3.153.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Maintenance Automation 2023-10-26 12:30:29 UTC
SUSE-SU-2023:4209-1: An update that solves eight vulnerabilities and has three security fixes can now be installed.

Category: security (important)
Bug References: 1213379, 1213581, 1213905, 1215072, 1215661, 1215866, 1215867, 1215868, 1215869, 1215870, 1216483
CVE References: CVE-2023-32393, CVE-2023-35074, CVE-2023-37450, CVE-2023-39434, CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-41993
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): webkit2gtk3-2.42.1-2.155.1
SUSE Linux Enterprise Server 12 SP5 (src): webkit2gtk3-2.42.1-2.155.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): webkit2gtk3-2.42.1-2.155.1
SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): webkit2gtk3-2.42.1-2.155.1
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): webkit2gtk3-2.42.1-2.155.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-10-31 12:30:27 UTC
SUSE-SU-2023:4294-1: An update that solves six vulnerabilities and has five security fixes can now be installed.

Category: security (important)
Bug References: 1214093, 1214640, 1214835, 1215072, 1215661, 1215866, 1215867, 1215868, 1215869, 1215870, 1216483
CVE References: CVE-2023-35074, CVE-2023-39434, CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-41993
Sources used:
openSUSE Leap 15.4 (src): webkit2gtk3-soup2-2.42.1-150400.4.57.2, webkit2gtk3-2.42.1-150400.4.57.2, webkit2gtk4-2.42.1-150400.4.57.3
openSUSE Leap 15.5 (src): webkit2gtk3-soup2-2.42.1-150400.4.57.2, webkit2gtk3-2.42.1-150400.4.57.2, webkit2gtk4-2.42.1-150400.4.57.3
Basesystem Module 15-SP4 (src): webkit2gtk3-soup2-2.42.1-150400.4.57.2
Basesystem Module 15-SP5 (src): webkit2gtk3-soup2-2.42.1-150400.4.57.2
Desktop Applications Module 15-SP4 (src): webkit2gtk3-2.42.1-150400.4.57.2
Desktop Applications Module 15-SP5 (src): webkit2gtk3-2.42.1-150400.4.57.2
Development Tools Module 15-SP4 (src): webkit2gtk4-2.42.1-150400.4.57.3
Development Tools Module 15-SP5 (src): webkit2gtk4-2.42.1-150400.4.57.3

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Maintenance Automation 2023-11-02 16:30:50 UTC
SUSE-SU-2023:4339-1: An update that solves eight vulnerabilities and has two security fixes can now be installed.

Category: security (important)
Bug References: 1213379, 1213581, 1215072, 1215661, 1215866, 1215867, 1215868, 1215869, 1215870, 1216483
CVE References: CVE-2023-32393, CVE-2023-35074, CVE-2023-37450, CVE-2023-39434, CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-41993
Sources used:
SUSE Enterprise Storage 7.1 (src): webkit2gtk3-2.42.1-150200.87.4
SUSE Enterprise Storage 7 (src): webkit2gtk3-2.42.1-150200.87.4
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.42.1-150200.87.4
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): webkit2gtk3-2.42.1-150200.87.4
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): webkit2gtk3-2.42.1-150200.87.4
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.42.1-150200.87.4
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): webkit2gtk3-2.42.1-150200.87.4
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): webkit2gtk3-2.42.1-150200.87.4
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): webkit2gtk3-2.42.1-150200.87.4
SUSE Manager Proxy 4.2 (src): webkit2gtk3-2.42.1-150200.87.4
SUSE Manager Retail Branch Server 4.2 (src): webkit2gtk3-2.42.1-150200.87.4
SUSE Manager Server 4.2 (src): webkit2gtk3-2.42.1-150200.87.4

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Maintenance Automation 2023-12-27 16:30:05 UTC
SUSE-SU-2023:4978-1: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215868, 1215869, 1215870, 1218032, 1218033
CVE References: CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-42883, CVE-2023-42890
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): webkit2gtk3-2.42.4-2.164.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): webkit2gtk3-2.42.4-2.164.1
SUSE Linux Enterprise Server 12 SP5 (src): webkit2gtk3-2.42.4-2.164.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): webkit2gtk3-2.42.4-2.164.1
SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): webkit2gtk3-2.42.4-2.164.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Maintenance Automation 2024-01-02 12:30:09 UTC
SUSE-SU-2024:0004-1: An update that solves six vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215868, 1215869, 1215870, 1218032, 1218033
CVE References: CVE-2023-32359, CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-42883, CVE-2023-42890
Sources used:
Basesystem Module 15-SP4 (src): webkit2gtk3-soup2-2.42.4-150400.4.70.3
Basesystem Module 15-SP5 (src): webkit2gtk3-soup2-2.42.4-150400.4.70.3
Desktop Applications Module 15-SP4 (src): webkit2gtk3-2.42.4-150400.4.70.3
Desktop Applications Module 15-SP5 (src): webkit2gtk3-2.42.4-150400.4.70.3
Development Tools Module 15-SP5 (src): webkit2gtk4-2.42.4-150400.4.70.3
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3
SUSE Linux Enterprise Real Time 15 SP4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3
SUSE Manager Proxy 4.3 (src): webkit2gtk3-soup2-2.42.4-150400.4.70.3
SUSE Manager Retail Branch Server 4.3 (src): webkit2gtk3-soup2-2.42.4-150400.4.70.3
SUSE Manager Server 4.3 (src): webkit2gtk3-soup2-2.42.4-150400.4.70.3
openSUSE Leap 15.4 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3
openSUSE Leap 15.5 (src): webkit2gtk4-2.42.4-150400.4.70.3, webkit2gtk3-soup2-2.42.4-150400.4.70.3, webkit2gtk3-2.42.4-150400.4.70.3

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2024-01-02 12:30:16 UTC
SUSE-SU-2024:0002-1: An update that solves six vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215868, 1215869, 1215870, 1218032, 1218033
CVE References: CVE-2023-32359, CVE-2023-39928, CVE-2023-40451, CVE-2023-41074, CVE-2023-42883, CVE-2023-42890
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.42.4-150000.3.163.2
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.42.4-150000.3.163.2
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): webkit2gtk3-2.42.4-150000.3.163.2
SUSE CaaS Platform 4.0 (src): webkit2gtk3-2.42.4-150000.3.163.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 15 Maintenance Automation 2024-06-11 08:30:57 UTC
SUSE-SU-2024:1976-1: An update that solves 10 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215868, 1215869, 1215870, 1218033, 1222905, 1225071
CVE References: CVE-2023-42843, CVE-2023-42950, CVE-2023-42956, CVE-2024-23226, CVE-2024-23252, CVE-2024-23254, CVE-2024-23263, CVE-2024-23280, CVE-2024-23284, CVE-2024-27834
Maintenance Incident: [SUSE:Maintenance:34144](https://smelt.suse.de/incident/34144/)
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src):
 webkit2gtk3-2.44.2-4.7.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 webkit2gtk3-2.44.2-4.7.1
SUSE Linux Enterprise Server 12 SP5 (src):
 webkit2gtk3-2.44.2-4.7.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 webkit2gtk3-2.44.2-4.7.1
SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src):
 webkit2gtk3-2.44.2-4.7.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.