Bugzilla – Bug 1217210
VUL-0: webkit2gtk3: WebKitGTK and WPE WebKit Security Advisory WSA-2023-0010
Last modified: 2024-06-03 21:21:15 UTC
------------------------------------------------------------------------ WebKitGTK and WPE WebKit Security Advisory WSA-2023-0010 ------------------------------------------------------------------------ Date reported : November 15, 2023 Advisory ID : WSA-2023-0010 WebKitGTK Advisory URL : https://webkitgtk.org/security/WSA-2023-0010.html WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2023-0010.html CVE identifiers : CVE-2022-32919, CVE-2022-32933, CVE-2022-46705, CVE-2022-46725, CVE-2023-32359, CVE-2023-41983, CVE-2023-42852. Several vulnerabilities were discovered in WebKitGTK and WPE WebKit. CVE-2022-32919 Versions affected: WebKitGTK and WPE WebKit before 2.38.4. Credit to @real_as3617. Impact: Visiting a website that frames malicious content may lead to UI spoofing. Description: The issue was addressed with improved UI handling. WebKit Bugzilla: 247461 CVE-2022-32933 Versions affected: WebKitGTK and WPE WebKit before 2.38.0. Credit to Binoy Chitale, MS student, Stony Brook University, Nick Nikiforakis, Associate Professor, Stony Brook University, Jason Polakis, Associate Professor, University of Illinois at Chicago, Mir Masood Ali, PhD student, University of Illinois at Chicago, Chris Kanich, Associate Professor, University of Illinois at Chicago, and Mohammad Ghasemisharif, PhD Candidate, University of Illinois at Chicago. Impact: A website may be able to track the websites a user visited in private browsing mode. Description: An information disclosure issue was addressed by removing the vulnerable code. WebKit Bugzilla: 239547 CVE-2022-46705 Versions affected: WebKitGTK and WPE WebKit before 2.38.4. Credit to Hyeon Park (@tree_segment) of Team ApplePIE. Impact: Visiting a malicious website may lead to address bar spoofing. Description: A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation. WebKit Bugzilla: 247287 CVE-2022-46725 Versions affected: WebKitGTK and WPE WebKit before 2.38.4. Credit to Hyeon Park (@tree_segment) of Team ApplePIE. Impact: Visiting a malicious website may lead to address bar spoofing. Description: A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation. WebKit Bugzilla: 247289 CVE-2023-32359 Versions affected: WebKitGTK and WPE WebKit before 2.42.0. Credit to Claire Houston. Impact: A user's password may be read aloud by a text-to-speech accessibility feature. Description: This issue was addressed with improved redaction of sensitive information. WebKit Bugzilla: 248717 CVE-2023-41983 Versions affected: WebKitGTK and WPE WebKit before 2.42.2. Credit to 이준성(Junsung Lee). Impact: Processing web content may lead to a denial-of-service. Description: The issue was addressed with improved memory handling. WebKit Bugzilla: 260757 CVE-2023-42852 Versions affected: WebKitGTK and WPE WebKit before 2.42.2. Credit to an anonymous researcher. Impact: Processing web content may lead to arbitrary code execution. Description: A logic issue was addressed with improved checks. WebKit Bugzilla: 260173 We recommend updating to the latest stable versions of WebKitGTK and WPE WebKit. It is the best way to ensure that you are running safe versions of WebKit. Please check our websites for information about the latest stable releases. Further information about WebKitGTK and WPE WebKit security advisories can be found at: https://webkitgtk.org/security.html or https://wpewebkit.org/security/. The WebKitGTK and WPE WebKit team, November 15, 2023
This is an autogenerated message for OBS integration: This bug (1217210) was mentioned in https://build.opensuse.org/request/show/1127343 Factory / webkit2gtk3
SUSE-SU-2023:4561-1: An update that solves seven vulnerabilities can now be installed. Category: security (important) Bug References: 1217210 CVE References: CVE-2022-32919, CVE-2022-32933, CVE-2022-46705, CVE-2022-46725, CVE-2023-32359, CVE-2023-41983, CVE-2023-42852 Sources used: openSUSE Leap 15.4 (src): webkit2gtk3-2.42.2-150400.4.64.2, webkit2gtk3-soup2-2.42.2-150400.4.64.2, webkit2gtk4-2.42.2-150400.4.64.2 openSUSE Leap 15.5 (src): webkit2gtk3-2.42.2-150400.4.64.2, webkit2gtk3-soup2-2.42.2-150400.4.64.2, webkit2gtk4-2.42.2-150400.4.64.2 Basesystem Module 15-SP4 (src): webkit2gtk3-soup2-2.42.2-150400.4.64.2 Basesystem Module 15-SP5 (src): webkit2gtk3-soup2-2.42.2-150400.4.64.2 Desktop Applications Module 15-SP4 (src): webkit2gtk3-2.42.2-150400.4.64.2 Desktop Applications Module 15-SP5 (src): webkit2gtk3-2.42.2-150400.4.64.2 Development Tools Module 15-SP4 (src): webkit2gtk4-2.42.2-150400.4.64.2 Development Tools Module 15-SP5 (src): webkit2gtk4-2.42.2-150400.4.64.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4559-1: An update that solves seven vulnerabilities can now be installed. Category: security (important) Bug References: 1216778, 1217210 CVE References: CVE-2022-32919, CVE-2022-32933, CVE-2022-46705, CVE-2022-46725, CVE-2023-32359, CVE-2023-41983, CVE-2023-42852 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.42.2-150000.3.157.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.42.2-150000.3.157.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): webkit2gtk3-2.42.2-150000.3.157.1 SUSE CaaS Platform 4.0 (src): webkit2gtk3-2.42.2-150000.3.157.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4558-1: An update that solves seven vulnerabilities can now be installed. Category: security (important) Bug References: 1216778, 1217210 CVE References: CVE-2022-32919, CVE-2022-32933, CVE-2022-46705, CVE-2022-46725, CVE-2023-32359, CVE-2023-41983, CVE-2023-42852 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.42.2-150200.91.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): webkit2gtk3-2.42.2-150200.91.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): webkit2gtk3-2.42.2-150200.91.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.42.2-150200.91.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): webkit2gtk3-2.42.2-150200.91.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): webkit2gtk3-2.42.2-150200.91.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): webkit2gtk3-2.42.2-150200.91.1 SUSE Enterprise Storage 7.1 (src): webkit2gtk3-2.42.2-150200.91.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4651-1: An update that solves seven vulnerabilities can now be installed. Category: security (important) Bug References: 1216778, 1217210 CVE References: CVE-2022-32919, CVE-2022-32933, CVE-2022-46705, CVE-2022-46725, CVE-2023-32359, CVE-2023-41983, CVE-2023-42852 Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): webkit2gtk3-2.42.2-2.158.2 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): webkit2gtk3-2.42.2-2.158.2 SUSE Linux Enterprise Server 12 SP5 (src): webkit2gtk3-2.42.2-2.158.2 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): webkit2gtk3-2.42.2-2.158.2 SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): webkit2gtk3-2.42.2-2.158.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.