Bug 1217844 (CVE-2023-42916, CVE-2023-42917) - VUL-0: webkit2gtk3: WebKitGTK and WPE WebKit Security Advisory WSA-2023-0011
Summary: VUL-0: webkit2gtk3: WebKitGTK and WPE WebKit Security Advisory WSA-2023-0011
Status: RESOLVED FIXED
Alias: CVE-2023-42916, CVE-2023-42917
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P1 - Urgent : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/386649/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-42916:5.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-12-06 09:07 UTC by Gabriele Sonnu
Modified: 2024-06-10 09:28 UTC (History)
6 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Gabriele Sonnu 2023-12-06 09:07:00 UTC
------------------------------------------------------------------------
WebKitGTK and WPE WebKit Security Advisory                 WSA-2023-0011
------------------------------------------------------------------------

Date reported           : December 05, 2023
Advisory ID             : WSA-2023-0011
WebKitGTK Advisory URL  : https://webkitgtk.org/security/WSA-2023-0011.html
WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2023-0011.html
CVE identifiers         : CVE-2023-42916, CVE-2023-42917.

Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.

CVE-2023-42916
    Versions affected: WebKitGTK and WPE WebKit before 2.42.3.
    Credit to Clément Lecigne of Google's Threat Analysis Group.
    Impact: Processing web content may disclose sensitive information.
    Apple is aware of a report that this issue may have been actively
    exploited. Description: An out-of-bounds read was addressed with
    improved input validation.
    WebKit Bugzilla: 265041

CVE-2023-42917
    Versions affected: WebKitGTK and WPE WebKit before 2.42.3.
    Credit to Clément Lecigne of Google's Threat Analysis Group.
    Impact: Processing web content may lead to arbitrary code execution.
    Apple is aware of a report that this issue may have been actively
    exploited. Description: A memory corruption vulnerability was
    addressed with improved locking.
    WebKit Bugzilla: 265067


We recommend updating to the latest stable versions of WebKitGTK and WPE
WebKit. It is the best way to ensure that you are running safe versions
of WebKit. Please check our websites for information about the latest
stable releases.

Further information about WebKitGTK and WPE WebKit security advisories
can be found at: https://webkitgtk.org/security.html or
https://wpewebkit.org/security/.

The WebKitGTK and WPE WebKit team,
December 05, 2023
Comment 1 Gabriele Sonnu 2023-12-06 09:38:42 UTC
Tracking all codestreams as affected
Comment 2 Marcus Meissner 2023-12-06 16:45:40 UTC
i think its the actively exploited issue, so please prioritize
Comment 6 Maintenance Automation 2023-12-14 12:30:33 UTC
SUSE-SU-2023:4829-1: An update that solves two vulnerabilities can now be installed.

Category: security (important)
Bug References: 1217844
CVE References: CVE-2023-42916, CVE-2023-42917
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.42.3-150000.3.160.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): webkit2gtk3-2.42.3-150000.3.160.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): webkit2gtk3-2.42.3-150000.3.160.1
SUSE CaaS Platform 4.0 (src): webkit2gtk3-2.42.3-150000.3.160.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Maintenance Automation 2023-12-14 12:30:36 UTC
SUSE-SU-2023:4828-1: An update that solves two vulnerabilities can now be installed.

Category: security (important)
Bug References: 1217844
CVE References: CVE-2023-42916, CVE-2023-42917
Sources used:
openSUSE Leap 15.4 (src): webkit2gtk3-2.42.3-150400.4.67.1, webkit2gtk4-2.42.3-150400.4.67.1, webkit2gtk3-soup2-2.42.3-150400.4.67.1
openSUSE Leap 15.5 (src): webkit2gtk3-2.42.3-150400.4.67.1, webkit2gtk4-2.42.3-150400.4.67.1, webkit2gtk3-soup2-2.42.3-150400.4.67.1
Basesystem Module 15-SP4 (src): webkit2gtk3-soup2-2.42.3-150400.4.67.1
Basesystem Module 15-SP5 (src): webkit2gtk3-soup2-2.42.3-150400.4.67.1
Desktop Applications Module 15-SP4 (src): webkit2gtk3-2.42.3-150400.4.67.1
Desktop Applications Module 15-SP5 (src): webkit2gtk3-2.42.3-150400.4.67.1
Development Tools Module 15-SP4 (src): webkit2gtk4-2.42.3-150400.4.67.1
Development Tools Module 15-SP5 (src): webkit2gtk4-2.42.3-150400.4.67.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-12-14 12:30:39 UTC
SUSE-SU-2023:4827-1: An update that solves two vulnerabilities can now be installed.

Category: security (important)
Bug References: 1217844
CVE References: CVE-2023-42916, CVE-2023-42917
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): webkit2gtk3-2.42.3-2.161.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): webkit2gtk3-2.42.3-2.161.1
SUSE Linux Enterprise Server 12 SP5 (src): webkit2gtk3-2.42.3-2.161.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): webkit2gtk3-2.42.3-2.161.1
SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): webkit2gtk3-2.42.3-2.161.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Maintenance Automation 2023-12-14 12:30:44 UTC
SUSE-SU-2023:4824-1: An update that solves two vulnerabilities can now be installed.

Category: security (important)
Bug References: 1217844
CVE References: CVE-2023-42916, CVE-2023-42917
Sources used:
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): webkit2gtk3-2.42.3-150200.94.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): webkit2gtk3-2.42.3-150200.94.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): webkit2gtk3-2.42.3-150200.94.1
SUSE Enterprise Storage 7.1 (src): webkit2gtk3-2.42.3-150200.94.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.42.3-150200.94.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): webkit2gtk3-2.42.3-150200.94.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): webkit2gtk3-2.42.3-150200.94.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): webkit2gtk3-2.42.3-150200.94.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Robert Frohl 2024-06-10 09:28:06 UTC
done, closing