You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa webkit2gtk3

Sigurnosni nedostatak programskog paketa webkit2gtk3

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2020-f3fa778924
2020-03-20 01:39:24.067235
——————————————————————————–

Name : webkit2gtk3
Product : Fedora 30
Version : 2.28.0
Release : 5.fc30
URL : http://www.webkitgtk.org/
Summary : GTK Web content engine library
Description :
WebKitGTK is the port of the portable web rendering engine WebKit to the
GTK platform.

This package contains WebKit2 based WebKitGTK for GTK 3.

——————————————————————————–
Update Information:

Update to WebKitGTK 2.28.0. * Add API to enable Process Swap on (Cross-site)
Navigation. * Add user messages API for the communication with the web
extension. * Add support for same-site cookies. * Service workers are enabled
by default. * Add support for Pointer Lock API. * Add flatpak sandbox support.
* Make ondemand hardware acceleration policy never leave accelerated compositing
mode. * Always use a light theme for rendering form controls. * Add about:gpu
to show information about the graphics stack. * CVE fixes: CVE-2020-10018
——————————————————————————–
ChangeLog:

* Wed Mar 11 2020 Michael Catanzaro <mcatanzaro@redhat.com> – 2.28.0-5
– BuildRequires: rubygem-json. Not plural. Sigh.
* Wed Mar 11 2020 Michael Catanzaro <mcatanzaro@redhat.com> – 2.28.0-4
– Remove BuildRequires: rubygems-json, should not have been added in F31
* Wed Mar 11 2020 Michael Catanzaro <mcatanzaro@redhat.com> – 2.28.0-3
– BuildRequires: rubygems-json
– Refresh webkit-process.patch
* Wed Mar 11 2020 Michael Catanzaro <mcatanzaro@redhat.com> – 2.28.0-2
– Rebuild with koji hopefully not broken this time?
* Wed Mar 11 2020 Michael Catanzaro <mcatanzaro@redhat.com> – 2.28.0-1
– Update to 2.28.0
* Fri Feb 14 2020 Michael Catanzaro <mcatanzaro@redhat.com> – 2.26.4-1
– Update to 2.26.4
– Add GPG verification of tarball
* Thu Jan 23 2020 Eike Rathke <erack@redhat.com> – 2.26.3-1
– Update to 2.26.3
* Fri Nov 8 2019 Eike Rathke <erack@redhat.com> – 2.26.2-1
– Update to 2.26.2
* Mon Oct 28 2019 Michael Catanzaro <mcatanzaro@gnome.org> – 2.26.1-3
– Disable broken WPE renderer
* Wed Oct 23 2019 Eike Rathke <erack@redhat.com> – 2.26.1-2
– Rebase to 2.26.1
* Wed Aug 28 2019 Tomas Popela <tpopela@redhat.com> – 2.24.4-1
– Update to 2.24.4
* Tue Jul 2 2019 Tomas Popela <tpopela@redhat.com> – 2.24.3-1
– Update to 2.24.3
* Fri May 17 2019 Eike Rathke <erack@redhat.com> – 2.24.2-1
– Update to 2.24.2
——————————————————————————–
References:

[ 1 ] Bug #1811722 – CVE-2020-10018 webkit2gtk3: webkitgtk: Denial of service issue in accessibility/AXObjectCache.cpp [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1811722
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-f3fa778924’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorJosip Papratovic
Cert idNCERT-REF-2020-03-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa chromium

Otkriveni su sigurnosni nedostaci u programskom paketu chromium za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja,...

Close