You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa webkit2gtk3

Sigurnosni nedostaci programskog paketa webkit2gtk3

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for webkit2gtk3
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2285-1
Rating: moderate
References: #1095611 #1097693
Cross-References: CVE-2018-11646 CVE-2018-4190 CVE-2018-4199
CVE-2018-4218 CVE-2018-4222 CVE-2018-4232
CVE-2018-4233
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes 7 vulnerabilities is now available.

Description:

This update for webkit2gtk3 to version 2.20.3 fixes the following issues:

These security issues were fixed:

– CVE-2018-4190: An unspecified issue allowed remote attackers to obtain
sensitive credential information that is transmitted during a CSS
mask-image fetch (bsc#1097693).
– CVE-2018-4199: An unspecified issue allowed remote attackers to execute
arbitrary code or cause a denial of service (buffer overflow and
application crash) via a crafted web site (bsc#1097693)
– CVE-2018-4218: An unspecified issue allowed remote attackers to execute
arbitrary code or cause a denial of service (memory corruption and
application crash) via a crafted web site that triggers an
@generatorState use-after-free (bsc#1097693)
– CVE-2018-4222: An unspecified issue allowed remote attackers to execute
arbitrary code via a crafted web site that leverages a
getWasmBufferFromValue
out-of-bounds read during WebAssembly compilation (bsc#1097693)
– CVE-2018-4232: An unspecified issue allowed remote attackers to
overwrite cookies via a crafted web site (bsc#1097693)
– CVE-2018-4233: An unspecified issue allowed remote attackers to execute
arbitrary code or cause a denial of service (memory corruption and
application crash) via a crafted web site (bsc#1097693)
– CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL and
webkitFaviconDatabaseSetIconURLForPageURL mishandle an unset pageURL,
leading to an application crash (bsc#1095611).

These non-security issues were fixed:

– Disable Gigacage if mmap fails to allocate in Linux.
– Add user agent quirk for paypal website.
– Fix a network process crash when trying to get cookies of about:blank
page.
– Fix UI process crash when closing the window under Wayland.
– Fix several crashes and rendering issues.

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-845=1

Package List:

– openSUSE Leap 15.0 (i586 x86_64):

libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1
libjavascriptcoregtk-4_0-18-debuginfo-2.20.3-lp150.2.3.1
libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1
libwebkit2gtk-4_0-37-debuginfo-2.20.3-lp150.2.3.1
typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1
typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1
typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1
webkit-jsc-4-2.20.3-lp150.2.3.1
webkit-jsc-4-debuginfo-2.20.3-lp150.2.3.1
webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1
webkit2gtk-4_0-injected-bundles-debuginfo-2.20.3-lp150.2.3.1
webkit2gtk3-debugsource-2.20.3-lp150.2.3.1
webkit2gtk3-devel-2.20.3-lp150.2.3.1
webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1
webkit2gtk3-plugin-process-gtk2-debuginfo-2.20.3-lp150.2.3.1

– openSUSE Leap 15.0 (x86_64):

libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1
libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.20.3-lp150.2.3.1
libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1
libwebkit2gtk-4_0-37-32bit-debuginfo-2.20.3-lp150.2.3.1

– openSUSE Leap 15.0 (noarch):

libwebkit2gtk3-lang-2.20.3-lp150.2.3.1

References:

https://www.suse.com/security/cve/CVE-2018-11646.html
https://www.suse.com/security/cve/CVE-2018-4190.html
https://www.suse.com/security/cve/CVE-2018-4199.html
https://www.suse.com/security/cve/CVE-2018-4218.html
https://www.suse.com/security/cve/CVE-2018-4222.html
https://www.suse.com/security/cve/CVE-2018-4232.html
https://www.suse.com/security/cve/CVE-2018-4233.html
https://bugzilla.suse.com/1095611
https://bugzilla.suse.com/1097693


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorDanijel Kozinovic
Cert idNCERT-REF-2018-08-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top