[security-announce] openSUSE-SU-2018:2285-1: moderate: Security update for webkit2gtk3
openSUSE Security Update: Security update for webkit2gtk3 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2018:2285-1 Rating: moderate References: #1095611 #1097693 Cross-References: CVE-2018-11646 CVE-2018-4190 CVE-2018-4199 CVE-2018-4218 CVE-2018-4222 CVE-2018-4232 CVE-2018-4233 Affected Products: openSUSE Leap 15.0 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update for webkit2gtk3 to version 2.20.3 fixes the following issues: These security issues were fixed: - CVE-2018-4190: An unspecified issue allowed remote attackers to obtain sensitive credential information that is transmitted during a CSS mask-image fetch (bsc#1097693). - CVE-2018-4199: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site (bsc#1097693) - CVE-2018-4218: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers an @generatorState use-after-free (bsc#1097693) - CVE-2018-4222: An unspecified issue allowed remote attackers to execute arbitrary code via a crafted web site that leverages a getWasmBufferFromValue out-of-bounds read during WebAssembly compilation (bsc#1097693) - CVE-2018-4232: An unspecified issue allowed remote attackers to overwrite cookies via a crafted web site (bsc#1097693) - CVE-2018-4233: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site (bsc#1097693) - CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL mishandle an unset pageURL, leading to an application crash (bsc#1095611). These non-security issues were fixed: - Disable Gigacage if mmap fails to allocate in Linux. - Add user agent quirk for paypal website. - Fix a network process crash when trying to get cookies of about:blank page. - Fix UI process crash when closing the window under Wayland. - Fix several crashes and rendering issues. This update was imported from the SUSE:SLE-15:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.0: zypper in -t patch openSUSE-2018-845=1 Package List: - openSUSE Leap 15.0 (i586 x86_64): libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1 libjavascriptcoregtk-4_0-18-debuginfo-2.20.3-lp150.2.3.1 libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1 libwebkit2gtk-4_0-37-debuginfo-2.20.3-lp150.2.3.1 typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1 typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1 typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1 webkit-jsc-4-2.20.3-lp150.2.3.1 webkit-jsc-4-debuginfo-2.20.3-lp150.2.3.1 webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.20.3-lp150.2.3.1 webkit2gtk3-debugsource-2.20.3-lp150.2.3.1 webkit2gtk3-devel-2.20.3-lp150.2.3.1 webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1 webkit2gtk3-plugin-process-gtk2-debuginfo-2.20.3-lp150.2.3.1 - openSUSE Leap 15.0 (x86_64): libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1 libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.20.3-lp150.2.3.1 libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1 libwebkit2gtk-4_0-37-32bit-debuginfo-2.20.3-lp150.2.3.1 - openSUSE Leap 15.0 (noarch): libwebkit2gtk3-lang-2.20.3-lp150.2.3.1 References: https://www.suse.com/security/cve/CVE-2018-11646.html https://www.suse.com/security/cve/CVE-2018-4190.html https://www.suse.com/security/cve/CVE-2018-4199.html https://www.suse.com/security/cve/CVE-2018-4218.html https://www.suse.com/security/cve/CVE-2018-4222.html https://www.suse.com/security/cve/CVE-2018-4232.html https://www.suse.com/security/cve/CVE-2018-4233.html https://bugzilla.suse.com/1095611 https://bugzilla.suse.com/1097693 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org