openSUSE Security Update: Security update for webkit2gtk3
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:2285-1
Rating: moderate
References: #1095611 #1097693
Cross-References: CVE-2018-11646 CVE-2018-4190 CVE-2018-4199
CVE-2018-4218 CVE-2018-4222 CVE-2018-4232
CVE-2018-4233
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
This update for webkit2gtk3 to version 2.20.3 fixes the following issues:
These security issues were fixed:
– CVE-2018-4190: An unspecified issue allowed remote attackers to obtain
sensitive credential information that is transmitted during a CSS
mask-image fetch (bsc#1097693).
– CVE-2018-4199: An unspecified issue allowed remote attackers to execute
arbitrary code or cause a denial of service (buffer overflow and
application crash) via a crafted web site (bsc#1097693)
– CVE-2018-4218: An unspecified issue allowed remote attackers to execute
arbitrary code or cause a denial of service (memory corruption and
application crash) via a crafted web site that triggers an
@generatorState use-after-free (bsc#1097693)
– CVE-2018-4222: An unspecified issue allowed remote attackers to execute
arbitrary code via a crafted web site that leverages a
getWasmBufferFromValue
out-of-bounds read during WebAssembly compilation (bsc#1097693)
– CVE-2018-4232: An unspecified issue allowed remote attackers to
overwrite cookies via a crafted web site (bsc#1097693)
– CVE-2018-4233: An unspecified issue allowed remote attackers to execute
arbitrary code or cause a denial of service (memory corruption and
application crash) via a crafted web site (bsc#1097693)
– CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL and
webkitFaviconDatabaseSetIconURLForPageURL mishandle an unset pageURL,
leading to an application crash (bsc#1095611).
These non-security issues were fixed:
– Disable Gigacage if mmap fails to allocate in Linux.
– Add user agent quirk for paypal website.
– Fix a network process crash when trying to get cookies of about:blank
page.
– Fix UI process crash when closing the window under Wayland.
– Fix several crashes and rendering issues.
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-845=1
Package List:
– openSUSE Leap 15.0 (i586 x86_64):
libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1
libjavascriptcoregtk-4_0-18-debuginfo-2.20.3-lp150.2.3.1
libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1
libwebkit2gtk-4_0-37-debuginfo-2.20.3-lp150.2.3.1
typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1
typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1
typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1
webkit-jsc-4-2.20.3-lp150.2.3.1
webkit-jsc-4-debuginfo-2.20.3-lp150.2.3.1
webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1
webkit2gtk-4_0-injected-bundles-debuginfo-2.20.3-lp150.2.3.1
webkit2gtk3-debugsource-2.20.3-lp150.2.3.1
webkit2gtk3-devel-2.20.3-lp150.2.3.1
webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1
webkit2gtk3-plugin-process-gtk2-debuginfo-2.20.3-lp150.2.3.1
– openSUSE Leap 15.0 (x86_64):
libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1
libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.20.3-lp150.2.3.1
libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1
libwebkit2gtk-4_0-37-32bit-debuginfo-2.20.3-lp150.2.3.1
– openSUSE Leap 15.0 (noarch):
libwebkit2gtk3-lang-2.20.3-lp150.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-11646.html
https://www.suse.com/security/cve/CVE-2018-4190.html
https://www.suse.com/security/cve/CVE-2018-4199.html
https://www.suse.com/security/cve/CVE-2018-4218.html
https://www.suse.com/security/cve/CVE-2018-4222.html
https://www.suse.com/security/cve/CVE-2018-4232.html
https://www.suse.com/security/cve/CVE-2018-4233.html
https://bugzilla.suse.com/1095611
https://bugzilla.suse.com/1097693
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org