Security update for webkit2gtk3
Announcement ID: | SUSE-SU-2018:2075-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves seven vulnerabilities can now be installed.
Description:
This update for webkit2gtk3 to version 2.20.3 fixes the following issues:
These security issues were fixed:
- CVE-2018-4190: An unspecified issue allowed remote attackers to obtain sensitive credential information that is transmitted during a CSS mask-image fetch (bsc#1097693).
- CVE-2018-4199: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site (bsc#1097693)
- CVE-2018-4218: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers an @generatorState use-after-free (bsc#1097693)
- CVE-2018-4222: An unspecified issue allowed remote attackers to execute arbitrary code via a crafted web site that leverages a getWasmBufferFromValue out-of-bounds read during WebAssembly compilation (bsc#1097693)
- CVE-2018-4232: An unspecified issue allowed remote attackers to overwrite cookies via a crafted web site (bsc#1097693)
- CVE-2018-4233: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site (bsc#1097693)
- CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL mishandle an unset pageURL, leading to an application crash (bsc#1095611).
These non-security issues were fixed:
- Disable Gigacage if mmap fails to allocate in Linux.
- Add user agent quirk for paypal website.
- Fix a network process crash when trying to get cookies of about:blank page.
- Fix UI process crash when closing the window under Wayland.
- Fix several crashes and rendering issues.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15
zypper in -t patch SUSE-SLE-Module-Basesystem-15-2018-1401=1
-
Desktop Applications Module 15
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-2018-1401=1
Package List:
-
Basesystem Module 15 (aarch64 ppc64le s390x x86_64)
- libjavascriptcoregtk-4_0-18-2.20.3-3.3.1
- libwebkit2gtk-4_0-37-debuginfo-2.20.3-3.3.1
- libwebkit2gtk-4_0-37-2.20.3-3.3.1
- webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1
- webkit2gtk-4_0-injected-bundles-debuginfo-2.20.3-3.3.1
- webkit2gtk3-debugsource-2.20.3-3.3.1
- libjavascriptcoregtk-4_0-18-debuginfo-2.20.3-3.3.1
-
Basesystem Module 15 (noarch)
- libwebkit2gtk3-lang-2.20.3-3.3.1
-
Desktop Applications Module 15 (aarch64 ppc64le s390x x86_64)
- webkit2gtk3-devel-2.20.3-3.3.1
- typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1
- typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1
- typelib-1_0-WebKit2-4_0-2.20.3-3.3.1
- webkit2gtk3-debugsource-2.20.3-3.3.1
References:
- https://www.suse.com/security/cve/CVE-2018-11646.html
- https://www.suse.com/security/cve/CVE-2018-4190.html
- https://www.suse.com/security/cve/CVE-2018-4199.html
- https://www.suse.com/security/cve/CVE-2018-4218.html
- https://www.suse.com/security/cve/CVE-2018-4222.html
- https://www.suse.com/security/cve/CVE-2018-4232.html
- https://www.suse.com/security/cve/CVE-2018-4233.html
- https://bugzilla.suse.com/show_bug.cgi?id=1095611
- https://bugzilla.suse.com/show_bug.cgi?id=1097693