openSUSE Security Update: Security update for webkit2gtk3
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2018:2285-1
Rating:             moderate
References:         #1095611 #1097693 
Cross-References:   CVE-2018-11646 CVE-2018-4190 CVE-2018-4199
                    CVE-2018-4218 CVE-2018-4222 CVE-2018-4232
                    CVE-2018-4233
Affected Products:
                    openSUSE Leap 15.0
______________________________________________________________________________

   An update that fixes 7 vulnerabilities is now available.

Description:

   This update for webkit2gtk3 to version 2.20.3 fixes the following issues:

   These security issues were fixed:

   - CVE-2018-4190: An unspecified issue allowed remote attackers to obtain
     sensitive credential information that is transmitted during a CSS
     mask-image fetch (bsc#1097693).
   - CVE-2018-4199: An unspecified issue allowed remote attackers to execute
     arbitrary code or cause a denial of service (buffer overflow and
     application crash) via a crafted web site (bsc#1097693)
   - CVE-2018-4218: An unspecified issue allowed remote attackers to execute
     arbitrary code or cause a denial of service (memory corruption and
     application crash) via a crafted web site that triggers an
     @generatorState use-after-free (bsc#1097693)
   - CVE-2018-4222: An unspecified issue allowed remote attackers to execute
     arbitrary code via a crafted web site that leverages a
     getWasmBufferFromValue
     out-of-bounds read during WebAssembly compilation (bsc#1097693)
   - CVE-2018-4232: An unspecified issue allowed remote attackers to
     overwrite cookies via a crafted web site (bsc#1097693)
   - CVE-2018-4233: An unspecified issue allowed remote attackers to execute
     arbitrary code or cause a denial of service (memory corruption and
     application crash) via a crafted web site (bsc#1097693)
   - CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL and
     webkitFaviconDatabaseSetIconURLForPageURL mishandle an unset pageURL,
     leading to an application crash (bsc#1095611).

   These non-security issues were fixed:

   - Disable Gigacage if mmap fails to allocate in Linux.
   - Add user agent quirk for paypal website.
   - Fix a network process crash when trying to get cookies of about:blank
     page.
   - Fix UI process crash when closing the window under Wayland.
   - Fix several crashes and rendering issues.

   This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.0:

      zypper in -t patch openSUSE-2018-845=1



Package List:

   - openSUSE Leap 15.0 (i586 x86_64):

      libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1
      libjavascriptcoregtk-4_0-18-debuginfo-2.20.3-lp150.2.3.1
      libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1
      libwebkit2gtk-4_0-37-debuginfo-2.20.3-lp150.2.3.1
      typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1
      typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1
      typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1
      webkit-jsc-4-2.20.3-lp150.2.3.1
      webkit-jsc-4-debuginfo-2.20.3-lp150.2.3.1
      webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1
      webkit2gtk-4_0-injected-bundles-debuginfo-2.20.3-lp150.2.3.1
      webkit2gtk3-debugsource-2.20.3-lp150.2.3.1
      webkit2gtk3-devel-2.20.3-lp150.2.3.1
      webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1
      webkit2gtk3-plugin-process-gtk2-debuginfo-2.20.3-lp150.2.3.1

   - openSUSE Leap 15.0 (x86_64):

      libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1
      libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.20.3-lp150.2.3.1
      libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1
      libwebkit2gtk-4_0-37-32bit-debuginfo-2.20.3-lp150.2.3.1

   - openSUSE Leap 15.0 (noarch):

      libwebkit2gtk3-lang-2.20.3-lp150.2.3.1


References:

   https://www.suse.com/security/cve/CVE-2018-11646.html
   https://www.suse.com/security/cve/CVE-2018-4190.html
   https://www.suse.com/security/cve/CVE-2018-4199.html
   https://www.suse.com/security/cve/CVE-2018-4218.html
   https://www.suse.com/security/cve/CVE-2018-4222.html
   https://www.suse.com/security/cve/CVE-2018-4232.html
   https://www.suse.com/security/cve/CVE-2018-4233.html
   https://bugzilla.suse.com/1095611
   https://bugzilla.suse.com/1097693

-- 

openSUSE: 2018:2285-1: moderate: webkit2gtk3

August 10, 2018
An update that fixes 7 vulnerabilities is now available.

Description

This update for webkit2gtk3 to version 2.20.3 fixes the following issues: These security issues were fixed: - CVE-2018-4190: An unspecified issue allowed remote attackers to obtain sensitive credential information that is transmitted during a CSS mask-image fetch (bsc#1097693). - CVE-2018-4199: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site (bsc#1097693) - CVE-2018-4218: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers an @generatorState use-after-free (bsc#1097693) - CVE-2018-4222: An unspecified issue allowed remote attackers to execute arbitrary code via a crafted web site that leverages a getWasmBufferFromValue out-of-bounds read during WebAssembly compilation (bsc#1097693) - CVE-2018-4232: An unspecified issue allowed remote attackers to overwrite cookies via a crafted web site (bsc#1097693) - CVE-2018-4233: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site (bsc#1097693) - CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL mishandle an unset pageURL, leading to an application crash (bsc#1095611). These non-security issues were fixed: - Disable Gigacage if mmap fails to allocate in Linux. - Add user agent quirk for paypal website. - Fix a network process crash when trying to get cookies of about:blank page. - Fix UI process crash when closing the window under Wayland. - Fix several crashes and rendering issues. This update was imported from the SUSE:SLE-15:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.0: zypper in -t patch openSUSE-2018-845=1


Package List

- openSUSE Leap 15.0 (i586 x86_64): libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1 libjavascriptcoregtk-4_0-18-debuginfo-2.20.3-lp150.2.3.1 libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1 libwebkit2gtk-4_0-37-debuginfo-2.20.3-lp150.2.3.1 typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1 typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1 typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1 webkit-jsc-4-2.20.3-lp150.2.3.1 webkit-jsc-4-debuginfo-2.20.3-lp150.2.3.1 webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.20.3-lp150.2.3.1 webkit2gtk3-debugsource-2.20.3-lp150.2.3.1 webkit2gtk3-devel-2.20.3-lp150.2.3.1 webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1 webkit2gtk3-plugin-process-gtk2-debuginfo-2.20.3-lp150.2.3.1 - openSUSE Leap 15.0 (x86_64): libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1 libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.20.3-lp150.2.3.1 libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1 libwebkit2gtk-4_0-37-32bit-debuginfo-2.20.3-lp150.2.3.1 - openSUSE Leap 15.0 (noarch): libwebkit2gtk3-lang-2.20.3-lp150.2.3.1


References

https://www.suse.com/security/cve/CVE-2018-11646.html https://www.suse.com/security/cve/CVE-2018-4190.html https://www.suse.com/security/cve/CVE-2018-4199.html https://www.suse.com/security/cve/CVE-2018-4218.html https://www.suse.com/security/cve/CVE-2018-4222.html https://www.suse.com/security/cve/CVE-2018-4232.html https://www.suse.com/security/cve/CVE-2018-4233.html https://bugzilla.suse.com/1095611 https://bugzilla.suse.com/1097693--


Severity
Announcement ID: openSUSE-SU-2018:2285-1
Rating: moderate
Affected Products: openSUSE Leap 15.0

Related News