SUSE Security Update: Security update for webkit2gtk3
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:4642-1
Rating:             important
References:         #1206474 #1206750 
Cross-References:   CVE-2022-42852 CVE-2022-42856 CVE-2022-42863
                    CVE-2022-42867 CVE-2022-46691 CVE-2022-46692
                    CVE-2022-46698 CVE-2022-46699 CVE-2022-46700
                   
CVSS scores:
                    CVE-2022-42852 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
                    CVE-2022-42852 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
                    CVE-2022-42856 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-42856 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-42863 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-42863 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-42867 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-42867 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-46691 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-46691 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-46692 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
                    CVE-2022-46692 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
                    CVE-2022-46698 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
                    CVE-2022-46698 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
                    CVE-2022-46699 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-46699 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-46700 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:
                    SUSE CaaS Platform 4.0
                    SUSE Enterprise Storage 6
                    SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
                    SUSE Linux Enterprise Server 15-SP1-LTSS
                    SUSE Linux Enterprise Server for SAP 15-SP1
______________________________________________________________________________

   An update that fixes 9 vulnerabilities is now available.

Description:

   This update for webkit2gtk3 fixes the following issues:

   Update to version 2.38.3:

   - CVE-2022-42856: Fixed a potential arbitrary code execution when
     processing maliciously crafted web content (bsc#1206474).
   - CVE-2022-42852: Fixed disclosure of process memory by improved memory
     handling.
   - CVE-2022-42867: Fixed a use after free issue was addressed with improved
     memory management.
   - CVE-2022-46692: Fixed bypass of Same Origin Policy through improved
     state management.
   - CVE-2022-46698: Fixed disclosure of sensitive user information with
     improved checks.
   - CVE-2022-46699: Fixed an arbitrary code execution caused by memory
     corruption.
   - CVE-2022-46700: Fixed an arbitrary code execution caused by memory
     corruption.


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server for SAP 15-SP1:

      zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4642=1

   - SUSE Linux Enterprise Server 15-SP1-LTSS:

      zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4642=1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:

      zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4642=1

   - SUSE Enterprise Storage 6:

      zypper in -t patch SUSE-Storage-6-2022-4642=1

   - SUSE CaaS Platform 4.0:

      To install this update, use the SUSE CaaS Platform 'skuba' tool. It
      will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.



Package List:

   - SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):

      libjavascriptcoregtk-4_0-18-2.38.3-150000.3.125.1
      libjavascriptcoregtk-4_0-18-debuginfo-2.38.3-150000.3.125.1
      libwebkit2gtk-4_0-37-2.38.3-150000.3.125.1
      libwebkit2gtk-4_0-37-debuginfo-2.38.3-150000.3.125.1
      typelib-1_0-JavaScriptCore-4_0-2.38.3-150000.3.125.1
      typelib-1_0-WebKit2-4_0-2.38.3-150000.3.125.1
      typelib-1_0-WebKit2WebExtension-4_0-2.38.3-150000.3.125.1
      webkit2gtk-4_0-injected-bundles-2.38.3-150000.3.125.1
      webkit2gtk-4_0-injected-bundles-debuginfo-2.38.3-150000.3.125.1
      webkit2gtk3-debugsource-2.38.3-150000.3.125.1
      webkit2gtk3-devel-2.38.3-150000.3.125.1

   - SUSE Linux Enterprise Server for SAP 15-SP1 (noarch):

      libwebkit2gtk3-lang-2.38.3-150000.3.125.1

   - SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):

      libjavascriptcoregtk-4_0-18-2.38.3-150000.3.125.1
      libjavascriptcoregtk-4_0-18-debuginfo-2.38.3-150000.3.125.1
      libwebkit2gtk-4_0-37-2.38.3-150000.3.125.1
      libwebkit2gtk-4_0-37-debuginfo-2.38.3-150000.3.125.1
      typelib-1_0-JavaScriptCore-4_0-2.38.3-150000.3.125.1
      typelib-1_0-WebKit2-4_0-2.38.3-150000.3.125.1
      typelib-1_0-WebKit2WebExtension-4_0-2.38.3-150000.3.125.1
      webkit2gtk-4_0-injected-bundles-2.38.3-150000.3.125.1
      webkit2gtk-4_0-injected-bundles-debuginfo-2.38.3-150000.3.125.1
      webkit2gtk3-debugsource-2.38.3-150000.3.125.1
      webkit2gtk3-devel-2.38.3-150000.3.125.1

   - SUSE Linux Enterprise Server 15-SP1-LTSS (noarch):

      libwebkit2gtk3-lang-2.38.3-150000.3.125.1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):

      libjavascriptcoregtk-4_0-18-2.38.3-150000.3.125.1
      libjavascriptcoregtk-4_0-18-debuginfo-2.38.3-150000.3.125.1
      libwebkit2gtk-4_0-37-2.38.3-150000.3.125.1
      libwebkit2gtk-4_0-37-debuginfo-2.38.3-150000.3.125.1
      typelib-1_0-JavaScriptCore-4_0-2.38.3-150000.3.125.1
      typelib-1_0-WebKit2-4_0-2.38.3-150000.3.125.1
      typelib-1_0-WebKit2WebExtension-4_0-2.38.3-150000.3.125.1
      webkit2gtk-4_0-injected-bundles-2.38.3-150000.3.125.1
      webkit2gtk-4_0-injected-bundles-debuginfo-2.38.3-150000.3.125.1
      webkit2gtk3-debugsource-2.38.3-150000.3.125.1
      webkit2gtk3-devel-2.38.3-150000.3.125.1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch):

      libwebkit2gtk3-lang-2.38.3-150000.3.125.1

   - SUSE Enterprise Storage 6 (aarch64 x86_64):

      libjavascriptcoregtk-4_0-18-2.38.3-150000.3.125.1
      libjavascriptcoregtk-4_0-18-debuginfo-2.38.3-150000.3.125.1
      libwebkit2gtk-4_0-37-2.38.3-150000.3.125.1
      libwebkit2gtk-4_0-37-debuginfo-2.38.3-150000.3.125.1
      typelib-1_0-JavaScriptCore-4_0-2.38.3-150000.3.125.1
      typelib-1_0-WebKit2-4_0-2.38.3-150000.3.125.1
      typelib-1_0-WebKit2WebExtension-4_0-2.38.3-150000.3.125.1
      webkit2gtk-4_0-injected-bundles-2.38.3-150000.3.125.1
      webkit2gtk-4_0-injected-bundles-debuginfo-2.38.3-150000.3.125.1
      webkit2gtk3-debugsource-2.38.3-150000.3.125.1
      webkit2gtk3-devel-2.38.3-150000.3.125.1

   - SUSE Enterprise Storage 6 (noarch):

      libwebkit2gtk3-lang-2.38.3-150000.3.125.1

   - SUSE CaaS Platform 4.0 (noarch):

      libwebkit2gtk3-lang-2.38.3-150000.3.125.1

   - SUSE CaaS Platform 4.0 (x86_64):

      libjavascriptcoregtk-4_0-18-2.38.3-150000.3.125.1
      libjavascriptcoregtk-4_0-18-debuginfo-2.38.3-150000.3.125.1
      libwebkit2gtk-4_0-37-2.38.3-150000.3.125.1
      libwebkit2gtk-4_0-37-debuginfo-2.38.3-150000.3.125.1
      typelib-1_0-JavaScriptCore-4_0-2.38.3-150000.3.125.1
      typelib-1_0-WebKit2-4_0-2.38.3-150000.3.125.1
      typelib-1_0-WebKit2WebExtension-4_0-2.38.3-150000.3.125.1
      webkit2gtk-4_0-injected-bundles-2.38.3-150000.3.125.1
      webkit2gtk-4_0-injected-bundles-debuginfo-2.38.3-150000.3.125.1
      webkit2gtk3-debugsource-2.38.3-150000.3.125.1
      webkit2gtk3-devel-2.38.3-150000.3.125.1


References:

   https://www.suse.com/security/cve/CVE-2022-42852.html
   https://www.suse.com/security/cve/CVE-2022-42856.html
   https://www.suse.com/security/cve/CVE-2022-42863.html
   https://www.suse.com/security/cve/CVE-2022-42867.html
   https://www.suse.com/security/cve/CVE-2022-46691.html
   https://www.suse.com/security/cve/CVE-2022-46692.html
   https://www.suse.com/security/cve/CVE-2022-46698.html
   https://www.suse.com/security/cve/CVE-2022-46699.html
   https://www.suse.com/security/cve/CVE-2022-46700.html
   https://bugzilla.suse.com/1206474
   https://bugzilla.suse.com/1206750

SUSE: 2022:4642-1 important: webkit2gtk3

December 30, 2022
An update that fixes 9 vulnerabilities is now available

Summary

This update for webkit2gtk3 fixes the following issues: Update to version 2.38.3: - CVE-2022-42856: Fixed a potential arbitrary code execution when processing maliciously crafted web content (bsc#1206474). - CVE-2022-42852: Fixed disclosure of process memory by improved memory handling. - CVE-2022-42867: Fixed a use after free issue was addressed with improved memory management. - CVE-2022-46692: Fixed bypass of Same Origin Policy through improved state management. - CVE-2022-46698: Fixed disclosure of sensitive user information with improved checks. - CVE-2022-46699: Fixed an arbitrary code execution caused by memory corruption. - CVE-2022-46700: Fixed an arbitrary code execution caused by memory corruption. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 15-SP1: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4642=1 - SUSE Linux Enterprise Server 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4642=1 - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4642=1 - SUSE Enterprise Storage 6: zypper in -t patch SUSE-Storage-6-2022-4642=1 - SUSE CaaS Platform 4.0: To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: - SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64): libjavascriptcoregtk-4_0-18-2.38.3-150000.3.125.1 libjavascriptcoregtk-4_0-18-debuginfo-2.38.3-150000.3.125.1 libwebkit2gtk-4_0-37-2.38.3-150000.3.125.1 libwebkit2gtk-4_0-37-debuginfo-2.38.3-150000.3.125.1 typelib-1_0-JavaScriptCore-4_0-2.38.3-150000.3.125.1 typelib-1_0-WebKit2-4_0-2.38.3-150000.3.125.1 typelib-1_0-WebKit2WebExtension-4_0-2.38.3-150000.3.125.1 webkit2gtk-4_0-injected-bundles-2.38.3-150000.3.125.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.38.3-150000.3.125.1 webkit2gtk3-debugsource-2.38.3-150000.3.125.1 webkit2gtk3-devel-2.38.3-150000.3.125.1 - SUSE Linux Enterprise Server for SAP 15-SP1 (noarch): libwebkit2gtk3-lang-2.38.3-150000.3.125.1 - SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64): libjavascriptcoregtk-4_0-18-2.38.3-150000.3.125.1 libjavascriptcoregtk-4_0-18-debuginfo-2.38.3-150000.3.125.1 libwebkit2gtk-4_0-37-2.38.3-150000.3.125.1 libwebkit2gtk-4_0-37-debuginfo-2.38.3-150000.3.125.1 typelib-1_0-JavaScriptCore-4_0-2.38.3-150000.3.125.1 typelib-1_0-WebKit2-4_0-2.38.3-150000.3.125.1 typelib-1_0-WebKit2WebExtension-4_0-2.38.3-150000.3.125.1 webkit2gtk-4_0-injected-bundles-2.38.3-150000.3.125.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.38.3-150000.3.125.1 webkit2gtk3-debugsource-2.38.3-150000.3.125.1 webkit2gtk3-devel-2.38.3-150000.3.125.1 - SUSE Linux Enterprise Server 15-SP1-LTSS (noarch): libwebkit2gtk3-lang-2.38.3-150000.3.125.1 - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64): libjavascriptcoregtk-4_0-18-2.38.3-150000.3.125.1 libjavascriptcoregtk-4_0-18-debuginfo-2.38.3-150000.3.125.1 libwebkit2gtk-4_0-37-2.38.3-150000.3.125.1 libwebkit2gtk-4_0-37-debuginfo-2.38.3-150000.3.125.1 typelib-1_0-JavaScriptCore-4_0-2.38.3-150000.3.125.1 typelib-1_0-WebKit2-4_0-2.38.3-150000.3.125.1 typelib-1_0-WebKit2WebExtension-4_0-2.38.3-150000.3.125.1 webkit2gtk-4_0-injected-bundles-2.38.3-150000.3.125.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.38.3-150000.3.125.1 webkit2gtk3-debugsource-2.38.3-150000.3.125.1 webkit2gtk3-devel-2.38.3-150000.3.125.1 - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch): libwebkit2gtk3-lang-2.38.3-150000.3.125.1 - SUSE Enterprise Storage 6 (aarch64 x86_64): libjavascriptcoregtk-4_0-18-2.38.3-150000.3.125.1 libjavascriptcoregtk-4_0-18-debuginfo-2.38.3-150000.3.125.1 libwebkit2gtk-4_0-37-2.38.3-150000.3.125.1 libwebkit2gtk-4_0-37-debuginfo-2.38.3-150000.3.125.1 typelib-1_0-JavaScriptCore-4_0-2.38.3-150000.3.125.1 typelib-1_0-WebKit2-4_0-2.38.3-150000.3.125.1 typelib-1_0-WebKit2WebExtension-4_0-2.38.3-150000.3.125.1 webkit2gtk-4_0-injected-bundles-2.38.3-150000.3.125.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.38.3-150000.3.125.1 webkit2gtk3-debugsource-2.38.3-150000.3.125.1 webkit2gtk3-devel-2.38.3-150000.3.125.1 - SUSE Enterprise Storage 6 (noarch): libwebkit2gtk3-lang-2.38.3-150000.3.125.1 - SUSE CaaS Platform 4.0 (noarch): libwebkit2gtk3-lang-2.38.3-150000.3.125.1 - SUSE CaaS Platform 4.0 (x86_64): libjavascriptcoregtk-4_0-18-2.38.3-150000.3.125.1 libjavascriptcoregtk-4_0-18-debuginfo-2.38.3-150000.3.125.1 libwebkit2gtk-4_0-37-2.38.3-150000.3.125.1 libwebkit2gtk-4_0-37-debuginfo-2.38.3-150000.3.125.1 typelib-1_0-JavaScriptCore-4_0-2.38.3-150000.3.125.1 typelib-1_0-WebKit2-4_0-2.38.3-150000.3.125.1 typelib-1_0-WebKit2WebExtension-4_0-2.38.3-150000.3.125.1 webkit2gtk-4_0-injected-bundles-2.38.3-150000.3.125.1 webkit2gtk-4_0-injected-bundles-debuginfo-2.38.3-150000.3.125.1 webkit2gtk3-debugsource-2.38.3-150000.3.125.1 webkit2gtk3-devel-2.38.3-150000.3.125.1

References

#1206474 #1206750

Cross- CVE-2022-42852 CVE-2022-42856 CVE-2022-42863

CVE-2022-42867 CVE-2022-46691 CVE-2022-46692

CVE-2022-46698 CVE-2022-46699 CVE-2022-46700

CVSS scores:

CVE-2022-42852 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

CVE-2022-42852 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

CVE-2022-42856 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-42856 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-42863 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-42863 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-42867 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-42867 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-46691 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-46691 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-46692 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

CVE-2022-46692 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

CVE-2022-46698 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

CVE-2022-46698 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

CVE-2022-46699 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-46699 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-46700 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

SUSE CaaS Platform 4.0

SUSE Enterprise Storage 6

SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS

SUSE Linux Enterprise Server 15-SP1-LTSS

SUSE Linux Enterprise Server for SAP 15-SP1

https://www.suse.com/security/cve/CVE-2022-42852.html

https://www.suse.com/security/cve/CVE-2022-42856.html

https://www.suse.com/security/cve/CVE-2022-42863.html

https://www.suse.com/security/cve/CVE-2022-42867.html

https://www.suse.com/security/cve/CVE-2022-46691.html

https://www.suse.com/security/cve/CVE-2022-46692.html

https://www.suse.com/security/cve/CVE-2022-46698.html

https://www.suse.com/security/cve/CVE-2022-46699.html

https://www.suse.com/security/cve/CVE-2022-46700.html

https://bugzilla.suse.com/1206474

https://bugzilla.suse.com/1206750

Severity
Announcement ID: SUSE-SU-2022:4642-1
Rating: important

Related News