SUSE-SU-2024:1293-1: important: Security update for webkit2gtk3
SLE-SECURITY-UPDATES
null at suse.de
Mon Apr 15 16:30:08 UTC 2024
# Security update for webkit2gtk3
Announcement ID: SUSE-SU-2024:1293-1
Rating: important
References:
* bsc#1222010
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
* SUSE Linux Enterprise Software Development Kit 12 SP5
* SUSE Linux Enterprise Workstation Extension 12 12-SP5
An update that has one security fix can now be installed.
## Description:
webkit2gtk3 was updated to fix the following issues:
Update to version 2.44.0 (boo#1222010):
* CVE-2024-23252:
Credit to anbu1024 of SecANT. Impact: Processing web content may lead to a
denial-of-service. Description: The issue was addressed with improved memory
handling.
* CVE-2024-23254:
Credit to James Lee (@Windowsrcer). Impact: A malicious website may exfiltrate
audio data cross-origin. Description: The issue was addressed with improved UI
handling.
* CVE-2024-23263:
Credit to Johan Carlsson (joaxcar). Impact: Processing maliciously crafted web
content may prevent Content Security Policy from being enforced. Description: A
logic issue was addressed with improved validation.
* CVE-2024-23280:
Credit to An anonymous researcher. Impact: A maliciously crafted webpage may be
able to fingerprint the user. Description: An injection issue was addressed with
improved validation.
* CVE-2024-23284:
Credit to Georg Felber and Marco Squarcina. Impact: Processing maliciously
crafted web content may prevent Content Security Policy from being enforced.
Description: A logic issue was addressed with improved state management.
* CVE-2023-42950:
Credit to Nan Wang (@eternalsakura13) of 360 Vulnerability Research Institute
and rushikesh nandedkar. Impact: Processing maliciously crafted web content may
lead to arbitrary code execution. Description: A use after free issue was
addressed with improved memory management.
* CVE-2023-42956:
Credit to SungKwon Lee (Demon.Team). Impact: Processing web content may lead to
a denial-of-service. Description: The issue was addressed with improved memory
handling.
* CVE-2023-42843:
Credit to Kacper Kwapisz (@KKKas_). Impact: Visiting a malicious website may
lead to address bar spoofing. Description: An inconsistent user interface issue
was addressed with improved state management.
* Make the DOM accessibility tree reachable from UI process with GTK4.
* Removed the X11 and WPE renderers in favor of DMA-BUF.
* Improved vblank synchronization when rendering.
* Removed key event reinjection in GTK4 to make keyboard shortcuts work in web
sites.
* Fix gamepads detection by correctly handling focused window in GTK4.
* Use WebAssembly on aarch64. It is the upstream default and no longer makes
the build fail. Stop passing -DENABLE_C_LOOP=ON, -DENABLE_WEBASSEMBLY=OFF
and -DENABLE_SAMPLING_PROFILER=OFF for the same reason.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Workstation Extension 12 12-SP5
zypper in -t patch SUSE-SLE-WE-12-SP5-2024-1293=1
* SUSE Linux Enterprise Software Development Kit 12 SP5
zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1293=1
* SUSE Linux Enterprise High Performance Computing 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1293=1
* SUSE Linux Enterprise Server 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1293=1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1293=1
## Package List:
* SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64)
* libjavascriptcoregtk-4_0-18-32bit-2.44.0-4.3.2
* SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x
x86_64)
* webkit2gtk3-devel-2.44.0-4.3.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-4.3.2
* webkit2gtk3-debugsource-2.44.0-4.3.2
* SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-4.3.2
* libjavascriptcoregtk-4_0-18-2.44.0-4.3.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-4.3.2
* libwebkit2gtk-4_0-37-2.44.0-4.3.2
* typelib-1_0-WebKit2-4_0-2.44.0-4.3.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-4.3.2
* typelib-1_0-JavaScriptCore-4_0-2.44.0-4.3.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-4.3.2
* webkit2gtk-4_0-injected-bundles-2.44.0-4.3.2
* webkit2gtk3-debugsource-2.44.0-4.3.2
* SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch)
* libwebkit2gtk3-lang-2.44.0-4.3.2
* SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-4.3.2
* libjavascriptcoregtk-4_0-18-2.44.0-4.3.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-4.3.2
* libwebkit2gtk-4_0-37-2.44.0-4.3.2
* typelib-1_0-WebKit2-4_0-2.44.0-4.3.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-4.3.2
* typelib-1_0-JavaScriptCore-4_0-2.44.0-4.3.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-4.3.2
* webkit2gtk-4_0-injected-bundles-2.44.0-4.3.2
* webkit2gtk3-debugsource-2.44.0-4.3.2
* SUSE Linux Enterprise Server 12 SP5 (noarch)
* libwebkit2gtk3-lang-2.44.0-4.3.2
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.0-4.3.2
* libjavascriptcoregtk-4_0-18-2.44.0-4.3.2
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.0-4.3.2
* libwebkit2gtk-4_0-37-2.44.0-4.3.2
* typelib-1_0-WebKit2-4_0-2.44.0-4.3.2
* libwebkit2gtk-4_0-37-debuginfo-2.44.0-4.3.2
* typelib-1_0-JavaScriptCore-4_0-2.44.0-4.3.2
* typelib-1_0-WebKit2WebExtension-4_0-2.44.0-4.3.2
* webkit2gtk-4_0-injected-bundles-2.44.0-4.3.2
* webkit2gtk3-debugsource-2.44.0-4.3.2
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch)
* libwebkit2gtk3-lang-2.44.0-4.3.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222010
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20240415/e6c933ff/attachment.htm>
More information about the sle-security-updates
mailing list