安全公告详情

NS-SA-2022-0048

2022-05-08 20:35:21

简介

moderate: webkit2gtk3/libvncserver security update

严重级别

moderate

主题

An update for webkit2gtk3/libvncserver is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

webkit2gtk3: This package provides debug information for package webkit2gtk3-jsc-devel. Debug information is useful when developing applications that use this package or when debugging this package.
libvncserver: This package provides debug information for package libvncserver. Debug information is useful when developing applications that use this package or when debugging this package.


Security Fix(es):
webkit2gtk3: An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.(CVE-2020-13584)
webkit2gtk3: A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.(CVE-2020-9948)
webkit2gtk3: A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.(CVE-2020-9951)
webkit2gtk3: An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.(CVE-2020-9983)
webkit2gtk3: A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.(CVE-2020-13543)
webkit2gtk3: A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.(CVE-2021-1817)
webkit2gtk3: A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory.(CVE-2021-1820)
webkit2gtk3: An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack.(CVE-2021-1825)
webkit2gtk3: A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting.(CVE-2021-1826)
webkit2gtk3: A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..(CVE-2021-30661)
webkit2gtk3: bugfix
libvncserver: t/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename.(CVE-2019-20839)
libvncserver: An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.(CVE-2018-21247)
libvncserver: An issue was discovered in LibVNCServer before 0.9.13. libvncclient/rfbproto.c does not limit TextChat size.(CVE-2020-14405)
libvncserver: An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rfbregion.c has a NULL pointer dereference.(CVE-2020-14397)
libvncserver: A divide by zero flaw was found in libvncserver. This flaw allows a malicious client to send a specially crafted message that, when processed by the VNC server, leads to a floating-point exception, resulting in a denial of service. The highest threat from this vulnerability is to system availability.(CVE-2020-25708)
libvncserver: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.80B5.

影响组件

  • webkit2gtk3
  • libvncserver

影响产品

  • CGSL MAIN 6.02

更新包

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["webkit2gtk3-jsc-devel-debuginfo-2.30.4-1.el8.x86_64.rpm","webkit2gtk3-debugsource-2.30.4-1.el8.x86_64.rpm","webkit2gtk3-debuginfo-2.30.4-1.el8.x86_64.rpm","webkit2gtk3-doc-2.30.4-1.el8.noarch.rpm","webkit2gtk3-devel-debuginfo-2.30.4-1.el8.x86_64.rpm","webkit2gtk3-jsc-debuginfo-2.30.4-1.el8.x86_64.rpm","webkit2gtk3-jsc-devel-2.30.4-1.el8.x86_64.rpm","webkit2gtk3-devel-2.30.4-1.el8.x86_64.rpm","webkit2gtk3-2.30.4-1.el8.x86_64.rpm","webkit2gtk3-jsc-2.30.4-1.el8.x86_64.rpm"],"source":"webkit2gtk3-2.30.4-1.el8.src.rpm"},{"binary":["libvncserver-debuginfo-0.9.11-17.el8.x86_64.rpm","libvncserver-debugsource-0.9.11-17.el8.x86_64.rpm","libvncserver-devel-0.9.11-17.el8.x86_64.rpm","libvncserver-0.9.11-17.el8.x86_64.rpm"],"source":"libvncserver-0.9.11-17.el8.src.rpm"}]}]}

CVE

参考