安全公告详情

NS-SA-2024-0053

2024-09-03 09:34:34

简介

important: webkit2gtk3/python3 security update

严重级别

important

主题

An update for webkit2gtk3/python3 is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

webkit2gtk3:
python3:


Security Fix(es):
webkit2gtk3: A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.(CVE-2022-22589)
webkit2gtk3: A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.(CVE-2022-22590)
webkit2gtk3: A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.(CVE-2022-22592)
webkit2gtk3: A flaw was found in webkitgtk. This flaw could allow an attacker to use maliciously crafted web content leading to arbitrary code execution.(CVE-2021-30858)
webkit2gtk3: A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-1871)
webkit2gtk3: A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.(CVE-2022-22637)
webkit2gtk3: A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.(CVE-2022-22620)
webkit2gtk3: A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.(CVE-2021-30934)
webkit2gtk3: A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.(CVE-2021-30936)
webkit2gtk3: A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.(CVE-2021-30951)
webkit2gtk3: A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.(CVE-2021-30952)
webkit2gtk3: A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.(CVE-2021-30953)
webkit2gtk3: A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.(CVE-2021-30954)
webkit2gtk3: A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.(CVE-2021-30984)
webkit2gtk3: A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.(CVE-2022-22594)
webkit2gtk3: A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.(CVE-2021-30809)
webkit2gtk3: A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.(CVE-2021-30818)
webkit2gtk3: A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.(CVE-2021-30823)
webkit2gtk3: An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.(CVE-2021-30836)
webkit2gtk3: A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user's browsing history.(CVE-2021-30884)
webkit2gtk3: A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.(CVE-2021-30887)
webkit2gtk3: An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.(CVE-2021-30888)
webkit2gtk3: A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.(CVE-2021-30889)
webkit2gtk3: A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.(CVE-2021-30890)
webkit2gtk3: A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.(CVE-2021-30897)
webkit2gtk3: A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.(CVE-2021-45481)
webkit2gtk3: A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.(CVE-2021-45482)
webkit2gtk3: A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.(CVE-2021-45483)
webkit2gtk3: A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.(CVE-2021-30846)
webkit2gtk3: A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.(CVE-2021-30848)
webkit2gtk3: Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.(CVE-2021-30849)
webkit2gtk3: A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.(CVE-2021-30851)
webkit2gtk3: A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.(CVE-2021-21775)
webkit2gtk3: A use-after-free vulnerability exists in the way Webkit’s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.(CVE-2021-21779)
webkit2gtk3: A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by an integer overflow in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.(CVE-2021-30663)
webkit2gtk3: A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a memory corruption issue in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.(CVE-2021-30665)
webkit2gtk3: A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.(CVE-2021-30682)
webkit2gtk3: A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.(CVE-2021-30689)
webkit2gtk3: A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.(CVE-2021-30720)
webkit2gtk3: Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.(CVE-2021-30734)
webkit2gtk3: Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.(CVE-2021-30744)
webkit2gtk3: Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.(CVE-2021-30749)
webkit2gtk3: A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.(CVE-2021-30758)
webkit2gtk3: A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.(CVE-2021-30795)
webkit2gtk3: This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.(CVE-2021-30797)
webkit2gtk3: Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.(CVE-2021-30799)
webkit2gtk3: An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.(CVE-2021-21806)
webkit2gtk3: A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-1788)
webkit2gtk3: A memory corruption issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-1844)
webkit2gtk3: A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-27918)
webkit2gtk3: A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A user may be unable to fully delete the browsing history under some circumstances. The highest threat from this vulnerability is to data confidentiality.(CVE-2020-29623)
webkit2gtk3: A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.(CVE-2021-1765)
webkit2gtk3: A type confusion vulnerability was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-1789)
webkit2gtk3: A port redirection issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A malicious website may be able to access restricted ports on arbitrary servers. The highest threat from this vulnerability is to data integrity.(CVE-2021-1799)
webkit2gtk3: A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.(CVE-2021-1801)
webkit2gtk3: A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-1870)
webkit2gtk3: A use-after-free issue was found in the AudioSourceProviderGStreamer class of WebKitGTK and WPE WebKit in versions prior to 2.30.5. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-13558)
webkit2gtk3: bugfix
python3: Python ssl.SSLSocket is vulnerable to a bypass of the TLS handshake in certain instances for HTTPS servers and other server-side protocols that use TLS client authentication such as mTLS. This issue may result in a breach of integrity as its possible to modify or delete resources that are authenticated only by a TLS certificate. No breach of confidentiality is possible.(CVE-2023-40217)
python3: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.F2B12.

影响组件

  • webkit2gtk3
  • python3

影响产品

  • CGSL MAIN 6.02

更新包

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["webkit2gtk3-jsc-devel-2.34.6-1.el8.x86_64.rpm","webkit2gtk3-2.34.6-1.el8.x86_64.rpm","webkit2gtk3-jsc-2.34.6-1.el8.x86_64.rpm","webkit2gtk3-devel-2.34.6-1.el8.x86_64.rpm"],"source":"webkit2gtk3-2.34.6-1.el8.src.rpm"},{"binary":["python3-libs-3.6.8-47.el8.cgslv6_2.7.g921d811.x86_64.rpm","python3-tkinter-3.6.8-47.el8.cgslv6_2.7.g921d811.x86_64.rpm","platform-python-devel-3.6.8-47.el8.cgslv6_2.7.g921d811.x86_64.rpm","python3-devel-3.6.8-47.el8.cgslv6_2.7.g921d811.x86_64.rpm","platform-python-3.6.8-47.el8.cgslv6_2.7.g921d811.x86_64.rpm"],"source":"python3-3.6.8-47.el8.cgslv6_2.7.g921d811.src.rpm"}]}]}
CGSL MAIN 6.02
  • webkit2gtk3-2.34.6-1.el8.src.rpm
    • webkit2gtk3-jsc-devel-2.34.6-1.el8.x86_64.rpm
    • webkit2gtk3-2.34.6-1.el8.x86_64.rpm
    • webkit2gtk3-jsc-2.34.6-1.el8.x86_64.rpm
    • webkit2gtk3-devel-2.34.6-1.el8.x86_64.rpm
  • python3-3.6.8-47.el8.cgslv6_2.7.g921d811.src.rpm
    • python3-libs-3.6.8-47.el8.cgslv6_2.7.g921d811.x86_64.rpm
    • python3-tkinter-3.6.8-47.el8.cgslv6_2.7.g921d811.x86_64.rpm
    • platform-python-devel-3.6.8-47.el8.cgslv6_2.7.g921d811.x86_64.rpm
    • python3-devel-3.6.8-47.el8.cgslv6_2.7.g921d811.x86_64.rpm
    • platform-python-3.6.8-47.el8.cgslv6_2.7.g921d811.x86_64.rpm

CVE

参考

© 2004-2023 广东中兴新支点技术有限公司 版权所有 (www.gd-linux.com) 粤ICP备15061780号-2

全国服务热线:400-033-0108