Lucene search

K
amazonAmazonALAS-2024-2425
HistoryJan 19, 2024 - 1:51 a.m.

Important: webkitgtk4

2024-01-1901:51:00
alas.aws.amazon.com
6
improved memory handling
safari 17.2
macos sonoma 14.2
ios 17.2
ipados 17.2
watchos 10.2
tvos 17.2
ios 16.7.3
ipados 16.7.3
dos
arbitrary code execution
yum update webkitgtk4
new packages
aarch64
i686
x86_64

7.3 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

51.0%

Issue Overview:

The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, macOS Sonoma 14.2, iOS 17.2 and iPadOS 17.2, watchOS 10.2, tvOS 17.2, iOS 16.7.3 and iPadOS 16.7.3. Processing an image may lead to a denial-of-service. (CVE-2023-42883)

The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, macOS Sonoma 14.2, watchOS 10.2, iOS 17.2 and iPadOS 17.2, tvOS 17.2. Processing web content may lead to arbitrary code execution. (CVE-2023-42890)

Affected Packages:

webkitgtk4

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update webkitgtk4 to update your system.

New Packages:

aarch64:  
    webkitgtk4-2.42.4-3.amzn2.0.1.aarch64  
    webkitgtk4-devel-2.42.4-3.amzn2.0.1.aarch64  
    webkitgtk4-jsc-2.42.4-3.amzn2.0.1.aarch64  
    webkitgtk4-jsc-devel-2.42.4-3.amzn2.0.1.aarch64  
    webkitgtk4-debuginfo-2.42.4-3.amzn2.0.1.aarch64  
  
i686:  
    webkitgtk4-2.42.4-3.amzn2.0.1.i686  
    webkitgtk4-devel-2.42.4-3.amzn2.0.1.i686  
    webkitgtk4-jsc-2.42.4-3.amzn2.0.1.i686  
    webkitgtk4-jsc-devel-2.42.4-3.amzn2.0.1.i686  
    webkitgtk4-debuginfo-2.42.4-3.amzn2.0.1.i686  
  
src:  
    webkitgtk4-2.42.4-3.amzn2.0.1.src  
  
x86_64:  
    webkitgtk4-2.42.4-3.amzn2.0.1.x86_64  
    webkitgtk4-devel-2.42.4-3.amzn2.0.1.x86_64  
    webkitgtk4-jsc-2.42.4-3.amzn2.0.1.x86_64  
    webkitgtk4-jsc-devel-2.42.4-3.amzn2.0.1.x86_64  
    webkitgtk4-debuginfo-2.42.4-3.amzn2.0.1.x86_64  

Additional References

Red Hat: CVE-2023-42883, CVE-2023-42890

Mitre: CVE-2023-42883, CVE-2023-42890