Lucene search

K
suseSuseOPENSUSE-SU-2020:0278-1
HistoryMar 02, 2020 - 12:00 a.m.

Security update for webkit2gtk3 (important)

2020-03-0200:00:00
lists.opensuse.org
106

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

An update that fixes 8 vulnerabilities is now available.

Description:

This update for webkit2gtk3 to version 2.26.4 fixes the following issues:

Security issues fixed:

  • CVE-2019-8835: Fixed multiple memory corruption issues (bsc#1161719).
  • CVE-2019-8844: Fixed multiple memory corruption issues (bsc#1161719).
  • CVE-2019-8846: Fixed a use-after-free issue (bsc#1161719).
  • CVE-2020-3862: Fixed a memory handling issue (bsc#1163809).
  • CVE-2020-3864: Fixed a logic issue in the DOM object context handling
    (bsc#1163809).
  • CVE-2020-3865: Fixed a logic issue in the DOM object context handling
    (bsc#1163809).
  • CVE-2020-3867: Fixed an XSS issue (bsc#1163809).
  • CVE-2020-3868: Fixed multiple memory corruption issues that could have
    lead to arbitrary code execution (bsc#1163809).

Non-security issues fixed:

  • Fixed issues while trying to play a video on NextCloud.
  • Fixed vertical alignment of text containing arabic diacritics.
  • Fixed build with icu 65.1.
  • Fixed page loading errors with websites using HSTS.
  • Fixed web process crash when displaying a KaTeX formula.
  • Fixed several crashes and rendering issues.
  • Switched to a single web process for Evolution and geary (bsc#1159329
    glgo#GNOME/evolution#587).

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.1:

    zypper in -t patch openSUSE-2020-278=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.1i586< - openSUSE Leap 15.1 (i586 x86_64):- openSUSE Leap 15.1 (i586 x86_64):.i586.rpm
openSUSE Leap15.1x86_64< - openSUSE Leap 15.1 (i586 x86_64):- openSUSE Leap 15.1 (i586 x86_64):.x86_64.rpm
openSUSE Leap15.1noarch< - openSUSE Leap 15.1 (noarch):- openSUSE Leap 15.1 (noarch):.noarch.rpm
openSUSE Leap15.1x86_64< - openSUSE Leap 15.1 (x86_64):- openSUSE Leap 15.1 (x86_64):.x86_64.rpm

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C