An update that fixes 13 vulnerabilities is now available.
Description:
This update for webkit2gtk3 fixes the following issues:
- Update to version 2.32.3:
- CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain
events are processed for ImageLoader objects. A specially crafted web
page can lead to a potential information leak and further memory
corruption. A victim must be tricked into visiting a malicious web page
to trigger this vulnerability. (bsc#1188697)
- CVE-2021-21779: Fixed a use-after-free vulnerability in the way that
WebKit GraphicsContext handles certain events. A specially crafted web
page can lead to a potential information leak and further memory
corruption. A victim must be tricked into visiting a malicious web page
to trigger this vulnerability. (bsc#1188697)
- CVE-2021-30663: An integer overflow was addressed with improved input
validation. (bsc#1188697)
- CVE-2021-30665: A memory corruption issue was addressed with improved
state management. (bsc#1188697)
- CVE-2021-30689: A logic issue was addressed with improved state
management. (bsc#1188697)
- CVE-2021-30720: A logic issue was addressed with improved restrictions.
(bsc#1188697)
- CVE-2021-30734: Multiple memory corruption issues were addressed with
improved memory handling. (bsc#1188697)
- CVE-2021-30744: A cross-origin issue with iframe elements was addressed
with improved tracking of security origins. (bsc#1188697)
- CVE-2021-30749: Multiple memory corruption issues were addressed with
improved memory handling. (bsc#1188697)
- CVE-2021-30758: A type confusion issue was addressed with improved state
handling. (bsc#1188697)
- CVE-2021-30795: A use after free issue was addressed with improved
memory management. (bsc#1188697)
- CVE-2021-30797: This issue was addressed with improved checks.
(bsc#1188697)
- CVE-2021-30799: Multiple memory corruption issues were addressed with
improved memory handling. (bsc#1188697)
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product: