Lucene search

K
suseSuseOPENSUSE-SU-2021:1101-1
HistoryAug 10, 2021 - 12:00 a.m.

Security update for webkit2gtk3 (important)

2021-08-1000:00:00
lists.opensuse.org
167
webkit2gtk3
security update
vulnerabilities

EPSS

0.005

Percentile

76.3%

An update that fixes 13 vulnerabilities is now available.

Description:

This update for webkit2gtk3 fixes the following issues:

  • Update to version 2.32.3:
  • CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain
    events are processed for ImageLoader objects. A specially crafted web
    page can lead to a potential information leak and further memory
    corruption. A victim must be tricked into visiting a malicious web page
    to trigger this vulnerability. (bsc#1188697)
  • CVE-2021-21779: Fixed a use-after-free vulnerability in the way that
    WebKit GraphicsContext handles certain events. A specially crafted web
    page can lead to a potential information leak and further memory
    corruption. A victim must be tricked into visiting a malicious web page
    to trigger this vulnerability. (bsc#1188697)
  • CVE-2021-30663: An integer overflow was addressed with improved input
    validation. (bsc#1188697)
  • CVE-2021-30665: A memory corruption issue was addressed with improved
    state management. (bsc#1188697)
  • CVE-2021-30689: A logic issue was addressed with improved state
    management. (bsc#1188697)
  • CVE-2021-30720: A logic issue was addressed with improved restrictions.
    (bsc#1188697)
  • CVE-2021-30734: Multiple memory corruption issues were addressed with
    improved memory handling. (bsc#1188697)
  • CVE-2021-30744: A cross-origin issue with iframe elements was addressed
    with improved tracking of security origins. (bsc#1188697)
  • CVE-2021-30749: Multiple memory corruption issues were addressed with
    improved memory handling. (bsc#1188697)
  • CVE-2021-30758: A type confusion issue was addressed with improved state
    handling. (bsc#1188697)
  • CVE-2021-30795: A use after free issue was addressed with improved
    memory management. (bsc#1188697)
  • CVE-2021-30797: This issue was addressed with improved checks.
    (bsc#1188697)
  • CVE-2021-30799: Multiple memory corruption issues were addressed with
    improved memory handling. (bsc#1188697)

This update was imported from the SUSE:SLE-15-SP2:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.2:

    zypper in -t patch openSUSE-2021-1101=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.2i586< - openSUSE Leap 15.2 (i586 x86_64):- openSUSE Leap 15.2 (i586 x86_64):.i586.rpm
openSUSE Leap15.2x86_64< - openSUSE Leap 15.2 (i586 x86_64):- openSUSE Leap 15.2 (i586 x86_64):.x86_64.rpm
openSUSE Leap15.2noarch< - openSUSE Leap 15.2 (noarch):- openSUSE Leap 15.2 (noarch):.noarch.rpm
openSUSE Leap15.2x86_64< - openSUSE Leap 15.2 (x86_64):- openSUSE Leap 15.2 (x86_64):.x86_64.rpm