Lucene search

K
suseSuseOPENSUSE-SU-2021:2598-1
HistoryAug 03, 2021 - 12:00 a.m.

Security update for webkit2gtk3 (important)

2021-08-0300:00:00
lists.opensuse.org
191

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

An update that fixes 13 vulnerabilities is now available.

Description:

This update for webkit2gtk3 fixes the following issues:

  • Update to version 2.32.3:
  • CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain
    events are processed for ImageLoader objects. A specially crafted web
    page can lead to a potential information leak and further memory
    corruption. A victim must be tricked into visiting a malicious web page
    to trigger this vulnerability. (bsc#1188697)
  • CVE-2021-21779: Fixed a use-after-free vulnerability in the way that
    WebKit GraphicsContext handles certain events. A specially crafted web
    page can lead to a potential information leak and further memory
    corruption. A victim must be tricked into visiting a malicious web page
    to trigger this vulnerability. (bsc#1188697)
  • CVE-2021-30663: An integer overflow was addressed with improved input
    validation. (bsc#1188697)
  • CVE-2021-30665: A memory corruption issue was addressed with improved
    state management. (bsc#1188697)
  • CVE-2021-30689: A logic issue was addressed with improved state
    management. (bsc#1188697)
  • CVE-2021-30720: A logic issue was addressed with improved restrictions.
    (bsc#1188697)
  • CVE-2021-30734: Multiple memory corruption issues were addressed with
    improved memory handling. (bsc#1188697)
  • CVE-2021-30744: A cross-origin issue with iframe elements was addressed
    with improved tracking of security origins. (bsc#1188697)
  • CVE-2021-30749: Multiple memory corruption issues were addressed with
    improved memory handling. (bsc#1188697)
  • CVE-2021-30758: A type confusion issue was addressed with improved state
    handling. (bsc#1188697)
  • CVE-2021-30795: A use after free issue was addressed with improved
    memory management. (bsc#1188697)
  • CVE-2021-30797: This issue was addressed with improved checks.
    (bsc#1188697)
  • CVE-2021-30799: Multiple memory corruption issues were addressed with
    improved memory handling. (bsc#1188697)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or โ€œzypper patchโ€.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.3:

    zypper in -t patch openSUSE-SLE-15.3-2021-2598=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.3aarch64<ย - openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):.aarch64.rpm
openSUSE Leap15.3ppc64le<ย - openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):.ppc64le.rpm
openSUSE Leap15.3s390x<ย - openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):.s390x.rpm
openSUSE Leap15.3x86_64<ย - openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):.x86_64.rpm
openSUSE Leap15.3noarch<ย - openSUSE Leap 15.3 (noarch):- openSUSE Leap 15.3 (noarch):.noarch.rpm
openSUSE Leap15.3x86_64<ย - openSUSE Leap 15.3 (x86_64):- openSUSE Leap 15.3 (x86_64):.x86_64.rpm

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C