Opened 14 months ago

Closed 14 months ago

Last modified 14 months ago

#17658 closed enhancement (fixed)

webkitgtk-2.38.5

Reported by: Douglas R. Reno Owned by: Douglas R. Reno
Priority: high Milestone: 11.3
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

Critical security update.

It contains a fix for a vulnerability which is being utilized on Apple devices as part of an exploit. It's not known how it impacts Linux machines, but it does allow for a sandbox bypass and remote code execution. Apple rates it as Critical, and they did emergency updates for all of their devices yesterday for iOS, macOS, tvOS, watchOS, Safari, and iTunes. https://www.securityweek.com/apple-patches-actively-exploited-webkit-zero-day-vulnerability/ has some more details.

Because of the severity of this vulnerability and the fact that it's being actively exploited, promoting to High severity.

Change History (5)

comment:1 by Douglas R. Reno, 14 months ago

Owner: changed from blfs-book to Douglas R. Reno
Status: newassigned

comment:2 by Douglas R. Reno, 14 months ago

Summary: WebKitGTK+-2.38.5webkitgtk-2.38.5

Retitle for currency script

comment:3 by Douglas R. Reno, 14 months ago

Release Notes

What’s new in the WebKitGTK 2.38.5 release?

    Fix large memory allocation when uploading content.
    Fix scrolling after a history navigation with PSON enabled.
    Always update the active uri of WebKitFrame.
    Fix the build on Ubuntu 20.04.
    Fix several crashes and rendering issues.

Security Advisory

WebKitGTK and WPE WebKit Security Advisory WSA-2023-0002

    Date Reported: February 15, 2023

    Advisory ID: WSA-2023-0002

    CVE identifiers: CVE-2023-23529.

Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.

    CVE-2023-23529
        Versions affected: WebKitGTK and WPE WebKit before 2.38.5.
        Credit to an anonymous researcher.
        Impact: Processing maliciously crafted web content may lead to arbitrary code 
        execution. Apple is aware of a report that this issue may have been actively 
        exploited. 
        Description: A type confusion issue was addressed with improved checks.

comment:4 by Douglas R. Reno, 14 months ago

Resolution: fixed
Status: assignedclosed

comment:5 by Douglas R. Reno, 14 months ago

Issued SA-11.2-100

Note: See TracTickets for help on using tickets.