#18255 closed enhancement (fixed)
webkitgtk-2.41.6
Reported by: | Bruce Dubbs | Owned by: | Douglas R. Reno |
---|---|---|---|
Priority: | high | Milestone: | 12.0 |
Component: | BOOK | Version: | git |
Severity: | blocker | Keywords: | |
Cc: |
Description ¶
New point version.
Change History (17)
comment:1 by , 21 months ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:2 by , 21 months ago
comment:3 by , 21 months ago
Has anyone verified if 2.40.3 has fixed the flickering issues? If so we might want to move back to stable, although I don't see any crippling bugs in unstable right now
comment:4 by , 21 months ago
I haven't tried 2.40.3, but I can give that a shot prior to updating to 2.41.6
comment:5 by , 21 months ago
Upon further inspection, it does seem to have fixed it for me at least on an older system. Here is the changelog for 2.40.3
- Make memory pressure monitor honor memory.memsw.usage_in_bytes if exists.
- Include key modifiers in wheel events.
- Apply cookie blocking policy to WebSocket handshakes.
- Remove accidental dependency on GLib 2.70.
- Fix the build with BUBBLEWRAP_SANDBOX disabled.
- Fix several crashes and rendering issues.
The bubblewrap fix is a bonus since the build was broken on stable in 2.40.2 without fixing it
comment:6 by , 21 months ago
What's interesting to me is that there's no commits in there between 2.40.2 and 2.40.3 that should fix that (nothing graphics related at least, and it's not scrollkey related): https://github.com/WebKit/WebKit/commits/webkitglib/2.40
It's good that the bubblewrap sandbox issue has been resolved though :)
follow-up: 8 comment:7 by , 21 months ago
When you test downgrading WebKitGTK be careful to remove (or move away) the newer version of shared libraries from /usr/lib, or the dynamic linker may still load the shared libraries with newer version, not the old one.
See LFS chapter 8.2.
I'll stick with 2.41 on my system to avoid the nasty downgrading issues.
comment:8 by , 21 months ago
Replying to Xi Ruoyao:
I'll stick with 2.41 on my system to avoid the nasty downgrading issues.
Yeah, maybe we should stick with 2.41 on dev to avoid downgrade issues and confusion, the 2.42 stable release seems to line up with the BLFS stable package freeze so we might just want to wait it out on unstable until 2.42
follow-up: 10 comment:9 by , 21 months ago
Priority: | normal → high |
---|---|
Severity: | normal → blocker |
This needs https://github.com/WebKit/WebKit/commit/4f99c0670d2d91dbc51725a7af6909e186db1b07 to fix CVE-2023-37450, which is classified as urgent by upstream and is being actively exploited.
Promoting to Highest severity. I will let this run overnight.
follow-up: 11 comment:10 by , 21 months ago
Replying to Douglas R. Reno:
This needs https://github.com/WebKit/WebKit/commit/4f99c0670d2d91dbc51725a7af6909e186db1b07 to fix CVE-2023-37450, which is classified as urgent by upstream and is being actively exploited.
Promoting to Highest severity. I will let this run overnight.
Note that we've no evidence this is the fix for CVE-2023-37450 yet, but we know it's a security fix and the security issue is very likely CVE-2023-37450.
comment:11 by , 21 months ago
Replying to Xi Ruoyao:
Replying to Douglas R. Reno:
This needs https://github.com/WebKit/WebKit/commit/4f99c0670d2d91dbc51725a7af6909e186db1b07 to fix CVE-2023-37450, which is classified as urgent by upstream and is being actively exploited.
Promoting to Highest severity. I will let this run overnight.
Note that we've no evidence this is the fix for CVE-2023-37450 yet, but we know it's a security fix and the security issue is very likely CVE-2023-37450.
This is a good point, we don't have concrete evidence that it's CVE-2023-37450 just yet. It is worth noting though that on https://support.apple.com/en-us/HT201222, we would be classified as Safari 16.5.2 since WebKit 2.40 tracks Safari 16.5, and CVE-2023-32439 was fixed in WebKitGTK-2.40.x at the same time it was fixed in Safari 16.5.1
Apple hasn't updated their security updates website just yet with the bug number for CVE-2023-37450 though :(
Red Hat has some good advice that we'll put into the SA. It is to disable WASM with an environment variable as a temporary workaround (https://access.redhat.com/security/cve/CVE-2023-37450) - the catch being that some websites will break which use WASM (and some modern JS frameworks make heavy use of that)
For now let's treat it as if CVE-2023-37450 is fixed here but if anything else comes out let's make sure to bring it up here
comment:12 by , 21 months ago
I've installed it with https://github.com/WebKit/WebKit/commit/4f99c0670d2d91dbc51725a7af6909e186db1b07.patch. There seems no regressions so far.
follow-up: 14 comment:13 by , 21 months ago
WebKit 2.40.4 was released this morning with the following release note:
What's new in the WebKitGTK 2.40.4 release? =========================================== - Fix a bug in JavaScript reading variable arguments in a call.
Until we have confirmation that the CVE was fixed, what I think we'll do is update anyway and file an SA once we get the confirmation.
comment:14 by , 21 months ago
Replying to Douglas R. Reno:
WebKit 2.40.4 was released this morning with the following release note:
What's new in the WebKitGTK 2.40.4 release? =========================================== - Fix a bug in JavaScript reading variable arguments in a call.Until we have confirmation that the CVE was fixed, what I think we'll do is update anyway and file an SA once we get the confirmation.
Hmm, I'm really puzzled. If this is the CVE fix why don't they mention it here? If not why the Bugzilla ticket is classified?
comment:15 by , 21 months ago
Confirmed, it does have the CVE fix:
------------------------------------------------------------------------ WebKitGTK and WPE WebKit Security Advisory WSA-2023-0006 ------------------------------------------------------------------------ Date reported : July 21, 2023 Advisory ID : WSA-2023-0006 WebKitGTK Advisory URL : https://webkitgtk.org/security/WSA-2023-0006.html WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2023-0006.html CVE identifiers : CVE-2023-37450, CVE-2023-32393. Several vulnerabilities were discovered in WebKitGTK and WPE WebKit. CVE-2023-37450 Versions affected: WebKitGTK and WPE WebKit before 2.40.4. Credit to an anonymous researcher. Impact: Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Description: The issue was addressed with improved checks. CVE-2023-32393 Versions affected: WebKitGTK and WPE WebKit before 2.40.0. Credit to Francisco Alonso (@revskills). Impact: Processing web content may lead to arbitrary code execution. Description: The issue was addressed with improved memory handling. We recommend updating to the latest stable versions of WebKitGTK and WPE WebKit. It is the best way to ensure that you are running safe versions of WebKit. Please check our websites for information about the latest stable releases. Further information about WebKitGTK and WPE WebKit security advisories can be found at: https://webkitgtk.org/security.html or https://wpewebkit.org/security/. The WebKitGTK and WPE WebKit team, July 21, 2023 _______________________________________________ webkit-gtk mailing list webkit-gtk@lists.webkit.org https://lists.webkit.org/mailman/listinfo/webkit-gtk
comment:16 by , 21 months ago
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
Fixed at 053e0a13afa9f6bab02aa412f0061859f9b259e2
SA-11.3-061 issued.
What’s new in the WebKitGTK 2.41.6 release?