Opened 4 weeks ago

Closed 2 weeks ago

#19805 closed enhancement (fixed)

webkitgtk-2.44.2

Reported by: Douglas R. Reno Owned by: Douglas R. Reno
Priority: elevated Milestone: 12.2
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

New point version

Change History (7)

comment:1 by Douglas R. Reno, 4 weeks ago

Priority: normalelevated

comment:2 by Xi Ruoyao, 4 weeks ago

What's new in WebKitGTK 2.44.2?

  • Make gamepads visible on axis movements, and not only on button presses.
  • Disable the gst-libav AAC decoder.
  • Make user scripts and style sheets visible in the Web Inspector.
  • Use the geolocation portal where available, with the existing geoclue as fallback if the portal is not usable.
  • Use the printing portal when running sandboxed.
  • Use the file transfer portal for drag and drop when running sandboxed.
  • Avoid notifying an empty cursor rectangle to input methods.
  • Remove empty bar shown in detached inspector windows.
  • Consider keycode when activating application accelerators.
  • Fix the build with ENABLE_WEBAUDIO disabled.
  • Fix several crashes and rendering issues.

comment:3 by Rahul Chandra, 4 weeks ago

I can't get it to build with gcc 14

comment:4 by Rahul Chandra, 3 weeks ago

Using CC=clang CXX=clang++ seems to have fixed it

comment:5 by Douglas R. Reno, 3 weeks ago

------------------------------------------------------------------------
WebKitGTK and WPE WebKit Security Advisory                 WSA-2024-0003
------------------------------------------------------------------------

Date reported           : May 21, 2024
Advisory ID             : WSA-2024-0003
WebKitGTK Advisory URL  : https://webkitgtk.org/security/WSA-2024-0003.html
WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2024-0003.html
CVE identifiers         : CVE-2024-27834.

Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.

CVE-2024-27834
    Versions affected: WebKitGTK and WPE WebKit before 2.44.2.
    Manfred Paul working with Trend Micro's Zero Day Initiative.
    Impact: An attacker with arbitrary read and write capability may be
    able to bypass Pointer Authentication. Description: The issue was
    addressed with improved checks.
    WebKit Bugzilla: 272750

comment:6 by Douglas R. Reno, 3 weeks ago

Owner: changed from blfs-book to Douglas R. Reno
Status: newassigned

comment:7 by Douglas R. Reno, 2 weeks ago

Resolution: fixed
Status: assignedclosed

SA-12.1-050 issued

Fixed at fe468141213d4446d471e6e79fe246c3410ea177

Note: See TracTickets for help on using tickets.