Pop-Up Thingie

>>> Magnum BBS <<<
  • Home
  • Forum
  • Files
  • Log in

  1. Forum
  2. Usenet
  3. LINUX.GENTOO.ANNOUNCE
  • [gentoo-announce] [ GLSA 202305-32 ] WebKitGTK+: Multiple Vulnerabiliti

    From glsamaker@gentoo.org@21:1/5 to All on Tue May 30 05:20:02 2023
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202305-32
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: WebKitGTK+: Multiple Vulnerabilities
    Date: May 30, 2023
    Bugs: #871732, #879571, #888563, #905346, #905349, #905351
    ID: 202305-32

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been found in WebkitGTK+, the worst of
    which could result in arbitrary code execution.

    Background
    ==========

    WebKitGTK+ is a full-featured port of the WebKit rendering engine,
    suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.

    Affected packages
    =================

    Package Vulnerable Unaffected
    ------------------- ------------ ------------
    net-libs/webkit-gtk < 2.40.1 >= 2.40.1

    Description
    ===========

    Multiple vulnerabilities have been discovered in WebKitGTK+. Please
    review the CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All WebKitGTK+ users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.40.1"

    References
    ==========

    [ 1 ] CVE-2022-32885
    https://nvd.nist.gov/vuln/detail/CVE-2022-32885
    [ 2 ] CVE-2022-32886
    https://nvd.nist.gov/vuln/detail/CVE-2022-32886
    [ 3 ] CVE-2022-32888
    https://nvd.nist.gov/vuln/detail/CVE-2022-32888
    [ 4 ] CVE-2022-32891
    https://nvd.nist.gov/vuln/detail/CVE-2022-32891
    [ 5 ] CVE-2022-32923
    https://nvd.nist.gov/vuln/detail/CVE-2022-32923
    [ 6 ] CVE-2022-42799
    https://nvd.nist.gov/vuln/detail/CVE-2022-42799
    [ 7 ] CVE-2022-42823
    https://nvd.nist.gov/vuln/detail/CVE-2022-42823
    [ 8 ] CVE-2022-42824
    https://nvd.nist.gov/vuln/detail/CVE-2022-42824
    [ 9 ] CVE-2022-42826
    https://nvd.nist.gov/vuln/detail/CVE-2022-42826
    [ 10 ] CVE-2022-42852
    https://nvd.nist.gov/vuln/detail/CVE-2022-42852
    [ 11 ] CVE-2022-42856
    https://nvd.nist.gov/vuln/detail/CVE-2022-42856
    [ 12 ] CVE-2022-42863
    https://nvd.nist.gov/vuln/detail/CVE-2022-42863
    [ 13 ] CVE-2022-42867
    https://nvd.nist.gov/vuln/detail/CVE-2022-42867
    [ 14 ] CVE-2022-46691
    https://nvd.nist.gov/vuln/detail/CVE-2022-46691
    [ 15 ] CVE-2022-46692
    https://nvd.nist.gov/vuln/detail/CVE-2022-46692
    [ 16 ] CVE-2022-46698
    https://nvd.nist.gov/vuln/detail/CVE-2022-46698
    [ 17 ] CVE-2022-46699
    https://nvd.nist.gov/vuln/detail/CVE-2022-46699
    [ 18 ] CVE-2022-46700
    https://nvd.nist.gov/vuln/detail/CVE-2022-46700
    [ 19 ] CVE-2023-23517
    https://nvd.nist.gov/vuln/detail/CVE-2023-23517
    [ 20 ] CVE-2023-23518
    https://nvd.nist.gov/vuln/detail/CVE-2023-23518
    [ 21 ] CVE-2023-23529
    https://nvd.nist.gov/vuln/detail/CVE-2023-23529
    [ 22 ] CVE-2023-25358
    https://nvd.nist.gov/vuln/detail/CVE-2023-25358
    [ 23 ] CVE-2023-25360
    https://nvd.nist.gov/vuln/detail/CVE-2023-25360
    [ 24 ] CVE-2023-25361
    https://nvd.nist.gov/vuln/detail/CVE-2023-25361
    [ 25 ] CVE-2023-25362
    https://nvd.nist.gov/vuln/detail/CVE-2023-25362
    [ 26 ] CVE-2023-25363
    https://nvd.nist.gov/vuln/detail/CVE-2023-25363
    [ 27 ] CVE-2023-27932
    https://nvd.nist.gov/vuln/detail/CVE-2023-27932
    [ 28 ] CVE-2023-27954
    https://nvd.nist.gov/vuln/detail/CVE-2023-27954
    [ 29 ] CVE-2023-28205
    https://nvd.nist.gov/vuln/detail/CVE-2023-28205
    [ 30 ] WSA-2022-0009
    https://webkitgtk.org/security/WSA-2022-0009.html
    [ 31 ] WSA-2022-0010
    https://webkitgtk.org/security/WSA-2022-0010.html
    [ 32 ] WSA-2023-0001
    https://webkitgtk.org/security/WSA-2023-0001.html
    [ 33 ] WSA-2023-0002
    https://webkitgtk.org/security/WSA-2023-0002.html
    [ 34 ] WSA-2023-0003
    https://webkitgtk.org/security/WSA-2023-0003.html

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202305-32

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2023 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmR1ZykACgkQFMQkOaVy +9nXHhAAqv4NJ5/+7vAHO028Czfmg6Lh4i3V5XedlyQ2t5r8B1S9C180BVk51ICr bU+nKIxc1tN61UGhI/aTVdTD4Bla/AvXNYIKywG1OMBKlanqhgFiPa8Cd4H+kMJR vv37bA0J/aboW3HoVsSLVow4woy6882tnmnvGpwDtxvAOJul8XtSYuwV2Ol3HSrA HBxFnMaz/iV85lrSA9tbjBsjeGUCeME4UC/zy+Li7UamvKeP4nb40lD5FZo1vUr4 LjVETOmm2/ED9vgzbahbXk7bdl9SspfRfm7CKTo6wGjc1fbUbXg4CNlcyUx4r67A 9DXwLjqnZ3wb4XfBIRfjquhC9okzk0cAjSQgjAVKFTSrCkcIRXWwoOCuoqU99jKf ryU8XbxpLswI7u5LfhIqfARLEvQw38F97VMyGaJrGx2t/pF9XtxRyCAC6tHVjN9F 7tsdv84nlP/3yNV8It6z99jOr5ga1jD2vzSpBsmO+RWA34/ekEPmwTos2cD6MnH9 3Nw1VpVp+qheiWFjOksIhD+Zoi5ZQFj+ItLVo/R9kr0T8QozOYJbJvVbQqoKMkOd 5j0c6WD41DptEshNJv6M2iGfB1AAAiBhX/pBq+k/rFDlWrlT7CuVoZqa9nNP8bvW 2+Q8CsxLqzzSO4IMApwBQ2oXptUSwudYclO8wiSY5QyAnK6Svvg=
    =SQpz
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • Who's Online

  • Recent Visitors

    • Plume
      Sun Sep 14 09:34:52 2025
      from Uk via Raw
    • Gretchiie
      Sun Sep 14 06:07:30 2025
      from Derry, Nh via Telnet
    • Thlc
      Sat Sep 13 17:11:34 2025
      from Rognac, France via Telnet
    • Thlc
      Sat Sep 13 17:04:03 2025
      from Rognac, France via Telnet
    • Thlc
      Sat Sep 13 16:32:19 2025
      from Rognac, France via SSH
    • Thlc
      Sat Sep 13 15:41:11 2025
      from Rognac, France via SSH
    • Thlc
      Sat Sep 13 07:56:03 2025
      from Rognac, France via SSH
    • Gretchiie
      Sat Sep 13 07:22:10 2025
      from Derry, Nh via Telnet
  • System Info

    Sysop: Keyop
    Location: Huddersfield, West Yorkshire, UK
    Users: 546
    Nodes: 16 (1 / 15)
    Uptime: 160:25:09
    Calls: 10,385
    Calls today: 2
    Files: 14,056
    Messages: 6,416,493

© >>> Magnum BBS <<<, 2025