• [gentoo-announce] [ GLSA 202401-33 ] WebKitGTK+: Multiple Vulnerabiliti

    From glsamaker@gentoo.org@21:1/5 to All on Wed Jan 31 15:40:05 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202401-33
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: WebKitGTK+: Multiple Vulnerabilities
    Date: January 31, 2024
    Bugs: #915222, #918667
    ID: 202401-33

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been found in WebKitGTK+, the worst of
    which may lead to remote code execution.

    Background
    ==========

    WebKitGTK+ is a full-featured port of the WebKit rendering engine,
    suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.

    Affected packages
    =================

    Package Vulnerable Unaffected
    ------------------- ------------ -------------
    net-libs/webkit-gtk < 2.42.2:4 >= 2.42.2:4
    < 2.42.2:4.1 >= 2.42.2:4.1
    < 2.42.2:6 >= 2.42.2:6

    Description
    ===========

    Multiple vulnerabilities have been discovered in WebKitGTK+. Please
    review the CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All WebKitGTK+ users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.42.2"

    References
    ==========

    [ 1 ] CVE-2023-32359
    https://nvd.nist.gov/vuln/detail/CVE-2023-32359
    [ 2 ] CVE-2023-35074
    https://nvd.nist.gov/vuln/detail/CVE-2023-35074
    [ 3 ] CVE-2023-39434
    https://nvd.nist.gov/vuln/detail/CVE-2023-39434
    [ 4 ] CVE-2023-39928
    https://nvd.nist.gov/vuln/detail/CVE-2023-39928
    [ 5 ] CVE-2023-40451
    https://nvd.nist.gov/vuln/detail/CVE-2023-40451
    [ 6 ] CVE-2023-41074
    https://nvd.nist.gov/vuln/detail/CVE-2023-41074
    [ 7 ] CVE-2023-41983
    https://nvd.nist.gov/vuln/detail/CVE-2023-41983
    [ 8 ] CVE-2023-41993
    https://nvd.nist.gov/vuln/detail/CVE-2023-41993
    [ 9 ] CVE-2023-42852
    https://nvd.nist.gov/vuln/detail/CVE-2023-42852
    [ 10 ] CVE-2023-42890
    https://nvd.nist.gov/vuln/detail/CVE-2023-42890
    [ 11 ] WSA-2023-0009
    https://webkitgtk.org/security/WSA-2023-0009.html

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202401-33

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmW6WYcACgkQFMQkOaVy +9liJw/+PueM0zKTODzcCeEmRf0inQ+Yp1mAcDxQxaoTq0wiPnxD6UH7y9XC1ssu AA08kS+mLrjw1JgaaPH3Bi8a7zAIZAufTFQ2E/127jNXUS6pUS2B1L987gefHu0T a3SEH8eyG0vOpMW/Rr8/SterqFSUzAW76OYLwH6ihFTILGRM4robl0/Z4fEiZQpq SneV61O8pZ2Y9iohTNUb2et7SqQAIFqpfagN+Atc08L/EaxKrm3MxtCQua9l1vAT 2MA2y86520UIKsKh3vTjtN9nEbdhaZEvwqoBUdqsOzsk3TJdEc48qA7ti1LegKXc bpWKW7BHZeTxDCKx89OFoawdUu1RAIh5bL2DXfmi9uhT1DUMJk3K1GdXqCeCOeZY CHYW70Sbj33CJSDpMR6WvC0OMpr+SL4ypMvvAduvHnbWVY7Uwfj64WQl919dhA0h OlSS1JDWtwBce4wkqcGCbtL4k1iW6gjLL2H1aBvC2i0xdyX8xAqM/a4tZwn0IU2c fgzB+GN00+T5Rcr0uUiRjxNUlV+x/eoWIvgx4605nY/rZ4RCwjt0ldwFH/UXB2Uc Yd14aR4mCAaygPdBmZgaJQIL3VzQjrOIbjL/WD2Zpv/KwWAdP6IGGJM7SPZMyA25 dkraKjyyYObGdBccwDVk6KxLaXhThzKIjCAbHfqGsorX4UweVco=
    =A8pF
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)