Gentoo Archives: gentoo-announce

From: Aaron Bauman <bman@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201710-14 ] WebKitGTK+: Multiple Vulnerabilities
Date: Fri, 13 Oct 2017 23:58:03
Message-Id: 10218148.eYrUc1anZU@localhost.localdomain
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201710-14
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: WebKitGTK+: Multiple Vulnerabilities
9 Date: October 13, 2017
10 Bugs: #626142
11 ID: 201710-14
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been found in WebkitGTK+, the worst of
19 which may allow remote attackers to execute arbitrary code.
20
21 Background
22 ==========
23
24 WebKitGTK+ is a full-featured port of the WebKit rendering engine,
25 suitable for projects requiring any kind of web integration, offers
26 Webkit’s full functionality and is used on a wide range of systems.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 net-libs/webkit-gtk < 2.16.6:4 >= 2.16.6:4
35
36 Description
37 ===========
38
39 Multiple vulnerabilities have been discovered in WebkitGTK+. Please
40 review the references below for details.
41
42 Impact
43 ======
44
45 A remote attacker could execute arbitrary code, cause a Denial of
46 Service condition, bypass intended memory-read restrictions, conduct a
47 timing side-channel attack to bypass the Same Origin Policy, obtain
48 sensitive information, or spoof the address bar.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All WebKitGTK+ users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.16.6"
62
63 Packages which depend on this library may need to be recompiled. Tools
64 such as revdep-rebuild may assist in identifying some of these
65 packages.
66
67 References
68 ==========
69
70 [ 1 ] CVE-2017-7006
71 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7006
72 [ 2 ] CVE-2017-7011
73 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7011
74 [ 3 ] CVE-2017-7012
75 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7012
76 [ 4 ] CVE-2017-7018
77 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7018
78 [ 5 ] CVE-2017-7019
79 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7019
80 [ 6 ] CVE-2017-7020
81 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7020
82 [ 7 ] CVE-2017-7030
83 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7030
84 [ 8 ] CVE-2017-7034
85 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7034
86 [ 9 ] CVE-2017-7037
87 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7037
88 [ 10 ] CVE-2017-7038
89 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7038
90 [ 11 ] CVE-2017-7039
91 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7039
92 [ 12 ] CVE-2017-7040
93 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7040
94 [ 13 ] CVE-2017-7041
95 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7041
96 [ 14 ] CVE-2017-7042
97 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7042
98 [ 15 ] CVE-2017-7043
99 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7043
100
101 Availability
102 ============
103
104 This GLSA and any updates to it are available for viewing at
105 the Gentoo Security Website:
106
107 https://security.gentoo.org/glsa/201710-14
108
109 Concerns?
110 =========
111
112 Security is a primary focus of Gentoo Linux and ensuring the
113 confidentiality and security of our users' machines is of utmost
114 importance to us. Any security concerns should be addressed to
115 security@g.o or alternatively, you may file a bug at
116 https://bugs.gentoo.org.
117
118 License
119 =======
120
121 Copyright 2017 Gentoo Foundation, Inc; referenced text
122 belongs to its owner(s).
123
124 The contents of this document are licensed under the
125 Creative Commons - Attribution / Share Alike license.
126
127 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature