Gentoo Archives: gentoo-announce

From: Aaron Bauman <bman@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201812-04 ] WebkitGTK+: Multiple vulnerabilities
Date: Sun, 02 Dec 2018 15:59:19
Message-Id: 20181202155117.GD16376@monkey
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201812-04
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: WebkitGTK+: Multiple vulnerabilities
9 Date: December 02, 2018
10 Bugs: #667892
11 ID: 201812-04
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been found in WebKitGTK+, the worst of
19 which may lead to arbitrary code execution.
20
21 Background
22 ==========
23
24 WebKitGTK+ is a full-featured port of the WebKit rendering engine,
25 suitable for projects requiring any kind of web integration, from
26 hybrid HTML/CSS applications to full-fledged web browsers.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 net-libs/webkit-gtk < 2.22.0 >= 2.22.0
35
36 Description
37 ===========
38
39 Multiple vulnerabilities have been discovered in WebKitGTK+. Please
40 review the referenced CVE identifiers for details.
41
42 Impact
43 ======
44
45 A remote attacker could execute arbitrary commands or cause a Denial of
46 Service condition via maliciously crafted web content.
47
48 Workaround
49 ==========
50
51 There is no known workaround at this time.
52
53 Resolution
54 ==========
55
56 All WebkitGTK+ users should upgrade to the latest version:
57
58 # emerge --sync
59 # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.22.0"
60
61 References
62 ==========
63
64 [ 1 ] CVE-2018-4191
65 https://nvd.nist.gov/vuln/detail/CVE-2018-4191
66 [ 2 ] CVE-2018-4197
67 https://nvd.nist.gov/vuln/detail/CVE-2018-4197
68 [ 3 ] CVE-2018-4207
69 https://nvd.nist.gov/vuln/detail/CVE-2018-4207
70 [ 4 ] CVE-2018-4208
71 https://nvd.nist.gov/vuln/detail/CVE-2018-4208
72 [ 5 ] CVE-2018-4209
73 https://nvd.nist.gov/vuln/detail/CVE-2018-4209
74 [ 6 ] CVE-2018-4210
75 https://nvd.nist.gov/vuln/detail/CVE-2018-4210
76 [ 7 ] CVE-2018-4212
77 https://nvd.nist.gov/vuln/detail/CVE-2018-4212
78 [ 8 ] CVE-2018-4213
79 https://nvd.nist.gov/vuln/detail/CVE-2018-4213
80 [ 9 ] CVE-2018-4299
81 https://nvd.nist.gov/vuln/detail/CVE-2018-4299
82 [ 10 ] CVE-2018-4306
83 https://nvd.nist.gov/vuln/detail/CVE-2018-4306
84 [ 11 ] CVE-2018-4309
85 https://nvd.nist.gov/vuln/detail/CVE-2018-4309
86 [ 12 ] CVE-2018-4311
87 https://nvd.nist.gov/vuln/detail/CVE-2018-4311
88 [ 13 ] CVE-2018-4312
89 https://nvd.nist.gov/vuln/detail/CVE-2018-4312
90 [ 14 ] CVE-2018-4314
91 https://nvd.nist.gov/vuln/detail/CVE-2018-4314
92 [ 15 ] CVE-2018-4315
93 https://nvd.nist.gov/vuln/detail/CVE-2018-4315
94 [ 16 ] CVE-2018-4316
95 https://nvd.nist.gov/vuln/detail/CVE-2018-4316
96 [ 17 ] CVE-2018-4317
97 https://nvd.nist.gov/vuln/detail/CVE-2018-4317
98 [ 18 ] CVE-2018-4318
99 https://nvd.nist.gov/vuln/detail/CVE-2018-4318
100 [ 19 ] CVE-2018-4319
101 https://nvd.nist.gov/vuln/detail/CVE-2018-4319
102 [ 20 ] CVE-2018-4323
103 https://nvd.nist.gov/vuln/detail/CVE-2018-4323
104 [ 21 ] CVE-2018-4328
105 https://nvd.nist.gov/vuln/detail/CVE-2018-4328
106 [ 22 ] CVE-2018-4358
107 https://nvd.nist.gov/vuln/detail/CVE-2018-4358
108 [ 23 ] CVE-2018-4359
109 https://nvd.nist.gov/vuln/detail/CVE-2018-4359
110 [ 24 ] CVE-2018-4361
111 https://nvd.nist.gov/vuln/detail/CVE-2018-4361
112
113 Availability
114 ============
115
116 This GLSA and any updates to it are available for viewing at
117 the Gentoo Security Website:
118
119 https://security.gentoo.org/glsa/201812-04
120
121 Concerns?
122 =========
123
124 Security is a primary focus of Gentoo Linux and ensuring the
125 confidentiality and security of our users' machines is of utmost
126 importance to us. Any security concerns should be addressed to
127 security@g.o or alternatively, you may file a bug at
128 https://bugs.gentoo.org.
129
130 License
131 =======
132
133 Copyright 2018 Gentoo Foundation, Inc; referenced text
134 belongs to its owner(s).
135
136 The contents of this document are licensed under the
137 Creative Commons - Attribution / Share Alike license.
138
139 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature