[manjaro-security] [arch-security] [ASA-201702-9] webkit2gtk: multiple issues

Remi Gacogne rgacogne at archlinux.org
Sat Feb 11 16:51:01 CET 2017


Arch Linux Security Advisory ASA-201702-9
=========================================

Severity: Critical
Date    : 2017-02-11
CVE-ID  : CVE-2017-2350 CVE-2017-2354 CVE-2017-2355 CVE-2017-2356
          CVE-2017-2362 CVE-2017-2363 CVE-2017-2364 CVE-2017-2365
          CVE-2017-2366 CVE-2017-2369 CVE-2017-2371 CVE-2017-2373
Package : webkit2gtk
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-170

Summary
=======

The package webkit2gtk before version 2.14.4-1 is vulnerable to
multiple issues including arbitrary code execution, access restriction
bypass and information disclosure.

Resolution
==========

Upgrade to 2.14.4-1.

# pacman -Syu "webkit2gtk>=2.14.4-1"

The problems have been fixed upstream in version 2.14.4.

Workaround
==========

None.

Description
===========

- CVE-2017-2350 (information disclosure)

A security issue has been found in WebKitGTK+ before 2.14.4, where
processing maliciously crafted web content may exfiltrate data cross-
origin.

- CVE-2017-2354 (arbitrary code execution)

Several memory corruption issues have been found in WebKitGTK+ before
2.14.4, leading to arbitrary code execution while processing
maliciously crafted web content.

- CVE-2017-2355 (arbitrary code execution)

A memory initialization issue has been found in WebKitGTK+ before
2.14.4, leading to arbitrary code execution while processing
maliciously crafted web content.

- CVE-2017-2356 (arbitrary code execution)

Several memory corruption issues have been found in WebKitGTK+ before
2.14.4, leading to arbitrary code execution while processing
maliciously crafted web content.

- CVE-2017-2362 (arbitrary code execution)

Several memory corruption issues have been found in WebKitGTK+ before
2.14.4, leading to arbitrary code execution while processing
maliciously crafted web content.

- CVE-2017-2363 (information disclosure)

Multiple validation issues have been found in the handling of page
loading in WebKitGTK+ before 2.14.4, leading to cross-origin data
exfiltration while processing maliciously crafted web content.

- CVE-2017-2364 (information disclosure)

Multiple validation issues have been found in the handling of page
loading in WebKitGTK+ before 2.14.4, leading to cross-origin data
exfiltration while processing maliciously crafted web content.

- CVE-2017-2365 (information disclosure)

A validation issue has been found in variable handling in WebKitGTK+
before 2.14.4, leading to cross-origin data exfiltration while
processing maliciously crafted web content.

- CVE-2017-2366 (arbitrary code execution)

Several memory corruption issues have been found in WebKitGTK+ before
2.14.4, leading to arbitrary code execution while processing
maliciously crafted web content.

- CVE-2017-2369 (arbitrary code execution)

Several memory corruption issues have been found in WebKitGTK+ before
2.14.4, leading to arbitrary code execution while processing
maliciously crafted web content.

- CVE-2017-2371 (access restriction bypass)

An issue has been found in the handling of blocking popups in
WebKitGTK+ before 2.14.4, allowing a malicious website to open popups.

- CVE-2017-2373 (arbitrary code execution)

Several memory corruption issues have been found in WebKitGTK+ before
2.14.4, leading to arbitrary code execution while processing
maliciously crafted web content.

Impact
======

A remote attacker can access sensitive information, bypass access
restrictions to open popups, or execute arbitrary code on the affected
host via maliciously crafted web content.

References
==========

https://webkitgtk.org/security/WSA-2017-0002.html
https://security.archlinux.org/CVE-2017-2350
https://security.archlinux.org/CVE-2017-2354
https://security.archlinux.org/CVE-2017-2355
https://security.archlinux.org/CVE-2017-2356
https://security.archlinux.org/CVE-2017-2362
https://security.archlinux.org/CVE-2017-2363
https://security.archlinux.org/CVE-2017-2364
https://security.archlinux.org/CVE-2017-2365
https://security.archlinux.org/CVE-2017-2366
https://security.archlinux.org/CVE-2017-2369
https://security.archlinux.org/CVE-2017-2371
https://security.archlinux.org/CVE-2017-2373

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20170211/08cd932a/attachment.pgp>


More information about the manjaro-security mailing list