[manjaro-security] [ASA-202103-25] wpewebkit: multiple issues

Morten Linderud via arch-security arch-security at lists.archlinux.org
Fri Mar 26 21:14:59 CET 2021


Arch Linux Security Advisory ASA-202103-25
==========================================

Severity: High
Date    : 2021-03-25
CVE-ID  : CVE-2020-27918 CVE-2020-29623 CVE-2021-1765 CVE-2021-1789
          CVE-2021-1799  CVE-2021-1801  CVE-2021-1870
Package : wpewebkit
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1722

Summary
=======

The package wpewebkit before version 2.30.6-1 is vulnerable to multiple
issues including arbitrary code execution, access restriction bypass,
information disclosure and sandbox escape.

Resolution
==========

Upgrade to 2.30.6-1.

# pacman -Syu "wpewebkit>=2.30.6-1"

The problems have been fixed upstream in version 2.30.6.

Workaround
==========

None.

Description
===========

- CVE-2020-27918 (arbitrary code execution)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. Processing maliciously crafted web content may
lead to arbitrary code execution.

- CVE-2020-29623 (information disclosure)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. “Clear History and Website Data” did not clear
the history in some circumstances.

- CVE-2021-1765 (sandbox escape)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. Maliciously crafted web content may violate
iframe sandboxing policy.

- CVE-2021-1789 (arbitrary code execution)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. Processing maliciously crafted web content may
lead to arbitrary code execution.

- CVE-2021-1799 (access restriction bypass)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. A malicious website may be able to access
restricted ports on arbitrary servers.

- CVE-2021-1801 (sandbox escape)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. Maliciously crafted web content may violate
iframe sandboxing policy.

- CVE-2021-1870 (arbitrary code execution)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. A remote attacker may be able to cause arbitrary
code execution. Apple is aware of a report that this issue may have
been actively exploited.

Impact
======

A remote attacker is able to use maliciously crafted web content to
execute arbitrary code or violate the iframe policy. A malicious server
could access restricted ports.

References
==========

https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2020-27918
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2020-29623
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1765
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1789
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1799
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1801
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1870
https://security.archlinux.org/CVE-2020-27918
https://security.archlinux.org/CVE-2020-29623
https://security.archlinux.org/CVE-2021-1765
https://security.archlinux.org/CVE-2021-1789
https://security.archlinux.org/CVE-2021-1799
https://security.archlinux.org/CVE-2021-1801
https://security.archlinux.org/CVE-2021-1870
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20210326/bd8a88b2/attachment.sig>


More information about the manjaro-security mailing list