[manjaro-security] [ASA-202103-25] wpewebkit: multiple issues
Morten Linderud via arch-security
arch-security at lists.archlinux.org
Fri Mar 26 21:14:59 CET 2021
Arch Linux Security Advisory ASA-202103-25
==========================================
Severity: High
Date : 2021-03-25
CVE-ID : CVE-2020-27918 CVE-2020-29623 CVE-2021-1765 CVE-2021-1789
CVE-2021-1799 CVE-2021-1801 CVE-2021-1870
Package : wpewebkit
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1722
Summary
=======
The package wpewebkit before version 2.30.6-1 is vulnerable to multiple
issues including arbitrary code execution, access restriction bypass,
information disclosure and sandbox escape.
Resolution
==========
Upgrade to 2.30.6-1.
# pacman -Syu "wpewebkit>=2.30.6-1"
The problems have been fixed upstream in version 2.30.6.
Workaround
==========
None.
Description
===========
- CVE-2020-27918 (arbitrary code execution)
A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. Processing maliciously crafted web content may
lead to arbitrary code execution.
- CVE-2020-29623 (information disclosure)
A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. “Clear History and Website Data” did not clear
the history in some circumstances.
- CVE-2021-1765 (sandbox escape)
A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. Maliciously crafted web content may violate
iframe sandboxing policy.
- CVE-2021-1789 (arbitrary code execution)
A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. Processing maliciously crafted web content may
lead to arbitrary code execution.
- CVE-2021-1799 (access restriction bypass)
A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. A malicious website may be able to access
restricted ports on arbitrary servers.
- CVE-2021-1801 (sandbox escape)
A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. Maliciously crafted web content may violate
iframe sandboxing policy.
- CVE-2021-1870 (arbitrary code execution)
A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. A remote attacker may be able to cause arbitrary
code execution. Apple is aware of a report that this issue may have
been actively exploited.
Impact
======
A remote attacker is able to use maliciously crafted web content to
execute arbitrary code or violate the iframe policy. A malicious server
could access restricted ports.
References
==========
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2020-27918
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2020-29623
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1765
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1789
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1799
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1801
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1870
https://security.archlinux.org/CVE-2020-27918
https://security.archlinux.org/CVE-2020-29623
https://security.archlinux.org/CVE-2021-1765
https://security.archlinux.org/CVE-2021-1789
https://security.archlinux.org/CVE-2021-1799
https://security.archlinux.org/CVE-2021-1801
https://security.archlinux.org/CVE-2021-1870
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20210326/bd8a88b2/attachment.sig>
More information about the manjaro-security
mailing list