webkit2gtk3-2.36.7-1.el9

エラータID: AXSA:2023-4955:02

Release date: 
Friday, February 3, 2023 - 03:20
Subject: 
webkit2gtk3-2.36.7-1.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)
* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)
* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2022-22624
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, iOS 15.4 and iPadOS 15.4, tvOS 15.4, Safari 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2022-22628
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2022-22629
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iTunes 12.12.3 for Windows, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2022-22662
A cookie management issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Big Sur 11.6.5. Processing maliciously crafted web content may disclose sensitive user information.
CVE-2022-26700
A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to code execution.
CVE-2022-26709
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2022-26710
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, tvOS 15.5, watchOS 8.6. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2022-26716
A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2022-26717
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, Safari 15.5, iTunes 12.12.4 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2022-26719
A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2022-30293
In WebKitGTK through 2.36.0 (and WPE WebKit), there is a heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. webkit2gtk3-2.36.7-1.el9.src.rpm
    MD5: d5c4dc8e1aebef1d88a8ca8e588dec9f
    SHA-256: 87c6f5131b41f0e0536a71e26cd921e8ae2590d9f92b57e7c8b0b936a25d52ee
    Size: 25.39 MB

Asianux Server 9 for x86_64
  1. webkit2gtk3-2.36.7-1.el9.x86_64.rpm
    MD5: 80b1c72da83bcacaeb6665892a572b8d
    SHA-256: aa89c20443bdb13b72384d62590bc902daa566d8a467f4dc6b06ff9bf6817d59
    Size: 15.23 MB
  2. webkit2gtk3-devel-2.36.7-1.el9.x86_64.rpm
    MD5: d4ff91258a6cc9f122d2df2812bb6a9f
    SHA-256: cda9f734fed36bd22b93e6ca6a2c48b72bf2d66216f60e84dafa3b2961af6aed
    Size: 306.51 kB
  3. webkit2gtk3-jsc-2.36.7-1.el9.x86_64.rpm
    MD5: 66da335b35ba34a3e5e8371dfdc7322c
    SHA-256: ded286f29c46303b79dde8da45b9c6a484afb303452e7405bba959833b3ccfc2
    Size: 6.25 MB
  4. webkit2gtk3-jsc-devel-2.36.7-1.el9.x86_64.rpm
    MD5: 77d61d568fe684016ebadc4e6c455301
    SHA-256: 07d4007fbe20f0db6134048b827b6c95e23dfdfebbad1f446e94e3e48c4b693f
    Size: 151.03 kB
  5. webkit2gtk3-2.36.7-1.el9.i686.rpm
    MD5: e6d2998933bf709c0fb95c910cd71684
    SHA-256: 9645bb742bda49add0f2d00bd89e9490f578cd015f68c211cea7a1b6b490aa26
    Size: 15.94 MB
  6. webkit2gtk3-devel-2.36.7-1.el9.i686.rpm
    MD5: fb5163e029903a61c9426206601be2c4
    SHA-256: e8fb14aebfcae01b8f2c4ae68792280f5ef43270eb60380e3c399f042adeb98d
    Size: 312.29 kB
  7. webkit2gtk3-jsc-2.36.7-1.el9.i686.rpm
    MD5: 8e6cf551377298fed0bfc0195f383668
    SHA-256: 25c887581012c390675824f9b46d92d3b540b8be96d42d0ca7fd1703cb91b2d2
    Size: 3.19 MB
  8. webkit2gtk3-jsc-devel-2.36.7-1.el9.i686.rpm
    MD5: 74c8e4865567a4fa7cef88eab177c817
    SHA-256: ef6cc9de6306e49701c4638b16ae8d128029b0e1e496bd6a68d1200fff449f04
    Size: 153.20 kB