webkit2gtk3-2.46.1-2.el9_4

エラータID: AXSA:2024-8945:04

Release date: 
Monday, October 28, 2024 - 13:20
Subject: 
webkit2gtk3-2.46.1-2.el9_4
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)
* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)
* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2024-23271
A logic issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, Safari 17.3, tvOS 17.3, macOS Sonoma 14.3, watchOS 10.3. A malicious website may cause unexpected cross-origin behavior.
CVE-2024-27820
The issue was addressed with improved memory handling. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing web content may lead to arbitrary code execution.
CVE-2024-27838
The issue was addressed by adding additional logic. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A maliciously crafted webpage may be able to fingerprint the user.
CVE-2024-27851
The issue was addressed with improved bounds checks. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2024-40776
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2024-40779
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2024-40780
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2024-40782
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2024-40789
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2024-40866
The issue was addressed with improved UI. This issue is fixed in Safari 18, macOS Sequoia 15. Visiting a malicious website may lead to address bar spoofing.
CVE-2024-44187
A cross-origin issue existed with "iframe" elements. This was addressed with improved tracking of security origins. This issue is fixed in Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. webkit2gtk3-2.46.1-2.el9_4.src.rpm
    MD5: 00300d1858149ca291eeddea408bbe11
    SHA-256: b87a5475f675c49290b50d0178f90388d1154ad39b3644fd98bd5b704b79e0c1
    Size: 40.98 MB

Asianux Server 9 for x86_64
  1. webkit2gtk3-2.46.1-2.el9_4.i686.rpm
    MD5: 883c0648216f05ab82ea6e84c8f9583d
    SHA-256: bc2d9331d5279d6ae3a78b5ff030e06cad98379813dcc01d64af19259c435dde
    Size: 29.80 MB
  2. webkit2gtk3-2.46.1-2.el9_4.x86_64.rpm
    MD5: 1c5636d35f5b10c1ca2a048d49d11e1b
    SHA-256: fe90aa4a2a5ff9e18a66fa735d0efc5afd58cf14b07a217c586cde6e4fcc3ca2
    Size: 24.83 MB
  3. webkit2gtk3-devel-2.46.1-2.el9_4.i686.rpm
    MD5: 2949d94999aebbf7167f29818e0e7a5f
    SHA-256: dbf5d5776ecb9de4496e72828ed3c4c31485bd68ab0d4c1eadb94435b727b001
    Size: 374.90 kB
  4. webkit2gtk3-devel-2.46.1-2.el9_4.x86_64.rpm
    MD5: f0e7a2f7244d691c887460916377ce47
    SHA-256: 34498e63a8597151ba3ec6dc229b0488df3091a0e924373f3114bf08b3d57e5e
    Size: 367.72 kB
  5. webkit2gtk3-jsc-2.46.1-2.el9_4.i686.rpm
    MD5: b869afa2f4c5097bfef84f8a2da75fa8
    SHA-256: 32490ae498ff6653ff37bb621675bd1a52985e553d0304aa4c327c45fba1d7a9
    Size: 4.18 MB
  6. webkit2gtk3-jsc-2.46.1-2.el9_4.x86_64.rpm
    MD5: 32a42ad085226438884253f53c9b92f3
    SHA-256: 5513f49815f66d7dd05080179a374d3282f1cff6c9202bf563a87b479c36057e
    Size: 4.43 MB
  7. webkit2gtk3-jsc-devel-2.46.1-2.el9_4.i686.rpm
    MD5: 0c76503bb8ed54b80d33c1e1500eb55e
    SHA-256: 1251a9f32755f0c75e5905f1fd7ef67dbda1d598dcbcba7f72f7762ed851186e
    Size: 183.96 kB
  8. webkit2gtk3-jsc-devel-2.46.1-2.el9_4.x86_64.rpm
    MD5: 24fc2f0463e57e39ea2fa5ef7d317924
    SHA-256: 68faa1247384064772d99500d942cbdffd00277b8f8a5b897c6f0cb7638b10df
    Size: 170.26 kB