webkit2gtk3-2.46.3-1.el8_10.ML.1

エラータID: AXSA:2024-9032:05

Release date: 
Thursday, November 21, 2024 - 09:14
Subject: 
webkit2gtk3-2.46.3-1.el8_10.ML.1
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

* chromium-browser: Use after free in ANGLE (CVE-2024-4558)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)
* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)
* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2024-23271
A logic issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, Safari 17.3, tvOS 17.3, macOS Sonoma 14.3, watchOS 10.3. A malicious website may cause unexpected cross-origin behavior.
CVE-2024-27820
The issue was addressed with improved memory handling. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing web content may lead to arbitrary code execution.
CVE-2024-27838
The issue was addressed by adding additional logic. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A maliciously crafted webpage may be able to fingerprint the user.
CVE-2024-27851
The issue was addressed with improved bounds checks. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2024-40779
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2024-40780
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2024-40782
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2024-40789
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2024-40866
The issue was addressed with improved UI. This issue is fixed in Safari 18, macOS Sequoia 15. Visiting a malicious website may lead to address bar spoofing.
CVE-2024-44185
The issue was addressed with improved checks. This issue is fixed in tvOS 17.6, visionOS 1.3, Safari 17.6, watchOS 10.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2024-44187
A cross-origin issue existed with "iframe" elements. This was addressed with improved tracking of security origins. This issue is fixed in Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin.
CVE-2024-44244
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 18.1 and iPadOS 18.1, watchOS 11.1, visionOS 2.1, tvOS 18.1, macOS Sequoia 15.1, Safari 18.1. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2024-44296
The issue was addressed with improved checks. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, watchOS 11.1, visionOS 2.1, macOS Sequoia 15.1, Safari 18.1. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.
CVE-2024-4558
Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. webkit2gtk3-2.46.3-1.el8_10.ML.1.src.rpm
    MD5: 7af8b0c05b516f8f7dd5c4dff3fe1c40
    SHA-256: d4611b586a8a2059a159aea24c7242b5b7d741224372f2061384b267f8abef94
    Size: 40.89 MB

Asianux Server 8 for x86_64
  1. webkit2gtk3-2.46.3-1.el8_10.ML.1.i686.rpm
    MD5: abb4f0a4b33278c6ee6cd047c1ddbdb3
    SHA-256: 7b01b9193383b12de385f6585df996b9eff11e896361d9271b131a18a9009a85
    Size: 30.66 MB
  2. webkit2gtk3-2.46.3-1.el8_10.ML.1.x86_64.rpm
    MD5: 4436f2edb580ee237e0ddfa3511bb6e2
    SHA-256: f7d276d9af6f22d770499900051fdac81cfe201c9713967fe500cd598dbd4e6a
    Size: 27.94 MB
  3. webkit2gtk3-devel-2.46.3-1.el8_10.ML.1.i686.rpm
    MD5: b55dfda246be50d39a470d5716170e5e
    SHA-256: 1ccc1562027ead43c34e1166ea8847852d45250bc2fc4ba9fcf35157a34919b9
    Size: 309.96 kB
  4. webkit2gtk3-devel-2.46.3-1.el8_10.ML.1.x86_64.rpm
    MD5: 663987820116cf553f80b6d5a444cd37
    SHA-256: 04629500e9077a887ed3293bd19cb4b73f64b0f6c50e4063a0f655c48a317823
    Size: 305.60 kB
  5. webkit2gtk3-jsc-2.46.3-1.el8_10.ML.1.i686.rpm
    MD5: 9359227b7625304d7950e1702ac2fc05
    SHA-256: b04bc7c60b8f2e894dd6e2968a8c9612362748b9091304b99d5f4894a04acd64
    Size: 4.34 MB
  6. webkit2gtk3-jsc-2.46.3-1.el8_10.ML.1.x86_64.rpm
    MD5: b32c8485c25c8e50e1c24e5bf93ed27d
    SHA-256: d832b99d4ff3f62b1d582dd93f02ca04bad1d8a1cada08418e222f15a963a642
    Size: 4.53 MB
  7. webkit2gtk3-jsc-devel-2.46.3-1.el8_10.ML.1.i686.rpm
    MD5: ad27d61cd83d01aad1937ed82ef17950
    SHA-256: cadab9e7684721d7cf3e0365e3813b4cac2b8c15d7becfde66ac7b5b9debf9d8
    Size: 177.80 kB
  8. webkit2gtk3-jsc-devel-2.46.3-1.el8_10.ML.1.x86_64.rpm
    MD5: 79b0a4ecffd3ca39d8ab759ce173cb04
    SHA-256: f433232151cd77a16e7a1433a2e319f3932a9bee3c267e4562c4d338b50b29af
    Size: 168.65 kB