[ASA-202107-68] wpewebkit: multiple issues
Jonas Witschel
diabonas at archlinux.org
Fri Jul 30 22:30:11 UTC 2021
Arch Linux Security Advisory ASA-202107-68
==========================================
Severity: High
Date : 2021-07-27
CVE-ID : CVE-2021-21775 CVE-2021-21779 CVE-2021-30663 CVE-2021-30665
CVE-2021-30689 CVE-2021-30720 CVE-2021-30734 CVE-2021-30744
CVE-2021-30749 CVE-2021-30795 CVE-2021-30797 CVE-2021-30799
Package : wpewebkit
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-2221
Summary
=======
The package wpewebkit before version 2.32.3-1 is vulnerable to multiple
issues including arbitrary code execution, access restriction bypass,
cross-site scripting and information disclosure.
Resolution
==========
Upgrade to 2.32.3-1.
# pacman -Syu "wpewebkit>=2.32.3-1"
The problems have been fixed upstream in version 2.32.3.
Workaround
==========
None.
Description
===========
- CVE-2021-21775 (information disclosure)
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. A use-after-free vulnerability exists in the way certain events
are processed for ImageLoader objects of WebKit. A specially crafted
web page can lead to a potential information leak and further memory
corruption. In order to trigger the vulnerability, a victim must be
tricked into visiting a malicious webpage.
- CVE-2021-21779 (information disclosure)
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. A use-after-free vulnerability exists in the way that WebKit
GraphicsContext handles certain events. A specially crafted web page
can lead to a potential information leak and further memory corruption.
A victim must be tricked into visiting a malicious web page to trigger
this vulnerability.
- CVE-2021-30663 (arbitrary code execution)
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
arbitrary code execution.
- CVE-2021-30665 (arbitrary code execution)
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
arbitrary code execution. Apple is aware of a report that this issue
may have been actively exploited.
- CVE-2021-30689 (cross-site scripting)
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
universal cross site scripting.
- CVE-2021-30720 (access restriction bypass)
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. A malicious website may be able to access restricted ports on
arbitrary servers.
- CVE-2021-30734 (arbitrary code execution)
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
arbitrary code execution.
- CVE-2021-30744 (cross-site scripting)
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
universal cross site scripting.
- CVE-2021-30749 (arbitrary code execution)
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
arbitrary code execution.
- CVE-2021-30795 (arbitrary code execution)
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
arbitrary code execution.
- CVE-2021-30797 (arbitrary code execution)
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to code
execution.
- CVE-2021-30799 (arbitrary code execution)
A security issue has been found in WebKitGTK and WPE WebKit before
2.32.3. Processing maliciously crafted web content may lead to
arbitrary code execution.
Impact
======
A remote attacker could execute arbitrary code or disclose sensitive
information through crafted web content. Apple is aware of a report
that one of the arbitrary code execution issues may have been actively
exploited.
References
==========
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-21775
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1229
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-21779
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1238
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30663
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30665
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30689
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30720
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30734
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30744
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30749
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30795
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30797
https://webkitgtk.org/security/WSA-2021-0004.html#CVE-2021-30799
https://security.archlinux.org/CVE-2021-21775
https://security.archlinux.org/CVE-2021-21779
https://security.archlinux.org/CVE-2021-30663
https://security.archlinux.org/CVE-2021-30665
https://security.archlinux.org/CVE-2021-30689
https://security.archlinux.org/CVE-2021-30720
https://security.archlinux.org/CVE-2021-30734
https://security.archlinux.org/CVE-2021-30744
https://security.archlinux.org/CVE-2021-30749
https://security.archlinux.org/CVE-2021-30795
https://security.archlinux.org/CVE-2021-30797
https://security.archlinux.org/CVE-2021-30799
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20210731/10ceb794/attachment.sig>
More information about the arch-security
mailing list