Gentoo update for WebKitGTK+



Published: 2022-09-01 | Updated: 2022-11-13
Risk Critical
Patch available YES
Number of vulnerabilities 21
CVE-ID CVE-2022-22589
CVE-2022-22590
CVE-2022-22592
CVE-2022-22620
CVE-2022-22624
CVE-2022-22628
CVE-2022-22629
CVE-2022-22662
CVE-2022-22677
CVE-2022-2294
CVE-2022-26700
CVE-2022-26709
CVE-2022-26710
CVE-2022-26716
CVE-2022-26717
CVE-2022-26719
CVE-2022-30293
CVE-2022-30294
CVE-2022-32784
CVE-2022-32792
CVE-2022-32893
CWE-ID CWE-94
CWE-416
CWE-254
CWE-122
CWE-200
CWE-399
CWE-119
CWE-787
Exploitation vector Network
Public exploit Vulnerability #4 is being exploited in the wild.
Public exploit code for vulnerability #7 is available.
Vulnerability #10 is being exploited in the wild.
Public exploit code for vulnerability #15 is available.
Vulnerability #21 is being exploited in the wild.
Vulnerable software
Subscribe
Gentoo Linux
Operating systems & Components / Operating system

net-libs/webkit-gtk
Operating systems & Components / Operating system package or component

Vendor Gentoo

Security Bulletin

This security bulletin contains information about 21 vulnerabilities.

1) Code Injection

EUVDB-ID: #VU60036

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-22589

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary JavaScript code on the system.

The vulnerability exists due to improper input validation in WebKit when processing email messages. A remote attacker can trick the victim to open a specially crafted email message and execute arbitrary JavaScript code on the system.


Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Use-after-free

EUVDB-ID: #VU60037

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-22590

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to open a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Security features bypass

EUVDB-ID: #VU60038

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-22592

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to a logic issue when processing HTML content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into visiting it and prevent Content Security Policy from being enforced.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Use-after-free

EUVDB-ID: #VU60520

Risk: Critical

CVSSv3.1:

CVE-ID: CVE-2022-22620

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Note, the vulnerability is being actively exploited in the wild.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

5) Use-after-free

EUVDB-ID: #VU61335

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-22624

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

6) Use-after-free

EUVDB-ID: #VU61336

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-22628

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

7) Heap-based buffer overflow

EUVDB-ID: #VU61337

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-22629

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content within the WebGLMultiDraw component. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

8) Information disclosure

EUVDB-ID: #VU61333

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-22662

CWE-ID: CWE-200 - Information Exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a cookie management issue in WebKit. A remote attacker can trick the victim to open a specially crafted webpage and gain access to sensitive information.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

9) Resource management error

EUVDB-ID: #VU63285

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-22677

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack.

The vulnerability exists due to a logic issue in video self-preview feature in a webRTC call, which can be interrupted if the user answers a phone call.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

10) Heap-based buffer overflow

EUVDB-ID: #VU64910

Risk: Critical

CVSSv3.1:

CVE-ID: CVE-2022-2294

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within WebRTC implementation. A remote attacker can trick the victim ti visit a specially crafted website, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note, the vulnerability is being actively exploited in the wild.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

11) Buffer overflow

EUVDB-ID: #VU63279

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-26700

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

12) Use-after-free

EUVDB-ID: #VU63280

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-26709

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

13) Use-after-free

EUVDB-ID: #VU63281

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-26710

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

14) Buffer overflow

EUVDB-ID: #VU63283

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-26716

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

15) Use-after-free

EUVDB-ID: #VU63282

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-26717

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

16) Buffer overflow

EUVDB-ID: #VU63284

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-26719

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

17) Heap-based buffer overflow

EUVDB-ID: #VU63822

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-30293

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the WebCore::TextureMapperLayer::setContentsLayer() function in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp. A remote attacker can trick the victim into visiting a specially crafted web page, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

18) Use-after-free

EUVDB-ID: #VU63823

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-30294

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing HTML content within the WebCore::TextureMapperLayer::setContentsLayer() function in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

19) Information disclosure

EUVDB-ID: #VU65626

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-32784

CWE-ID: CWE-200 - Information Exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Safari Extensions. A remote attacker can gain unauthorized access to sensitive information on the system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

20) Out-of-bounds write

EUVDB-ID: #VU65621

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-32792

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input within the B3 JIT compiler in WebKit. A remote attacker can trick the victim into opening a specially crafted webpage, trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

21) Out-of-bounds write

EUVDB-ID: #VU66587

Risk: Critical

CVSSv3.1:

CVE-ID: CVE-2022-32893

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger an out-of-bounds write and execute arbitrary code on the target system.

Note, the vulnerability is being actively exploited in the wild.

Mitigation

Update the affected packages.
net-libs/webkit-gtk to version: 2.36.7

Vulnerable software versions

Gentoo Linux: All versions

net-libs/webkit-gtk: before 2.36.7


CPE2.3 External links

http://security.gentoo.org/glsa/202208-39

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###