SUSE SLES15 Security Update : webkit2gtk3 (SUSE-SU-2021:2762-1)

high Nessus Plugin ID 152656

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:2762-1 advisory.

- A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage. (CVE-2021-21775)

- A use-after-free vulnerability exists in the way Webkits GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.
(CVE-2021-21779)

- An integer overflow was addressed with improved input validation. (CVE-2021-30663)

- A memory corruption issue was addressed with improved state management. (CVE-2021-30665)

- A logic issue was addressed with improved state management. (CVE-2021-30689)

- A logic issue was addressed with improved restrictions. (CVE-2021-30720)

- Multiple memory corruption issues were addressed with improved memory handling. (CVE-2021-30734, CVE-2021-30749, CVE-2021-30799)

- A cross-origin issue with iframe elements was addressed with improved tracking of security origins.
(CVE-2021-30744)

- A type confusion issue was addressed with improved state handling. (CVE-2021-30758)

- A use after free issue was addressed with improved memory management. (CVE-2021-30795)

- This issue was addressed with improved checks. (CVE-2021-30797)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1188697

http://www.nessus.org/u?52745954

https://www.suse.com/security/cve/CVE-2021-21775

https://www.suse.com/security/cve/CVE-2021-21779

https://www.suse.com/security/cve/CVE-2021-30663

https://www.suse.com/security/cve/CVE-2021-30665

https://www.suse.com/security/cve/CVE-2021-30689

https://www.suse.com/security/cve/CVE-2021-30720

https://www.suse.com/security/cve/CVE-2021-30734

https://www.suse.com/security/cve/CVE-2021-30744

https://www.suse.com/security/cve/CVE-2021-30749

https://www.suse.com/security/cve/CVE-2021-30758

https://www.suse.com/security/cve/CVE-2021-30795

https://www.suse.com/security/cve/CVE-2021-30797

https://www.suse.com/security/cve/CVE-2021-30799

Plugin Details

Severity: High

ID: 152656

File Name: suse_SU-2021-2762-1.nasl

Version: 1.5

Type: local

Agent: unix

Published: 8/18/2021

Updated: 1/18/2022

Supported Sensors: Nessus Agent

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2021-30799

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:libjavascriptcoregtk-4_0-18, p-cpe:/a:novell:suse_linux:libsoup-2_4-1, p-cpe:/a:novell:suse_linux:libsoup-devel, p-cpe:/a:novell:suse_linux:libsoup-lang, p-cpe:/a:novell:suse_linux:libwebkit2gtk-4_0-37, p-cpe:/a:novell:suse_linux:libwebkit2gtk3-lang, p-cpe:/a:novell:suse_linux:typelib-1_0-JavaScriptCore-4_0, p-cpe:/a:novell:suse_linux:typelib-1_0-Soup-2_4, p-cpe:/a:novell:suse_linux:typelib-1_0-WebKit2-4_0, p-cpe:/a:novell:suse_linux:typelib-1_0-WebKit2WebExtension-4_0, p-cpe:/a:novell:suse_linux:webkit2gtk-4_0-injected-bundles, p-cpe:/a:novell:suse_linux:webkit2gtk3-devel, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/17/2021

Vulnerability Publication Date: 4/29/2021

CISA Known Exploited Dates: 11/17/2021

Reference Information

CVE: CVE-2021-21775, CVE-2021-21779, CVE-2021-30663, CVE-2021-30665, CVE-2021-30689, CVE-2021-30720, CVE-2021-30734, CVE-2021-30744, CVE-2021-30749, CVE-2021-30758, CVE-2021-30795, CVE-2021-30797, CVE-2021-30799

SuSE: SUSE-SU-2021:2762-1