SUSE SLES15 Security Update : webkit2gtk3 (SUSE-SU-2022:0703-1)

high Nessus Plugin ID 158610

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:0703-1 advisory.

- A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30934)

- A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30936, CVE-2021-30951)

- An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30952)

- An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30953)

- A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30954)

- A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30984)

- In WebKitGTK before 2.32.4, there is incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create, leading to a segmentation violation and application crash, a different vulnerability than CVE-2021-30889. (CVE-2021-45481)

- In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::ContainerNode::firstChild, a different vulnerability than CVE-2021-30889. (CVE-2021-45482)

- In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::Frame::page, a different vulnerability than CVE-2021-30889. (CVE-2021-45483)

- A validation issue was addressed with improved input sanitization. (CVE-2022-22589)

- A use after free issue was addressed with improved memory management. (CVE-2022-22590, CVE-2022-22620)

- A logic issue was addressed with improved state management. (CVE-2022-22592)

- A cross-origin issue in the IndexDB API was addressed with improved input validation. (CVE-2022-22594)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1195064

https://bugzilla.suse.com/1195735

https://bugzilla.suse.com/1196133

http://www.nessus.org/u?3469a483

https://www.suse.com/security/cve/CVE-2021-30934

https://www.suse.com/security/cve/CVE-2021-30936

https://www.suse.com/security/cve/CVE-2021-30951

https://www.suse.com/security/cve/CVE-2021-30952

https://www.suse.com/security/cve/CVE-2021-30953

https://www.suse.com/security/cve/CVE-2021-30954

https://www.suse.com/security/cve/CVE-2021-30984

https://www.suse.com/security/cve/CVE-2021-45481

https://www.suse.com/security/cve/CVE-2021-45482

https://www.suse.com/security/cve/CVE-2021-45483

https://www.suse.com/security/cve/CVE-2022-22589

https://www.suse.com/security/cve/CVE-2022-22590

https://www.suse.com/security/cve/CVE-2022-22592

https://www.suse.com/security/cve/CVE-2022-22594

https://www.suse.com/security/cve/CVE-2022-22620

Plugin Details

Severity: High

ID: 158610

File Name: suse_SU-2022-0703-1.nasl

Version: 1.3

Type: local

Agent: unix

Published: 3/5/2022

Updated: 5/6/2022

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2021-30954

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

CVSS Score Source: CVE-2022-22620

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:libjavascriptcoregtk-4_0-18, p-cpe:/a:novell:suse_linux:libwebkit2gtk-4_0-37, p-cpe:/a:novell:suse_linux:libwebkit2gtk3-lang, p-cpe:/a:novell:suse_linux:typelib-1_0-JavaScriptCore-4_0, p-cpe:/a:novell:suse_linux:typelib-1_0-WebKit2-4_0, p-cpe:/a:novell:suse_linux:typelib-1_0-WebKit2WebExtension-4_0, p-cpe:/a:novell:suse_linux:webkit2gtk-4_0-injected-bundles, p-cpe:/a:novell:suse_linux:webkit2gtk3-devel, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/3/2022

Vulnerability Publication Date: 8/24/2021

CISA Known Exploited Dates: 2/25/2022

Reference Information

CVE: CVE-2021-30934, CVE-2021-30936, CVE-2021-30951, CVE-2021-30952, CVE-2021-30953, CVE-2021-30954, CVE-2021-30984, CVE-2021-45481, CVE-2021-45482, CVE-2021-45483, CVE-2022-22589, CVE-2022-22590, CVE-2022-22592, CVE-2022-22594, CVE-2022-22620

SuSE: SUSE-SU-2022:0703-1

IAVA: 2021-A-0577-S, 2022-A-0051-S, 2022-A-0082