|
Message-ID: <0addb39a-c336-e38c-e2e7-0215fa888222@igalia.com>
Date: Tue, 17 Jan 2017 20:08:30 +0100
From: Carlos Alberto Lopez Perez <clopez@...lia.com>
To: "webkit-gtk@...ts.webkit.org" <webkit-gtk@...ts.webkit.org>
Cc: security@...kit.org, distributor-list@...me.org,
oss-security@...ts.openwall.com, bugtraq@...urityfocus.com
Subject: WebKitGTK+ Security Advisory WSA-2017-0001
------------------------------------------------------------------------
WebKitGTK+ Security Advisory WSA-2017-0001
------------------------------------------------------------------------
Date reported : January 17, 2017
Advisory ID : WSA-2017-0001
Advisory URL : https://webkitgtk.org/security/WSA-2017-0001.html
CVE identifiers : CVE-2016-4692, CVE-2016-4743, CVE-2016-7586,
CVE-2016-7587, CVE-2016-7589, CVE-2016-7592,
CVE-2016-7598, CVE-2016-7599, CVE-2016-7610,
CVE-2016-7611, CVE-2016-7623, CVE-2016-7632,
CVE-2016-7635, CVE-2016-7639, CVE-2016-7640,
CVE-2016-7641, CVE-2016-7642, CVE-2016-7645,
CVE-2016-7646, CVE-2016-7648, CVE-2016-7649,
CVE-2016-7652, CVE-2016-7654, CVE-2016-7656.
Several vulnerabilities were discovered in WebKitGTK+.
CVE-2016-4692
Versions affected: WebKitGTK+ before 2.14.1.
Credit to Apple.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved memory handling.
CVE-2016-4743
Versions affected: WebKitGTK+ before 2.14.0.
Credit to Alan Cutter.
Impact: Processing maliciously crafted web content may result in the
disclosure of process memory. Description: A memory corruption issue
was addressed through improved input validation.
CVE-2016-7586
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Boris Zbarsky.
Impact: Processing maliciously crafted web content may result in the
disclosure of user information. Description: A validation issue was
addressed through improved state management.
CVE-2016-7587
Versions affected: WebKitGTK+ before 2.14.0.
Credit to Adam Klein.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7589
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Apple.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: A memory corruption issue was
addressed through improved state management.
CVE-2016-7592
Versions affected: WebKitGTK+ before 2.14.3.
Credit to xisigr of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may compromise
user information. Description: An issue existed in handling of
JavaScript prompts. This was addressed through improved state
management.
CVE-2016-7598
Versions affected: WebKitGTK+ before 2.14.0.
Credit to Samuel Groß.
Impact: Processing maliciously crafted web content may result in the
disclosure of process memory. Description: An uninitialized memory
access issue was addressed through improved memory initialization.
CVE-2016-7599
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Muneaki Nishimura (nishimunea) of Recruit Technologies
Co., Ltd.
Impact: Processing maliciously crafted web content may result in the
disclosure of user information. Description: An issue existed in the
handling of HTTP redirects. This issue was addressed through
improved cross origin validation.
CVE-2016-7610
Versions affected: WebKitGTK+ before 2.14.1.
Credit to Zheng Huang of the Baidu Security Lab working with Trend
Micro's Zero Day Initiative.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7611
Versions affected: WebKitGTK+ before 2.14.2.
Credit to an anonymous researcher working with Trend Micro's Zero
Day Initiative.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7623
Versions affected: WebKitGTK+ before 2.14.3.
Credit to xisigr of Tencent's Xuanwu Lab (tencent.com).
Impact: Visiting a maliciously crafted website may compromise user
information. Description: An issue existed in the handling of blob
URLs. This issue was addressed through improved URL handling.
CVE-2016-7632
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Jeonghoon Shin.
Impact: Visiting a maliciously crafted webpage may lead to an
unexpected application termination or arbitrary code execution.
Description: A memory corruption issue was addressed through
improved state management.
CVE-2016-7635
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Apple.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved memory handling.
CVE-2016-7639
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Tongbo Luo of Palo Alto Networks.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7640
Versions affected: WebKitGTK+ before 2.14.2.
Credit to Kai Kang of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7641
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Kai Kang of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7642
Versions affected: WebKitGTK+ before 2.14.2.
Credit to Tongbo Luo of Palo Alto Networks.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7645
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Kai Kang of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7646
Versions affected: WebKitGTK+ before 2.14.2.
Credit to Kai Kang of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7648
Versions affected: WebKitGTK+ before 2.14.2.
Credit to Kai Kang of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7649
Versions affected: WebKitGTK+ before 2.14.2.
Credit to Kai Kang of Tencent's Xuanwu Lab (tencent.com).
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7652
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Apple.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved memory handling.
CVE-2016-7654
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Keen Lab working with Trend Micro's Zero Day Initiative.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: Multiple memory corruption
issues were addressed through improved state management.
CVE-2016-7656
Versions affected: WebKitGTK+ before 2.14.3.
Credit to Keen Lab working with Trend Micro's Zero Day Initiative.
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Description: A memory corruption issue was
addressed through improved state management.
We recommend updating to the last stable version of WebKitGTK+. It is
the best way of ensuring that you are running a safe version of
WebKitGTK+. Please check our website for information about the last
stable releases.
Further information about WebKitGTK+ Security Advisories can be found
at: https://webkitgtk.org/security.html
The WebKitGTK+ team,
January 17, 2017
Download attachment "signature.asc" of type "application/pgp-signature" (884 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.