Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20240817001504.GD2647915@igalia.com>
Date: Sat, 17 Aug 2024 00:15:04 +0300
From: Adrian Perez de Castro <aperez@...lia.com>
To: webkit-gtk@...ts.webkit.org, webkit-wpe@...ts.webkit.org
Cc: security@...kit.org, oss-security@...ts.openwall.com
Subject: WebKitGTK and WPE WebKit Security Advisory WSA-2024-0004

------------------------------------------------------------------------
WebKitGTK and WPE WebKit Security Advisory                 WSA-2024-0004
------------------------------------------------------------------------

Date reported           : August 17, 2024
Advisory ID             : WSA-2024-0004
WebKitGTK Advisory URL  : https://webkitgtk.org/security/WSA-2024-0004.html
WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2024-0004.html
CVE identifiers         : CVE-2024-40776, CVE-2024-40779,
                          CVE-2024-40780, CVE-2024-40782,
                          CVE-2024-40785, CVE-2024-40789,
                          CVE-2024-40794, CVE-2024-4558.

Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.

CVE-2024-40776
    Versions affected: WebKitGTK and WPE WebKit before 2.44.3.
    Credit to Huang Xilin of Ant Group Light-Year Security Lab.
    Impact: Processing maliciously crafted web content may lead to an
    unexpected process crash. Description: A use-after-free issue was
    addressed with improved memory management.
    WebKit Bugzilla: 273176

CVE-2024-40779
    Versions affected: WebKitGTK and WPE WebKit before 2.44.3.
    Credit to Huang Xilin of Ant Group Light-Year Security Lab.
    Impact: Processing maliciously crafted web content may lead to an
    unexpected process crash. Description: An out-of-bounds read was
    addressed with improved bounds checking.
    WebKit Bugzilla: 275431

CVE-2024-40780
    Versions affected: WebKitGTK and WPE WebKit before 2.44.3.
    Credit to Huang Xilin of Ant Group Light-Year Security Lab.
    Impact: Processing maliciously crafted web content may lead to an
    unexpected process crash. Description: An out-of-bounds read was
    addressed with improved bounds checking.
    WebKit Bugzilla: 275273

CVE-2024-40782
    Versions affected: WebKitGTK and WPE WebKit before 2.44.3.
    Credit to Maksymilian Motyl.
    Impact: Processing maliciously crafted web content may lead to an
    unexpected process crash. Description: A use-after-free issue was
    addressed with improved memory management.
    WebKit Bugzilla: 268770

CVE-2024-40785
    Versions affected: WebKitGTK and WPE WebKit before 2.44.3.
    Credit to Johan Carlsson (joaxcar).
    Impact: Processing maliciously crafted web content may lead to a
    cross site scripting attack. Description: This issue was addressed
    with improved checks.
    WebKit Bugzilla: 273805

CVE-2024-40789
    Versions affected: WebKitGTK and WPE WebKit before 2.44.3.
    Credit to Seunghyun Lee (@0x10n) of KAIST Hacking Lab working with Trend Micro
    Zero Day Initiative.
    Impact: Processing maliciously crafted web content may lead to an
    unexpected process crash. Description: An out-of-bounds access issue
    was addressed with improved bounds checking.
    

CVE-2024-40794
    Versions affected: WebKitGTK and WPE WebKit before 2.44.3.
    Credit to Matthew Butler.
    Impact: Private Browsing tabs may be accessed without
    authentication. Description: This issue was addressed through
    improved state management.
    WebKit Bugzilla: 275272

CVE-2024-4558
    Versions affected: WebKitGTK and WPE WebKit before 2.44.3.
    Credit to an anonymous researcher.
    Impact: Processing maliciously crafted web content may lead to an
    unexpected process crash. Description: Use after free in ANGLE
    allowed a remote attacker to potentially exploit heap corruption via
    a crafted HTML page.
    WebKit Bugzilla: 274165

We recommend updating to the latest stable versions of WebKitGTK and WPE
WebKit. It is the best way to ensure that you are running safe versions
of WebKit. Please check our websites for information about the latest
stable releases.

Further information about WebKitGTK and WPE WebKit security advisories
can be found at: https://webkitgtk.org/security.html or
https://wpewebkit.org/security.

--
The WebKitGTK and WPE WebKit team.

Download attachment "signature.asc" of type "application/pgp-signature" (196 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.