Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20241222212122.GD236434@igalia.com>
Date: Sun, 22 Dec 2024 21:21:22 +0200
From: Adrian Perez de Castro <aperez@...lia.com>
To: webkit-gtk@...ts.webkit.org, webkit-wpe@...ts.webkit.org
Cc: security@...kit.org, oss-security@...ts.openwall.com
Subject: WebKitGTK and WPE WebKit Security Advisory WSA-2024-0008

------------------------------------------------------------------------
WebKitGTK and WPE WebKit Security Advisory                 WSA-2024-0008
------------------------------------------------------------------------

Date reported           : December 22, 2024
Advisory ID             : WSA-2024-0008
WebKitGTK Advisory URL  : https://webkitgtk.org/security/WSA-2024-0008.html
WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2024-0008.html
CVE identifiers         : CVE-2024-54479, CVE-2024-54502,
                          CVE-2024-54505, CVE-2024-54508,
                          CVE-2024-54534.

Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.

CVE-2024-54479
    Versions affected: WebKitGTK and WPE WebKit before 2.46.5.
    Credit to Seunghyun Lee.
    Impact: Processing maliciously crafted web content may lead to an
    unexpected process crash Description: The issue was addressed with
    improved checks.
    WebKit Bugzilla: 278497

CVE-2024-54502
    Versions affected: WebKitGTK and WPE WebKit before 2.46.5.
    Credit to Brendon Tiszka of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to an
    unexpected process crash Description: The issue was addressed with
    improved checks.
    WebKit Bugzilla: 281912

CVE-2024-54505
    Versions affected: WebKitGTK and WPE WebKit before 2.46.5.
    Credit to Gary Kwong.
    Impact: Processing maliciously crafted web content may lead to
    memory corruption Description: A type confusion issue was addressed
    with improved memory handling.
    WebKit Bugzilla: 282661

CVE-2024-54508
    Versions affected: WebKitGTK and WPE WebKit before 2.46.5.
    Credit to linjy of HKUS3Lab and chluo of WHUSecLab, Xiangwei Zhang of Tencent
    Security YUNDING LAB.
    Impact: Processing maliciously crafted web content may lead to an
    unexpected process crash Description: The issue was addressed with
    improved memory handling.
    WebKit Bugzilla: 282180

CVE-2024-54534
    Versions affected: WebKitGTK and WPE WebKit before 2.46.0.
    Credit to Tashita Software Security.
    Impact: Processing maliciously crafted web content may lead to
    memory corruption Description: The issue was addressed with improved
    memory handling.
    WebKit Bugzilla: 277967

We recommend updating to the latest stable versions of WebKitGTK and WPE
WebKit. It is the best way to ensure that you are running safe versions
of WebKit. Please check our websites for information about the latest
stable releases.

Further information about WebKitGTK and WPE WebKit security advisories
can be found at: https://webkitgtk.org/security.html or
https://wpewebkit.org/security.

The WebKitGTK and WPE WebKit team,

Download attachment "signature.asc" of type "application/pgp-signature" (196 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.