-
Date Reported: July 28, 2022
-
Advisory ID: WSA-2022-0007
-
CVE identifiers: CVE-2022-32792, CVE-2022-32816, CVE-2022-2294.
Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.36.5.
- Credit to Manfred Paul (@_manfp) working with Trend Micro Zero Day Initiative.
- Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Description: An out-of-bounds write issue was addressed with improved input validation.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.36.5.
- Credit to Dohyun Lee (@l33d0hyun) of SSD Secure Disclosure Labs & DNSLab, Korea Univ.
- Impact: Visiting a website that frames malicious content may lead to UI spoofing. Description: The issue was addressed with improved UI handling.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.36.5 if USE_LIBWEBRTC is enabled.
- Credit to Jan Vojtesek of Avast Threat Intelligence team.
- Heap buffer overflow in LibWebRTC allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. NOTE: The tarballs of WebKitGTK or WPE WebKit don’t ship LibWebRTC. Also the LibWebRTC support is disabled by default. You only are affected by this vulnerability if your build enabled the USE_LIBWEBRTC CMake option and used the repository as source instead of the tarballs.
We recommend updating to the latest stable versions of WebKitGTK and WPE WebKit. It is the best way to ensure that you are running safe versions of WebKit. Please check our websites for information about the latest stable releases.
Further information about WebKitGTK and WPE WebKit security advisories can be found at: https://webkitgtk.org/security.html or https://wpewebkit.org/security/.