-
Date Reported: August 02, 2023
-
Advisory ID: WSA-2023-0007
-
CVE identifiers: CVE-2023-38133, CVE-2023-38572, CVE-2023-38592, CVE-2023-38594, CVE-2023-38595, CVE-2023-38597, CVE-2023-38599, CVE-2023-38600, CVE-2023-38611.
Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.40.5.
- Credit to YeongHyeon Choi (@hyeon101010).
- Impact: Processing web content may disclose sensitive information. Description: The issue was addressed with improved checks.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.40.5.
- Credit to Narendra Bhati (twitter.com/imnarendrabhati) of Suma Soft Pvt. Ltd, Pune - India.
- Impact: A website may be able to bypass Same Origin Policy. Description: The issue was addressed with improved checks.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.40.5.
- Credit to Narendra Bhati (twitter.com/imnarendrabhati) of Suma Soft Pvt. Ltd, Pune - India, Valentino Dalla Valle, Pedro Bernardo, Marco Squarcina, and Lorenzo Veronese of TU Wien.
- Impact: Processing web content may lead to arbitrary code execution. Description: A logic issue was addressed with improved restrictions.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.40.5.
- Credit to Yuhao Hu.
- Impact: Processing web content may lead to arbitrary code execution. Description: The issue was addressed with improved checks.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.40.5.
- Credit to an anonymous researcher, Jiming Wang, and Jikai Ren.
- Impact: Processing web content may lead to arbitrary code execution. Description: The issue was addressed with improved checks.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.40.5.
- Credit to 이준성(Junsung Lee) of Cross Republic.
- Impact: Processing web content may lead to arbitrary code execution. Description: The issue was addressed with improved checks.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.40.5.
- Credit to Hritvik Taneja, Jason Kim, Jie Jeff Xu, Stephan van Schaik, Daniel Genkin, and Yuval Yarom.
- Impact: A website may be able to track sensitive user information. Description: A logic issue was addressed with improved state management.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.40.5.
- Credit to Anonymous working with Trend Micro Zero Day Initiative.
- Impact: Processing web content may lead to arbitrary code execution. Description: The issue was addressed with improved checks.
-
- Versions affected: WebKitGTK and WPE WebKit before 2.40.5.
- Credit to Francisco Alonso (@revskills).
- Impact: Processing web content may lead to arbitrary code execution. Description: The issue was addressed with improved memory handling.
We recommend updating to the latest stable versions of WebKitGTK and WPE WebKit. It is the best way to ensure that you are running safe versions of WebKit. Please check our websites for information about the latest stable releases.
Further information about WebKitGTK and WPE WebKit security advisories can be found at: https://webkitgtk.org/security.html or https://wpewebkit.org/security/.