forked from Igalia/wpewebkit.org
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Release security advisory WSA-2022-0009
- Loading branch information
Showing
1 changed file
with
47 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
--- | ||
layout: post | ||
title: WebKitGTK and WPE WebKit Security Advisory WSA-2022-0009 | ||
permalink: /security/WSA-2022-0009.html | ||
tags: WSA | ||
--- | ||
|
||
* Date Reported: **September 19, 2022** | ||
|
||
* Advisory ID: **WSA-2022-0009** | ||
|
||
* CVE identifiers: [CVE-2022-32886](#CVE-2022-32886), [CVE-2022-32891](#CVE-2022-32891), | ||
[CVE-2022-32912](#CVE-2022-32912). | ||
|
||
|
||
Several vulnerabilities were discovered in WebKitGTK and WPE WebKit. | ||
|
||
* <a name="CVE-2022-32886" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886">CVE-2022-32886</a> | ||
* Versions affected: WebKitGTK and WPE WebKit before 2.36.8. | ||
* Credit to P1umer, afang5472, xmzyshypnc. | ||
* Impact: Processing maliciously crafted web content may lead to | ||
arbitrary code execution. Description: A buffer overflow issue was | ||
addressed with improved memory handling. | ||
|
||
* <a name="CVE-2022-32891" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891">CVE-2022-32891</a> | ||
* Versions affected: WebKitGTK and WPE WebKit before 2.36.5. | ||
* Credit to @real_as3617, an anonymous researcher. | ||
* Impact: Visiting a website that frames malicious content may lead to | ||
UI spoofing. Description: The issue was addressed with improved UI | ||
handling. | ||
|
||
* <a name="CVE-2022-32912" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32912">CVE-2022-32912</a> | ||
* Versions affected: WebKitGTK and WPE WebKit before 2.36.8. | ||
* Credit to Jeonghoon Shin (@singi21a) at Theori working with Trend | ||
Micro Zero Day Initiative. | ||
* Impact: Processing maliciously crafted web content may lead to | ||
arbitrary code execution. Description: An out-of-bounds read was | ||
addressed with improved bounds checking. | ||
|
||
|
||
We recommend updating to the latest stable versions of WebKitGTK and WPE | ||
WebKit. It is the best way to ensure that you are running safe versions | ||
of WebKit. Please check our websites for information about the latest | ||
stable releases. | ||
|
||
Further information about WebKitGTK and WPE WebKit security advisories can be found at: | ||
[https://webkitgtk.org/security.html](https://webkitgtk.org/security.html) or [https://wpewebkit.org/security/](https://wpewebkit.org/security/). |