{"affected":[{"ecosystem_specific":{"binaries":[{"libjavascriptcoregtk-4_0-18":"2.20.3-2.23.8","libwebkit2gtk-4_0-37":"2.20.3-2.23.8","libwebkit2gtk3-lang":"2.20.3-2.23.8","typelib-1_0-JavaScriptCore-4_0":"2.20.3-2.23.8","typelib-1_0-WebKit2-4_0":"2.20.3-2.23.8","webkit2gtk-4_0-injected-bundles":"2.20.3-2.23.8"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP3","name":"webkit2gtk3","purl":"pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.20.3-2.23.8"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"typelib-1_0-WebKit2WebExtension-4_0":"2.20.3-2.23.8","webkit2gtk3-devel":"2.20.3-2.23.8"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP3","name":"webkit2gtk3","purl":"pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.20.3-2.23.8"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjavascriptcoregtk-4_0-18":"2.20.3-2.23.8","libwebkit2gtk-4_0-37":"2.20.3-2.23.8","typelib-1_0-JavaScriptCore-4_0":"2.20.3-2.23.8","typelib-1_0-WebKit2-4_0":"2.20.3-2.23.8","webkit2gtk-4_0-injected-bundles":"2.20.3-2.23.8"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"webkit2gtk3","purl":"pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.20.3-2.23.8"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjavascriptcoregtk-4_0-18":"2.20.3-2.23.8","libwebkit2gtk-4_0-37":"2.20.3-2.23.8","typelib-1_0-JavaScriptCore-4_0":"2.20.3-2.23.8","typelib-1_0-WebKit2-4_0":"2.20.3-2.23.8","webkit2gtk-4_0-injected-bundles":"2.20.3-2.23.8"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"webkit2gtk3","purl":"pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.20.3-2.23.8"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libwebkit2gtk3-lang":"2.20.3-2.23.8"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 12 SP3","name":"webkit2gtk3","purl":"pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.20.3-2.23.8"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for webkit2gtk3 to version 2.20.3 fixes the issues:\n\nThe following security vulnerabilities were addressed:\n\n- CVE-2018-12911: Fixed an off-by-one error in xdg_mime_get_simple_globs\n  (boo#1101999)\n- CVE-2017-13884: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1075775).\n- CVE-2017-13885: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1075775).\n- CVE-2017-7153: An unspecified issue allowed remote attackers to spoof\n  user-interface information (about whether the entire content is derived from a\n  valid TLS session) via a crafted web site that sends a 401 Unauthorized\n  redirect (bsc#1077535).\n- CVE-2017-7160: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1075775).\n- CVE-2017-7161: An unspecified issue allowed remote attackers to execute\n  arbitrary code via special characters that trigger command injection\n  (bsc#1075775, bsc#1077535).\n- CVE-2017-7165: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1075775).\n- CVE-2018-4088: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1075775).\n- CVE-2018-4096: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1075775).\n- CVE-2018-4200: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site that triggers a\n  WebCore::jsElementScrollHeightGetter use-after-free (bsc#1092280).\n- CVE-2018-4204: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1092279).\n- CVE-2018-4101: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182).\n- CVE-2018-4113: An issue in the JavaScriptCore function in the 'WebKit'\n  component allowed attackers to trigger an assertion failure by leveraging\n  improper array indexing (bsc#1088182)\n- CVE-2018-4114: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182) \n- CVE-2018-4117: An unspecified issue allowed remote attackers to bypass the\n  Same Origin Policy and obtain sensitive information via a crafted web site\n  (bsc#1088182, bsc#1102530).\n- CVE-2018-4118: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182) \n- CVE-2018-4119: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182) \n- CVE-2018-4120: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182).\n- CVE-2018-4121: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1092278).\n- CVE-2018-4122: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182).\n- CVE-2018-4125: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182).\n- CVE-2018-4127: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182).\n- CVE-2018-4128: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182).\n- CVE-2018-4129: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182).\n- CVE-2018-4146: An unspecified issue allowed attackers to cause a denial of\n  service (memory corruption) via a crafted web site (bsc#1088182).\n- CVE-2018-4161: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182).\n- CVE-2018-4162: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182).\n- CVE-2018-4163: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182).\n- CVE-2018-4165: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1088182).\n- CVE-2018-4190: An unspecified issue allowed remote attackers to obtain\n  sensitive credential information that is transmitted during a CSS mask-image\n  fetch (bsc#1097693)\n- CVE-2018-4199: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (buffer overflow and application\n  crash) via a crafted web site (bsc#1097693)\n- CVE-2018-4218: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site that triggers an @generatorState use-after-free\n  (bsc#1097693)\n- CVE-2018-4222: An unspecified issue allowed remote attackers to execute\n  arbitrary code via a crafted web site that leverages a getWasmBufferFromValue\n  out-of-bounds read during WebAssembly compilation (bsc#1097693) \n- CVE-2018-4232: An unspecified issue allowed remote attackers to overwrite\n  cookies via a crafted web site (bsc#1097693) \n- CVE-2018-4233: An unspecified issue allowed remote attackers to execute\n  arbitrary code or cause a denial of service (memory corruption and application\n  crash) via a crafted web site (bsc#1097693) \n- CVE-2018-4246: An unspecified issue allowed remote attackers to execute\n  arbitrary code via a crafted web site that leverages type confusion\n  (bsc#1104169) \n- CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL and\n  webkitFaviconDatabaseSetIconURLForPageURL mishandled an unset pageURL, leading\n  to an application crash (bsc#1095611)\n- CVE-2018-4133: A Safari cross-site scripting (XSS) vulnerability allowed\n  remote attackers to inject arbitrary web script or HTML via a crafted URL\n  (bsc#1088182).\n- CVE-2018-11713: The libsoup network backend of WebKit unexpectedly failed to\n  use system proxy settings for WebSocket connections. As a result, users could\n  be deanonymized by crafted web sites via a WebSocket connection (bsc#1096060).\n- CVE-2018-11712: The libsoup network backend of WebKit failed to perform TLS\n  certificate verification for WebSocket connections (bsc#1096061).\n\n\nThis update for webkit2gtk3 fixes the following issues:\n\n- Fixed a crash when atk_object_ref_state_set is called on an AtkObject that's\n  being destroyed (bsc#1088932).\n- Fixed crash when using Wayland with QXL/virtio (bsc#1079512)\n- Disable Gigacage if mmap fails to allocate in Linux.\n- Add user agent quirk for paypal website.\n- Properly detect compiler flags, needed libs, and fallbacks for\n  usage of 64-bit atomic operations.\n- Fix a network process crash when trying to get cookies of\n  about:blank page.\n- Fix UI process crash when closing the window under Wayland.\n- Fix several crashes and rendering issues.\n- Do TLS error checking on GTlsConnection::accept-certificate to\n  finish the load earlier in case of errors.\n- Properly close the connection to the nested wayland compositor\n  in the Web Process.\n- Avoid painting backing stores for zero-opacity layers.\n- Fix downloads started by context menu failing in some websites\n  due to missing user agent HTTP header.\n- Fix video unpause when GStreamerGL is disabled.\n- Fix several GObject introspection annotations.\n- Update user agent quiks to fix Outlook.com and Chase.com.\n- Fix several crashes and rendering issues.\n- Improve error message when Gigacage cannot allocate virtual memory.\n- Add missing WebKitWebProcessEnumTypes.h to webkit-web-extension.h.\n- Improve web process memory monitor thresholds.\n- Fix a web process crash when the web view is created and destroyed quickly.\n- Fix a network process crash when load is cancelled while searching for\n  stored HTTP auth credentials.\n- Fix the build when ENABLE_VIDEO, ENABLE_WEB_AUDIO and\n  ENABLE_XSLT are disabled.\n- New API to retrieve and delete cookies with WebKitCookieManager.\n- New web process API to detect when form is submitted via JavaScript.\n- Several improvements and fixes in the touch/gestures support.\n- Support for the “system” CSS font family.\n- Complex text rendering improvements and fixes.\n- More complete and spec compliant WebDriver implementation.\n- Ensure DNS prefetching cannot be re-enabled if disabled by settings.\n- Fix seek sometimes not working.\n- Fix rendering of emojis that were using the wrong scale factor\n  in some cases.\n- Fix rendering of combining enclosed keycap.\n- Fix rendering scale of some layers in HiDPI.\n- Fix a crash in Wayland when closing the web view.\n- Fix crashes upower crashes when running inside a chroot or on\n  systems with broken dbus/upower.\n- Fix memory leaks in GStreamer media backend when using\n  GStreamer 1.14.\n- Fix several crashes and rendering issues.\n- Add ENABLE_ADDRESS_SANITIZER to make it easier to build with\n  asan support.\n- Fix a crash a under Wayland when using mesa software\n  rasterization.\n- Make fullscreen video work again.\n- Fix handling of missing GStreamer elements.\n- Fix rendering when webm video is played twice.\n- Fix kinetic scrolling sometimes jumping around.\n- Fix build with ICU configured without collation support.\n- WebSockets use system proxy settings now (requires libsoup 2.61.90).\n- Show the context menu on long-press gesture.\n- Add support for Shift + mouse scroll to scroll horizontally.\n- Fix zoom gesture to actually zoom instead of changing the page\n  scale.\n- Implement support for Graphics ARIA roles.\n- Make sleep inhibitors work under Flatpak.\n- Add get element CSS value command to WebDriver.\n- Fix a crash aftter a swipe gesture.\n- Fix several crashes and rendering issues.\n- Fix crashes due to duplicated symbols in libjavascriptcoregtk\n  and libwebkit2gtk.\n- Fix parsing of timeout values in WebDriver.\n- Implement get timeouts command in WebDriver.\n- Fix deadlock in GStreamer video sink during shutdown when\n  accelerated compositing is disabled.\n- Fix several crashes and rendering issues.\n- Add web process API to detect when form is submitted via\n  JavaScript.\n- Add new API to replace\n  webkit_form_submission_request_get_text_fields() that is now\n  deprecated.\n- Add WebKitWebView::web-process-terminated signal and deprecate\n  web-process-crashed.\n- Fix rendering issues when editing text areas.\n- Use FastMalloc based GstAllocator for GStreamer.\n- Fix web process crash at startup in bmalloc.\n- Fix several memory leaks in GStreamer media backend.\n- WebKitWebDriver process no longer links to\n  libjavascriptcoregtk.\n- Fix several crashes and rendering issues.\n- Add new API to add, retrieve and delete cookies via\n  WebKitCookieManager.\n- Add functions to WebSettings to convert font sizes between\n  points and pixels.\n- Ensure cookie operations take effect when they happen before a\n  web process has been spawned.\n- Automatically adjust font size when GtkSettings:gtk-xft-dpi\n  changes.\n- Add initial resource load statistics support.\n- Add API to expose availability of certain editing commands in\n  WebKitEditorState.\n- Add API to query whether a WebKitNavigationAction is a redirect\n  or not.\n- Improve complex text rendering.\n- Add support for the 'system' CSS font family.\n- Disable USE_GSTREAMER_GL\n","id":"SUSE-SU-2018:3387-1","modified":"2018-10-24T11:31:35Z","published":"2018-10-24T11:31:35Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20183387-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1075775"},{"type":"REPORT","url":"https://bugzilla.suse.com/1077535"},{"type":"REPORT","url":"https://bugzilla.suse.com/1079512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1088182"},{"type":"REPORT","url":"https://bugzilla.suse.com/1088932"},{"type":"REPORT","url":"https://bugzilla.suse.com/1092278"},{"type":"REPORT","url":"https://bugzilla.suse.com/1092279"},{"type":"REPORT","url":"https://bugzilla.suse.com/1092280"},{"type":"REPORT","url":"https://bugzilla.suse.com/1095611"},{"type":"REPORT","url":"https://bugzilla.suse.com/1096060"},{"type":"REPORT","url":"https://bugzilla.suse.com/1096061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1097693"},{"type":"REPORT","url":"https://bugzilla.suse.com/1101999"},{"type":"REPORT","url":"https://bugzilla.suse.com/1102530"},{"type":"REPORT","url":"https://bugzilla.suse.com/1104169"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-13884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-13885"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7161"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7165"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-11646"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-11712"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-11713"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4113"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4114"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4117"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4118"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4119"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4120"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4121"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4122"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4127"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4128"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4129"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4133"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4161"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4163"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4165"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4190"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4199"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4200"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4204"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4218"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4222"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4233"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-4246"}],"related":["CVE-2017-13884","CVE-2017-13885","CVE-2017-7153","CVE-2017-7160","CVE-2017-7161","CVE-2017-7165","CVE-2018-11646","CVE-2018-11712","CVE-2018-11713","CVE-2018-12911","CVE-2018-4088","CVE-2018-4096","CVE-2018-4101","CVE-2018-4113","CVE-2018-4114","CVE-2018-4117","CVE-2018-4118","CVE-2018-4119","CVE-2018-4120","CVE-2018-4121","CVE-2018-4122","CVE-2018-4125","CVE-2018-4127","CVE-2018-4128","CVE-2018-4129","CVE-2018-4133","CVE-2018-4146","CVE-2018-4161","CVE-2018-4162","CVE-2018-4163","CVE-2018-4165","CVE-2018-4190","CVE-2018-4199","CVE-2018-4200","CVE-2018-4204","CVE-2018-4218","CVE-2018-4222","CVE-2018-4232","CVE-2018-4233","CVE-2018-4246"],"summary":"Security update for webkit2gtk3","upstream":["CVE-2017-13884","CVE-2017-13885","CVE-2017-7153","CVE-2017-7160","CVE-2017-7161","CVE-2017-7165","CVE-2018-11646","CVE-2018-11712","CVE-2018-11713","CVE-2018-12911","CVE-2018-4088","CVE-2018-4096","CVE-2018-4101","CVE-2018-4113","CVE-2018-4114","CVE-2018-4117","CVE-2018-4118","CVE-2018-4119","CVE-2018-4120","CVE-2018-4121","CVE-2018-4122","CVE-2018-4125","CVE-2018-4127","CVE-2018-4128","CVE-2018-4129","CVE-2018-4133","CVE-2018-4146","CVE-2018-4161","CVE-2018-4162","CVE-2018-4163","CVE-2018-4165","CVE-2018-4190","CVE-2018-4199","CVE-2018-4200","CVE-2018-4204","CVE-2018-4218","CVE-2018-4222","CVE-2018-4232","CVE-2018-4233","CVE-2018-4246"]}