Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 25 Jul 2017 14:42:55 +0200
From: Carlos Alberto Lopez Perez <clopez@...lia.com>
To: "webkit-gtk@...ts.webkit.org" <webkit-gtk@...ts.webkit.org>
Cc: security@...kit.org, distributor-list@...me.org,
 oss-security@...ts.openwall.com, bugtraq@...urityfocus.com
Subject: WebKitGTK+ Security Advisory WSA-2017-0006

------------------------------------------------------------------------
WebKitGTK+ Security Advisory                               WSA-2017-0006
------------------------------------------------------------------------

Date reported      : July 25, 2017
Advisory ID        : WSA-2017-0006
Advisory URL       : https://webkitgtk.org/security/WSA-2017-0006.html
CVE identifiers    : CVE-2017-7006, CVE-2017-7011, CVE-2017-7012,
                     CVE-2017-7018, CVE-2017-7019, CVE-2017-7020,
                     CVE-2017-7030, CVE-2017-7034, CVE-2017-7037,
                     CVE-2017-7038, CVE-2017-7039, CVE-2017-7040,
                     CVE-2017-7041, CVE-2017-7042, CVE-2017-7043,
                     CVE-2017-7046, CVE-2017-7048, CVE-2017-7049,
                     CVE-2017-7052, CVE-2017-7055, CVE-2017-7056,
                     CVE-2017-7059, CVE-2017-7061, CVE-2017-7064.

Several vulnerabilities were discovered in WebKitGTK+.

CVE-2017-7006
    Versions affected: WebKitGTK+ before 2.16.2.
    Credit to David Kohlbrenner of UC San Diego, an anonymous
    researcher.
    Impact: A malicious website may exfiltrate data cross-origin.
    Description: Processing maliciously crafted web content may allow
    cross-origin data to be exfiltrated by using SVG filters to conduct
    a timing side-channel attack. This issue was addressed by not
    painting the cross-origin buffer into the frame that gets filtered.

CVE-2017-7011
    Versions affected: WebKitGTK+ before 2.16.3.
    Credit to xisigr of Tencent's Xuanwu Lab (tencent.com).
    Impact: Visiting a malicious website may lead to address bar
    spoofing. Description: A state management issue was addressed with
    improved frame handling.

CVE-2017-7012
    Versions affected: WebKitGTK+ before 2.16.2.
    Credit to Apple.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7018
    Versions affected: WebKitGTK+ before 2.16.6.
    Credit to lokihardt of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7019
    Versions affected: WebKitGTK+ before 2.16.2.
    Credit to Zhiyang Zeng of Tencent Security Platform Department.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7020
    Versions affected: WebKitGTK+ before 2.16.1.
    Credit to likemeng of Baidu Security Lab.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7030
    Versions affected: WebKitGTK+ before 2.16.6.
    Credit to chenqin of Ant-financial Light-Year Security Lab
    (蚂蚁金服巴斯光年安全实验室).
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7034
    Versions affected: WebKitGTK+ before 2.16.6.
    Credit to chenqin of Ant-financial Light-Year Security Lab
    (蚂蚁金服巴斯光年安全实验室).
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7037
    Versions affected: WebKitGTK+ before 2.16.6.
    Credit to lokihardt of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7038
    Versions affected: WebKitGTK+ before 2.16.2.
    Credit to Neil Jenkins of FastMail Pty Ltd, Egor Karbutov
    (@ShikariSenpai) of Digital Security and Egor Saltykov
    (@ansjdnakjdnajkd) of Digital Security.
    Impact: Processing maliciously crafted web content with DOMParser
    may lead to cross site scripting. Description: A logic issue existed
    in the handling of DOMParser. This issue was addressed with improved
    state management.

CVE-2017-7039
    Versions affected: WebKitGTK+ before 2.16.6.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7040
    Versions affected: WebKitGTK+ before 2.16.3.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7041
    Versions affected: WebKitGTK+ before 2.16.2.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7042
    Versions affected: WebKitGTK+ before 2.16.2.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7043
    Versions affected: WebKitGTK+ before 2.16.2.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7046
    Versions affected: WebKitGTK+ before 2.16.6.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7048
    Versions affected: WebKitGTK+ before 2.16.6.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7049
    Versions affected: WebKitGTK+ before 2.16.2.
    Credit to Ivan Fratric of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed through improved memory handling.

CVE-2017-7052
    Versions affected: WebKitGTK+ before 2.16.4.
    Credit to cc working with Trend Micro's Zero Day Initiative.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7055
    Versions affected: WebKitGTK+ before 2.16.6.
    Credit to The UK's National Cyber Security Centre (NCSC).
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7056
    Versions affected: WebKitGTK+ before 2.16.6.
    Credit to lokihardt of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7059
    Versions affected: WebKitGTK+ before 2.16.3.
    Credit to an anonymous researcher.
    Impact: Processing maliciously crafted web content with DOMParser
    may lead to cross site scripting. Description: A logic issue existed
    in the handling of DOMParser. This issue was addressed with improved
    state management.

CVE-2017-7061
    Versions affected: WebKitGTK+ before 2.16.6.
    Credit to lokihardt of Google Project Zero.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2017-7064
    Versions affected: WebKitGTK+ before 2.16.6.
    Credit to lokihardt of Google Project Zero.
    Impact: An application may be able to read restricted memory.
    Description: A memory initialization issue was addressed through
    improved memory handling.


We recommend updating to the last stable version of WebKitGTK+. It is
the best way of ensuring that you are running a safe version of
WebKitGTK+. Please check our website for information about the last
stable releases.

Further information about WebKitGTK+ Security Advisories can be found
at: https://webkitgtk.org/security.html

The WebKitGTK+ team,
July 25, 2017



Download attachment "signature.asc" of type "application/pgp-signature" (898 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.