Fedora Linux 8568 Published by

A webkit2gtk3 security update has been released for Fedora 34.



SECURITY: Fedora 34 Update: webkit2gtk3-2.32.3-1.fc34


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-cf7d8c7b1a
2021-07-29 01:06:35.173603
--------------------------------------------------------------------------------

Name : webkit2gtk3
Product : Fedora 34
Version : 2.32.3
Release : 1.fc34
URL :   https://www.webkitgtk.org/
Summary : GTK Web content engine library
Description :
WebKitGTK is the port of the portable web rendering engine WebKit to the
GTK platform.

This package contains WebKit2 based WebKitGTK for GTK 3.

--------------------------------------------------------------------------------
Update Information:

* Properly set the cookies settings after a network process crash. * Fix
accessibility tree after a cross site navigation with PSON enabled. * Ensure
WebKitScriptWorld::window-object-cleared signal is always emitted. * Fix
several crashes and rendering issues. * Security fixes: CVE-2021-21775,
CVE-2021-21779, CVE-2021-30663, CVE-2021-30665, CVE-2021-30689, CVE-2021-30720,
CVE-2021-30734, CVE-2021-30744, CVE-2021-30749, CVE-2021-30795, CVE-2021-30797,
CVE-2021-30799
--------------------------------------------------------------------------------
ChangeLog:

* Fri Jul 23 2021 Michael Catanzaro - 2.32.3-1
- Update to 2.32.3
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #1986864 - CVE-2021-21775 webkit2gtk3: webkitgtk: A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of WebKit. [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1986864
[ 2 ] Bug #1986867 - CVE-2021-21779 webkit2gtk3: webkitgtk: A use-after-free vulnerability exists in the way that WebKit GraphicsContext handles certain events. [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1986867
[ 3 ] Bug #1986873 - CVE-2021-30663 webkit2gtk3: webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution. [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1986873
[ 4 ] Bug #1986876 - CVE-2021-30665 webkit2gtk3: webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution. [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1986876
[ 5 ] Bug #1986882 - CVE-2021-30689 webkit2gtk3: webkitgtk: Processing maliciously crafted web content may lead to universal cross site scripting. [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1986882
[ 6 ] Bug #1986884 - CVE-2021-30720 webkit2gtk3: webkitgtk: A malicious website may be able to access restricted ports on arbitrary servers. [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1986884
[ 7 ] Bug #1986887 - CVE-2021-30734 webkit2gtk3: webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1986887
[ 8 ] Bug #1986889 - CVE-2021-30744 webkit2gtk3: webkitgtk: Processing maliciously crafted web content may lead to universal cross site scripting. [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1986889
[ 9 ] Bug #1986891 - CVE-2021-30749 webkit2gtk3: webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution. [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1986891
[ 10 ] Bug #1986901 - CVE-2021-30795 webkit2gtk3: webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution. [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1986901
[ 11 ] Bug #1986904 - CVE-2021-30797 webkit2gtk3: webkitgtk: Processing maliciously crafted web content may lead to code execution [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1986904
[ 12 ] Bug #1986908 - CVE-2021-30799 webkit2gtk3: webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution. [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=1986908
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-cf7d8c7b1a' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys