" CVE-2022-32886 Versions affected: WebKitGTK and WPE WebKit before 2.36.8. Credit to P1umer, afang5472, xmzyshypnc. Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Description: A buffer overflow issue was addressed with improved memory handling. CVE-2022-32891 Versions affected: WebKitGTK and WPE WebKit before 2.36.5. Credit to @real_as3617, an anonymous researcher. Impact: Visiting a website that frames malicious content may lead to UI spoofing. Description: The issue was addressed with improved UI handling. CVE-2022-32912 Versions affected: WebKitGTK and WPE WebKit before 2.36.8. Credit to Jeonghoon Shin (@singi21a) at Theori working with Trend Micro Zero Day Initiative. Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Description: An out-of-bounds read was addressed with improved bounds checking. " Please bump to 2.36.8.
Sorry, already in tree, so please stabilize (and thanks for the quick bump!)
CVE-2022-32912 has been told to not be affecting Linux: https://mail.gnome.org/archives/distributor-list/2022-September/msg00001.html
(In reply to Mart Raudsepp from comment #2) > CVE-2022-32912 has been told to not be affecting Linux: > https://mail.gnome.org/archives/distributor-list/2022-September/msg00001.html Feel free to change alias as necessary in these kinds of situations
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=5f2ad6c822d2d64da4ebcb1f90b23c9f78bbbd91 commit 5f2ad6c822d2d64da4ebcb1f90b23c9f78bbbd91 Author: Matt Turner <mattst88@gentoo.org> AuthorDate: 2022-12-19 19:59:48 +0000 Commit: Matt Turner <mattst88@gentoo.org> CommitDate: 2022-12-19 21:11:40 +0000 net-libs/webkit-gtk: Drop old versions Bug: https://bugs.gentoo.org/871732 Bug: https://bugs.gentoo.org/879571 Signed-off-by: Matt Turner <mattst88@gentoo.org> net-libs/webkit-gtk/Manifest | 1 - net-libs/webkit-gtk/webkit-gtk-2.36.7.ebuild | 250 --------------------------- 2 files changed, 251 deletions(-)
Thanks!