Anfälligkeitssuche        Suche in 211766 CVE Beschreibungen
und 97459 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.4.2019.1137.1
Kategorie:SuSE Local Security Checks
Titel:SUSE: Security Advisory (SUSE-SU-2019:1137-1)
Zusammenfassung:The remote host is missing an update for the 'webkit2gtk3' package(s) announced via the SUSE-SU-2019:1137-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'webkit2gtk3' package(s) announced via the SUSE-SU-2019:1137-1 advisory.

Vulnerability Insight:
This update for webkit2gtk3 to version 2.24.1 fixes the following issues:

Security issues fixed:
CVE-2019-6201, CVE-2019-6251, CVE-2019-7285, CVE-2019-7292,
CVE-2019-8503, CVE-2019-8506, CVE-2019-8515, CVE-2019-8518,
CVE-2019-8523, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536,
CVE-2019-8544, CVE-2019-8551, CVE-2019-8558, CVE-2019-8559,
CVE-2019-8563, CVE-2019-11070 (bsc#1132256).

Affected Software/OS:
'webkit2gtk3' package(s) on SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Module for Desktop Applications 15, SUSE Linux Enterprise Module for Basesystem 15

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2019-6201
https://support.apple.com/HT209599
https://support.apple.com/HT209601
https://support.apple.com/HT209603
https://support.apple.com/HT209604
https://support.apple.com/HT209605
Common Vulnerability Exposure (CVE) ID: CVE-2019-6251
Bugtraq: 20190411 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002 (Google Search)
https://seclists.org/bugtraq/2019/Apr/21
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LACVFU4MYYRPJ3IEA4UCN5KUEAGCCJ72/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSCDI3635E37GL4BNJDRDT2KEUBDLGSO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UO3DIA54X7FOUWFZW5YXC2MZ6KNHG6SW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNPI3R6QWDJBA5KNGA6QSMKYLY5RRHBZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/
https://security.gentoo.org/glsa/201909-05
http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html
https://bugs.webkit.org/show_bug.cgi?id=194208
https://gitlab.gnome.org/GNOME/epiphany/issues/532
https://trac.webkit.org/changeset/243434
http://www.openwall.com/lists/oss-security/2019/04/11/1
SuSE Security Announcement: openSUSE-SU-2019:1374 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html
SuSE Security Announcement: openSUSE-SU-2019:1391 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html
https://usn.ubuntu.com/3948-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-7285
Common Vulnerability Exposure (CVE) ID: CVE-2019-7292
https://support.apple.com/HT209602
Common Vulnerability Exposure (CVE) ID: CVE-2019-8503
Common Vulnerability Exposure (CVE) ID: CVE-2019-8506
Common Vulnerability Exposure (CVE) ID: CVE-2019-8515
Common Vulnerability Exposure (CVE) ID: CVE-2019-8518
Common Vulnerability Exposure (CVE) ID: CVE-2019-8523
Common Vulnerability Exposure (CVE) ID: CVE-2019-8524
Common Vulnerability Exposure (CVE) ID: CVE-2019-8535
Common Vulnerability Exposure (CVE) ID: CVE-2019-8536
Common Vulnerability Exposure (CVE) ID: CVE-2019-8544
Common Vulnerability Exposure (CVE) ID: CVE-2019-8551
Common Vulnerability Exposure (CVE) ID: CVE-2019-8558
Common Vulnerability Exposure (CVE) ID: CVE-2019-8559
Common Vulnerability Exposure (CVE) ID: CVE-2019-8563
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Dies ist nur einer von 97459 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2021 E-Soft Inc. Alle Rechte vorbehalten.