Búsqueda de    
Vulnerabilidad   
    Buscar 211766 Descripciones CVE y
97459 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.4.2021.1430.1
Categoría:SuSE Local Security Checks
Título:SUSE: Security Advisory (SUSE-SU-2021:1430-1)
Resumen:The remote host is missing an update for the 'webkit2gtk3' package(s) announced via the SUSE-SU-2021:1430-1 advisory.
Descripción:Summary:
The remote host is missing an update for the 'webkit2gtk3' package(s) announced via the SUSE-SU-2021:1430-1 advisory.

Vulnerability Insight:
This update for webkit2gtk3 fixes the following issues:

Update to version 2.32.0 (bsc#1184155):
* Fix the authentication request port when URL omits the port.
* Fix iframe scrolling when main frame is scrolled in async
* scrolling mode.
* Stop using g_memdup.
* Show a warning message when overriding signal handler for
* threading suspension.
* Fix the build on RISC-V with GCC 11.
* Fix several crashes and rendering issues.
* Security fixes: CVE-2021-1788, CVE-2021-1844, CVE-2021-1871

Update in version 2.30.6 (bsc#1184262):
* Update user agent quirks again for Google Docs and Google Drive.
* Fix several crashes and rendering issues.
* Security fixes: CVE-2020-27918, CVE-2020-29623, CVE-2021-1765
CVE-2021-1789, CVE-2021-1799, CVE-2021-1801, CVE-2021-1870.

Update _constraints for armv6/armv7 (bsc#1182719)

restore NPAPI plugin support which was removed in 2.32.0

Affected Software/OS:
'webkit2gtk3' package(s) on SUSE Linux Enterprise Module for Desktop Applications 15-SP3, SUSE Linux Enterprise Module for Desktop Applications 15-SP2, SUSE Linux Enterprise Module for Basesystem 15-SP3, SUSE Linux Enterprise Module for Basesystem 15-SP2

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2021-1765
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/
https://security.gentoo.org/glsa/202104-03
https://support.apple.com/en-us/HT212147
Common Vulnerability Exposure (CVE) ID: CVE-2021-1788
Debian Security Information: DSA-4923 (Google Search)
https://www.debian.org/security/2021/dsa-4923
https://support.apple.com/en-us/HT212146
https://support.apple.com/en-us/HT212148
https://support.apple.com/en-us/HT212149
https://support.apple.com/en-us/HT212152
Common Vulnerability Exposure (CVE) ID: CVE-2021-1789
Common Vulnerability Exposure (CVE) ID: CVE-2021-1799
Common Vulnerability Exposure (CVE) ID: CVE-2021-1801
Common Vulnerability Exposure (CVE) ID: CVE-2021-1844
http://seclists.org/fulldisclosure/2021/Apr/55
https://support.apple.com/en-us/HT212220
https://support.apple.com/en-us/HT212221
https://support.apple.com/en-us/HT212222
https://support.apple.com/en-us/HT212223
Common Vulnerability Exposure (CVE) ID: CVE-2021-1870
Common Vulnerability Exposure (CVE) ID: CVE-2021-1871
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Esta es sólo una de 97459 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2021 E-Soft Inc. Todos los derechos reservados.