-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0287
         WebKitGTK and WPE WebKit Security Advisory WSA-2020-0001
                              28 January 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           WebKitGTK
                   WPE WebKit
Publisher:         WebKit
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Mobile Device
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-8846 CVE-2019-8844 CVE-2019-8835

Reference:         ESB-2019.4630
                   ESB-2019.4629
                   ESB-2019.4628
                   ESB-2019.4627

Original Bulletin: 
   https://webkitgtk.org/security/WSA-2020-0001.html
   https://wpewebkit.org/security/WSA-2020-0001.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- ------------------------------------------------------------------------
WebKitGTK and WPE WebKit Security Advisory                 WSA-2020-0001
- ------------------------------------------------------------------------

Date reported           : January 23, 2020
Advisory ID             : WSA-2020-0001
WebKitGTK Advisory URL  : https://webkitgtk.org/security/WSA-2020-0001.html
WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2020-0001.html
CVE identifiers         : CVE-2019-8835, CVE-2019-8844, CVE-2019-8846.

Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.

CVE-2019-8835
    Versions affected: WebKitGTK before 2.26.3 and WPE WebKit before
    2.26.3.
    Credit to Anonymous working with Trend Micro's Zero Day Initiative,
    Mike Zhang of Pangu Team.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2019-8844
    Versions affected: WebKitGTK before 2.26.3 and WPE WebKit before
    2.26.3.
    Credit to William Bowling (@wcbowling).
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: Multiple memory corruption
    issues were addressed with improved memory handling.

CVE-2019-8846
    Versions affected: WebKitGTK before 2.26.3 and WPE WebKit before
    2.26.3.
    Credit to Marcin Towalski of Cisco Talos.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Description: A use after free issue was
    addressed with improved memory management.


We recommend updating to the latest stable versions of WebKitGTK and WPE
WebKit. It is the best way to ensure that you are running safe versions
of WebKit. Please check our websites for information about the latest
stable releases.

Further information about WebKitGTK and WPE WebKit security advisories
can be found at: https://webkitgtk.org/security.html or
https://wpewebkit.org/security/.

The WebKitGTK and WPE WebKit team,
January 23, 2020

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=JJeR
-----END PGP SIGNATURE-----