Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-32891 (GCVE-0-2022-32891)
Vulnerability from cvelistv5
- Visiting a website that frames malicious content may lead to UI spoofing
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T07:54:03.134Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213446"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213442"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213486"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213487"
},
{
"name": "GLSA-202305-32",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202305-32"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-32891",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-11T15:56:50.984822Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-11T15:56:57.240Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "iOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "16",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Safari",
"vendor": "Apple",
"versions": [
{
"lessThan": "16",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "watchOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "9",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "watchOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "16",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Visiting a website that frames malicious content may lead to UI spoofing",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-30T00:00:00.000Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/HT213446"
},
{
"url": "https://support.apple.com/en-us/HT213442"
},
{
"url": "https://support.apple.com/en-us/HT213486"
},
{
"url": "https://support.apple.com/en-us/HT213487"
},
{
"name": "GLSA-202305-32",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202305-32"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2022-32891",
"datePublished": "2023-02-27T00:00:00.000Z",
"dateReserved": "2022-06-09T00:00:00.000Z",
"dateUpdated": "2025-03-11T15:56:57.240Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-32891\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2023-02-27T20:15:12.063\",\"lastModified\":\"2024-11-21T07:07:10.457\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing.\"},{\"lang\":\"es\",\"value\":\"El problema se solucion\u00f3 mejorando el manejo de la interfaz de usuario. Este problema se solucion\u00f3 en Safari 16, tvOS 16, watchOS 9, iOS 16. Visitar un sitio web que enmarque contenido malicioso puede provocar una suplantaci\u00f3n de la interfaz de usuario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1021\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.0\",\"matchCriteriaId\":\"B5F783A1-114C-4DFC-9F2E-0D43D62CBC69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.0\",\"matchCriteriaId\":\"D1D9387F-63B6-41B3-8BDC-A6102EE5F1E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.0\",\"matchCriteriaId\":\"534DED19-82FC-4E39-BFD3-F2FE5C71A66B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.0\",\"matchCriteriaId\":\"712A2CD4-6807-496A-8467-BFB138371E51\"}]}]}],\"references\":[{\"url\":\"https://security.gentoo.org/glsa/202305-32\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://support.apple.com/en-us/HT213442\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213446\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213486\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213487\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202305-32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/en-us/HT213442\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213446\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213486\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.apple.com/en-us/HT213446\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213442\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213486\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213487\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202305-32\", \"name\": \"GLSA-202305-32\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T07:54:03.134Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-32891\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-11T15:56:50.984822Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-11T15:56:20.374Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"iOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"16\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"Safari\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"16\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"watchOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"9\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"watchOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"16\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/HT213446\"}, {\"url\": \"https://support.apple.com/en-us/HT213442\"}, {\"url\": \"https://support.apple.com/en-us/HT213486\"}, {\"url\": \"https://support.apple.com/en-us/HT213487\"}, {\"url\": \"https://security.gentoo.org/glsa/202305-32\", \"name\": \"GLSA-202305-32\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Visiting a website that frames malicious content may lead to UI spoofing\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2023-05-30T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-32891\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-11T15:56:57.240Z\", \"dateReserved\": \"2022-06-09T00:00:00.000Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2023-02-27T00:00:00.000Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
var-202209-0771
Vulnerability from variot
The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing. Safari , iOS , tvOS A vulnerability exists in multiple Apple products that involves improper restriction of rendered user interface layers or frames.Information may be obtained and information may be tampered with. Description This CVE is under investigation by Red Hat Product Security. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202305-32
https://security.gentoo.org/
Severity: High Title: WebKitGTK+: Multiple Vulnerabilities Date: May 30, 2023 Bugs: #871732, #879571, #888563, #905346, #905349, #905351 ID: 202305-32
Synopsis
Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
Background
WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.
Affected packages
Package Vulnerable Unaffected
net-libs/webkit-gtk < 2.40.1 >= 2.40.1
Description
Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All WebKitGTK+ users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.40.1"
References
[ 1 ] CVE-2022-32885 https://nvd.nist.gov/vuln/detail/CVE-2022-32885 [ 2 ] CVE-2022-32886 https://nvd.nist.gov/vuln/detail/CVE-2022-32886 [ 3 ] CVE-2022-32888 https://nvd.nist.gov/vuln/detail/CVE-2022-32888 [ 4 ] CVE-2022-32891 https://nvd.nist.gov/vuln/detail/CVE-2022-32891 [ 5 ] CVE-2022-32923 https://nvd.nist.gov/vuln/detail/CVE-2022-32923 [ 6 ] CVE-2022-42799 https://nvd.nist.gov/vuln/detail/CVE-2022-42799 [ 7 ] CVE-2022-42823 https://nvd.nist.gov/vuln/detail/CVE-2022-42823 [ 8 ] CVE-2022-42824 https://nvd.nist.gov/vuln/detail/CVE-2022-42824 [ 9 ] CVE-2022-42826 https://nvd.nist.gov/vuln/detail/CVE-2022-42826 [ 10 ] CVE-2022-42852 https://nvd.nist.gov/vuln/detail/CVE-2022-42852 [ 11 ] CVE-2022-42856 https://nvd.nist.gov/vuln/detail/CVE-2022-42856 [ 12 ] CVE-2022-42863 https://nvd.nist.gov/vuln/detail/CVE-2022-42863 [ 13 ] CVE-2022-42867 https://nvd.nist.gov/vuln/detail/CVE-2022-42867 [ 14 ] CVE-2022-46691 https://nvd.nist.gov/vuln/detail/CVE-2022-46691 [ 15 ] CVE-2022-46692 https://nvd.nist.gov/vuln/detail/CVE-2022-46692 [ 16 ] CVE-2022-46698 https://nvd.nist.gov/vuln/detail/CVE-2022-46698 [ 17 ] CVE-2022-46699 https://nvd.nist.gov/vuln/detail/CVE-2022-46699 [ 18 ] CVE-2022-46700 https://nvd.nist.gov/vuln/detail/CVE-2022-46700 [ 19 ] CVE-2023-23517 https://nvd.nist.gov/vuln/detail/CVE-2023-23517 [ 20 ] CVE-2023-23518 https://nvd.nist.gov/vuln/detail/CVE-2023-23518 [ 21 ] CVE-2023-23529 https://nvd.nist.gov/vuln/detail/CVE-2023-23529 [ 22 ] CVE-2023-25358 https://nvd.nist.gov/vuln/detail/CVE-2023-25358 [ 23 ] CVE-2023-25360 https://nvd.nist.gov/vuln/detail/CVE-2023-25360 [ 24 ] CVE-2023-25361 https://nvd.nist.gov/vuln/detail/CVE-2023-25361 [ 25 ] CVE-2023-25362 https://nvd.nist.gov/vuln/detail/CVE-2023-25362 [ 26 ] CVE-2023-25363 https://nvd.nist.gov/vuln/detail/CVE-2023-25363 [ 27 ] CVE-2023-27932 https://nvd.nist.gov/vuln/detail/CVE-2023-27932 [ 28 ] CVE-2023-27954 https://nvd.nist.gov/vuln/detail/CVE-2023-27954 [ 29 ] CVE-2023-28205 https://nvd.nist.gov/vuln/detail/CVE-2023-28205 [ 30 ] WSA-2022-0009 https://webkitgtk.org/security/WSA-2022-0009.html [ 31 ] WSA-2022-0010 https://webkitgtk.org/security/WSA-2022-0010.html [ 32 ] WSA-2023-0001 https://webkitgtk.org/security/WSA-2023-0001.html [ 33 ] WSA-2023-0002 https://webkitgtk.org/security/WSA-2023-0002.html [ 34 ] WSA-2023-0003 https://webkitgtk.org/security/WSA-2023-0003.html
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202305-32
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 . WebKit Bugzilla: 243236 CVE-2022-32891: @real_as3617 and an anonymous researcher Entry updated October 27, 2022
WebKit Sandboxing Available for: macOS Big Sur and macOS Monterey Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: An access issue was addressed with improvements to the sandbox. WebKit Bugzilla: 243181 CVE-2022-32892: @18楼梦想改造家 and @jq0904 of DBAppSecurity's WeBin lab Entry added October 27, 2022
Safari 16 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2022-10-27-11 tvOS 16
tvOS 16 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213487.
Accelerate Framework Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory consumption issue was addressed with improved memory handling. CVE-2022-42795: ryuzaki
AppleAVD Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An app may be able to execute arbitrary code with kernel privileges Description: This issue was addressed with improved checks. CVE-2022-32907: Natalie Silvanovich of Google Project Zero, Antonio Zekic (@antoniozekic) and John Aakerblom (@jaakerblom), ABC Research s.r.o, Yinyi Wu, Tommaso Bianco (@cutesmilee__)
GPU Drivers Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An app may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2022-32903: an anonymous researcher
ImageIO Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: Processing an image may lead to a denial-of-service Description: A denial-of-service issue was addressed with improved validation. CVE-2022-1622
Image Processing Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: A sandboxed app may be able to determine which app is currently using the camera Description: The issue was addressed with additional restrictions on the observability of app states. CVE-2022-32913: Yiğit Can YILMAZ (@yilmazcanyigit)
Image Processing Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An app may be able to execute arbitrary code with kernel privileges Description: This issue was addressed with improved checks. CVE-2022-32949: Tingting Yin of Tsinghua University Entry added October 27, 2022
Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An app may be able to disclose kernel memory Description: The issue was addressed with improved memory handling. CVE-2022-32864: Linus Henze of Pinauten GmbH (pinauten.de)
Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-32866: Linus Henze of Pinauten GmbH (pinauten.de) CVE-2022-32911: Zweig of Kunlun Lab
Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An app may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2022-32914: Zweig of Kunlun Lab
MediaLibrary Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: A user may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2022-32908: an anonymous researcher
Notifications Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: A user with physical access to a device may be able to access contacts from the lock screen Description: A logic issue was addressed with improved state management. CVE-2022-32879: Ubeydullah Sümer
Sandbox Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An app may be able to modify protected parts of the file system Description: A logic issue was addressed with improved restrictions. CVE-2022-32881: Csaba Fitzl (@theevilbit) of Offensive Security
SQLite Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: A remote user may be able to cause a denial-of-service Description: This issue was addressed with improved checks. CVE-2021-36690
WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A buffer overflow issue was addressed with improved memory handling. WebKit Bugzilla: 241969 CVE-2022-32886: P1umer(@p1umer), afang(@afang5472), xmzyshypnc(@xmzyshypnc1)
WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. WebKit Bugzilla: 242047 CVE-2022-32888: P1umer (@p1umer)
WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved bounds checking. WebKit Bugzilla: 242762 CVE-2022-32912: Jeonghoon Shin (@singi21a) at Theori working with Trend Micro Zero Day Initiative
WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: Visiting a website that frames malicious content may lead to UI spoofing Description: The issue was addressed with improved UI handling. WebKit Bugzilla: 242762 CVE-2022-32891: @real_as3617, an anonymous researcher
Wi-Fi Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An app may be able to cause unexpected system termination or write kernel memory Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2022-32925: Wang Yu of Cyberserval
Additional recognition
AppleCredentialManager We would like to acknowledge @jonathandata1 for their assistance.
Identity Services We would like to acknowledge Joshua Jones for their assistance.
Kernel We would like to acknowledge an anonymous researcher for their assistance.
Sandbox We would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive Security for their assistance.
UIKit We would like to acknowledge Aleczander Ewing for their assistance.
WebKit We would like to acknowledge an anonymous researcher for their assistance.
Apple TV will periodically check for software updates. Alternatively, you may manually check for software updates by selecting "Settings -> System -> Software Update -> Update Software." To check the current version of software, select "Settings -> General -> About." All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222.
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEBP+4DupqR5Sgt1DB4RjMIDkeNxkFAmNbKpUACgkQ4RjMIDke NxmVqQ//euIvh3eN5tjkLRIDWFgteGsdR3O6GXKVcZvCiOI7EdmCksA7/3uIo3m2 wAXO/XJB5GDbxwHpyIlaN6eSlQnAhUTeYuDZGTyyUKwRmyj0oYu0IQw9C1xrGefA LDEqYiTwx7sQnuC6ijirFdHSO0uM+YEHCm0OZ4v2dGBJKAdIFN/5b0jq6/Y9NnWL EHSL5BLhOOEBxWoi4K2tbbE+ty8+Zqk0GrUJxaWQ7vCKPD8Ts2sNb7JAAVu5WQDY bmOyWpusZ1evUE/N0nZdqWFTwAXCTfH+4xZ4IXHTUFuHPIXuJ/2ySeqzYjldY75Q vGVCy1b4wtd+C9XD7QGbpd3MHrkECZMI8pWbHkCB53Io1+zdaKiv+xmtSl0ZlFyL 8f/FsR34FMzQPAhlZec60hIKHh83Lr7pOK5KrPNgAECTlxtBYD7Teau+qqTYFQgN pW5/4WtXhVpje5ILu3xzUmqBWk7QPNa7b0PdPLu6OjxE9iMVJF+p8Suk739Ex2H7 81uJp89tTE3UYXvhxaMYP2L0tbrEydlz+wGGI35+jrt4S82FsmvJvV9lqT8NubIG /IakSGMMlYoyb4JcCN3MJCXs2C48iydCPE4g7yaEhg4qNpcXfANdEzRh/KAenSwq bWic5nC6dxWqD4OXjyfjmpkvrq5B2lg87WesDkqMh9oJ9uWBTh8= =Aea8 -----END PGP SIGNATURE-----
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202209-0771",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "iphone os",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "16.0"
},
{
"model": "watchos",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "9.0"
},
{
"model": "tvos",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "16.0"
},
{
"model": "safari",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "16.0"
},
{
"model": "safari",
"scope": null,
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": null
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": "9.0"
},
{
"model": "ios",
"scope": null,
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": null
},
{
"model": "tvos",
"scope": null,
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-020308"
},
{
"db": "NVD",
"id": "CVE-2022-32891"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple",
"sources": [
{
"db": "PACKETSTORM",
"id": "168362"
},
{
"db": "PACKETSTORM",
"id": "169602"
},
{
"db": "PACKETSTORM",
"id": "169589"
}
],
"trust": 0.3
},
"cve": "CVE-2022-32891",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"id": "CVE-2022-32891",
"impactScore": 2.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 6.1,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2022-32891",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2022-32891",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2022-32891",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-202209-785",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-020308"
},
{
"db": "CNNVD",
"id": "CNNVD-202209-785"
},
{
"db": "NVD",
"id": "CVE-2022-32891"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing. Safari , iOS , tvOS A vulnerability exists in multiple Apple products that involves improper restriction of rendered user interface layers or frames.Information may be obtained and information may be tampered with. Description\u003c!----\u003e\n This CVE is under investigation by Red Hat Product Security. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202305-32\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: WebKitGTK+: Multiple Vulnerabilities\n Date: May 30, 2023\n Bugs: #871732, #879571, #888563, #905346, #905349, #905351\n ID: 202305-32\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n=======\nMultiple vulnerabilities have been found in WebkitGTK+, the worst of\nwhich could result in arbitrary code execution. \n\nBackground\n=========\nWebKitGTK+ is a full-featured port of the WebKit rendering engine,\nsuitable for projects requiring any kind of web integration, from hybrid\nHTML/CSS applications to full-fledged web browsers. \n\nAffected packages\n================\nPackage Vulnerable Unaffected\n------------------- ------------ ------------\nnet-libs/webkit-gtk \u003c 2.40.1 \u003e= 2.40.1\n\nDescription\n==========\nMultiple vulnerabilities have been discovered in WebKitGTK+. Please\nreview the CVE identifiers referenced below for details. \n\nImpact\n=====\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n=========\nThere is no known workaround at this time. \n\nResolution\n=========\nAll WebKitGTK+ users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-libs/webkit-gtk-2.40.1\"\n\nReferences\n=========\n[ 1 ] CVE-2022-32885\n https://nvd.nist.gov/vuln/detail/CVE-2022-32885\n[ 2 ] CVE-2022-32886\n https://nvd.nist.gov/vuln/detail/CVE-2022-32886\n[ 3 ] CVE-2022-32888\n https://nvd.nist.gov/vuln/detail/CVE-2022-32888\n[ 4 ] CVE-2022-32891\n https://nvd.nist.gov/vuln/detail/CVE-2022-32891\n[ 5 ] CVE-2022-32923\n https://nvd.nist.gov/vuln/detail/CVE-2022-32923\n[ 6 ] CVE-2022-42799\n https://nvd.nist.gov/vuln/detail/CVE-2022-42799\n[ 7 ] CVE-2022-42823\n https://nvd.nist.gov/vuln/detail/CVE-2022-42823\n[ 8 ] CVE-2022-42824\n https://nvd.nist.gov/vuln/detail/CVE-2022-42824\n[ 9 ] CVE-2022-42826\n https://nvd.nist.gov/vuln/detail/CVE-2022-42826\n[ 10 ] CVE-2022-42852\n https://nvd.nist.gov/vuln/detail/CVE-2022-42852\n[ 11 ] CVE-2022-42856\n https://nvd.nist.gov/vuln/detail/CVE-2022-42856\n[ 12 ] CVE-2022-42863\n https://nvd.nist.gov/vuln/detail/CVE-2022-42863\n[ 13 ] CVE-2022-42867\n https://nvd.nist.gov/vuln/detail/CVE-2022-42867\n[ 14 ] CVE-2022-46691\n https://nvd.nist.gov/vuln/detail/CVE-2022-46691\n[ 15 ] CVE-2022-46692\n https://nvd.nist.gov/vuln/detail/CVE-2022-46692\n[ 16 ] CVE-2022-46698\n https://nvd.nist.gov/vuln/detail/CVE-2022-46698\n[ 17 ] CVE-2022-46699\n https://nvd.nist.gov/vuln/detail/CVE-2022-46699\n[ 18 ] CVE-2022-46700\n https://nvd.nist.gov/vuln/detail/CVE-2022-46700\n[ 19 ] CVE-2023-23517\n https://nvd.nist.gov/vuln/detail/CVE-2023-23517\n[ 20 ] CVE-2023-23518\n https://nvd.nist.gov/vuln/detail/CVE-2023-23518\n[ 21 ] CVE-2023-23529\n https://nvd.nist.gov/vuln/detail/CVE-2023-23529\n[ 22 ] CVE-2023-25358\n https://nvd.nist.gov/vuln/detail/CVE-2023-25358\n[ 23 ] CVE-2023-25360\n https://nvd.nist.gov/vuln/detail/CVE-2023-25360\n[ 24 ] CVE-2023-25361\n https://nvd.nist.gov/vuln/detail/CVE-2023-25361\n[ 25 ] CVE-2023-25362\n https://nvd.nist.gov/vuln/detail/CVE-2023-25362\n[ 26 ] CVE-2023-25363\n https://nvd.nist.gov/vuln/detail/CVE-2023-25363\n[ 27 ] CVE-2023-27932\n https://nvd.nist.gov/vuln/detail/CVE-2023-27932\n[ 28 ] CVE-2023-27954\n https://nvd.nist.gov/vuln/detail/CVE-2023-27954\n[ 29 ] CVE-2023-28205\n https://nvd.nist.gov/vuln/detail/CVE-2023-28205\n[ 30 ] WSA-2022-0009\n https://webkitgtk.org/security/WSA-2022-0009.html\n[ 31 ] WSA-2022-0010\n https://webkitgtk.org/security/WSA-2022-0010.html\n[ 32 ] WSA-2023-0001\n https://webkitgtk.org/security/WSA-2023-0001.html\n[ 33 ] WSA-2023-0002\n https://webkitgtk.org/security/WSA-2023-0002.html\n[ 34 ] WSA-2023-0003\n https://webkitgtk.org/security/WSA-2023-0003.html\n\nAvailability\n===========\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202305-32\n\nConcerns?\n========\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n======\nCopyright 2023 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. \nWebKit Bugzilla: 243236\nCVE-2022-32891: @real_as3617 and an anonymous researcher\nEntry updated October 27, 2022\n\nWebKit Sandboxing\nAvailable for: macOS Big Sur and macOS Monterey\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: An access issue was addressed with improvements to the\nsandbox. \nWebKit Bugzilla: 243181\nCVE-2022-32892: @18\u697c\u68a6\u60f3\u6539\u9020\u5bb6 and @jq0904 of DBAppSecurity\u0027s WeBin lab\nEntry added October 27, 2022\n\nSafari 16 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2022-10-27-11 tvOS 16\n\ntvOS 16 addresses the following issues. \nInformation about the security content is also available at\nhttps://support.apple.com/HT213487. \n\nAccelerate Framework\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A memory consumption issue was addressed with improved\nmemory handling. \nCVE-2022-42795: ryuzaki\n\nAppleAVD\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: This issue was addressed with improved checks. \nCVE-2022-32907: Natalie Silvanovich of Google Project Zero, Antonio\nZekic (@antoniozekic) and John Aakerblom (@jaakerblom), ABC Research\ns.r.o, Yinyi Wu, Tommaso Bianco (@cutesmilee__)\n\nGPU Drivers\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2022-32903: an anonymous researcher\n\nImageIO\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: Processing an image may lead to a denial-of-service\nDescription: A denial-of-service issue was addressed with improved\nvalidation. \nCVE-2022-1622\n\nImage Processing\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: A sandboxed app may be able to determine which app is\ncurrently using the camera\nDescription: The issue was addressed with additional restrictions on\nthe observability of app states. \nCVE-2022-32913: Yi\u011fit Can YILMAZ (@yilmazcanyigit)\n\nImage Processing\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD \nImpact: An app may be able to execute arbitrary code with kernel\nprivileges \nDescription: This issue was addressed with improved checks. \nCVE-2022-32949: Tingting Yin of Tsinghua University\nEntry added October 27, 2022\n\nKernel\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An app may be able to disclose kernel memory\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-32864: Linus Henze of Pinauten GmbH (pinauten.de)\n\nKernel\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-32866: Linus Henze of Pinauten GmbH (pinauten.de)\nCVE-2022-32911: Zweig of Kunlun Lab\n\nKernel\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2022-32914: Zweig of Kunlun Lab\n\nMediaLibrary\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: A user may be able to elevate privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2022-32908: an anonymous researcher\n\nNotifications\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: A user with physical access to a device may be able to access\ncontacts from the lock screen\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2022-32879: Ubeydullah S\u00fcmer\n\nSandbox\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An app may be able to modify protected parts of the file\nsystem\nDescription: A logic issue was addressed with improved restrictions. \nCVE-2022-32881: Csaba Fitzl (@theevilbit) of Offensive Security\n\nSQLite\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: A remote user may be able to cause a denial-of-service\nDescription: This issue was addressed with improved checks. \nCVE-2021-36690\n\nWebKit\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A buffer overflow issue was addressed with improved\nmemory handling. \nWebKit Bugzilla: 241969\nCVE-2022-32886: P1umer(@p1umer), afang(@afang5472),\nxmzyshypnc(@xmzyshypnc1)\n\nWebKit\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nWebKit Bugzilla: 242047\nCVE-2022-32888: P1umer (@p1umer)\n\nWebKit\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nWebKit Bugzilla: 242762\nCVE-2022-32912: Jeonghoon Shin (@singi21a) at Theori working with\nTrend Micro Zero Day Initiative\n\nWebKit\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: Visiting a website that frames malicious content may lead to\nUI spoofing\nDescription: The issue was addressed with improved UI handling. \nWebKit Bugzilla: 242762\nCVE-2022-32891: @real_as3617, an anonymous researcher\n\nWi-Fi\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An app may be able to cause unexpected system termination or\nwrite kernel memory\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2022-32925: Wang Yu of Cyberserval\n\nAdditional recognition\n\nAppleCredentialManager\nWe would like to acknowledge @jonathandata1 for their assistance. \n\nIdentity Services\nWe would like to acknowledge Joshua Jones for their assistance. \n\nKernel\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nSandbox\nWe would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive\nSecurity for their assistance. \n\nUIKit\nWe would like to acknowledge Aleczander Ewing for their assistance. \n\nWebKit\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nApple TV will periodically check for software updates. Alternatively,\nyou may manually check for software updates by selecting \"Settings -\u003e\nSystem -\u003e Software Update -\u003e Update Software.\" To check the current\nversion of software, select \"Settings -\u003e General -\u003e About.\"\nAll information is also posted on the Apple Security Updates\nweb site: https://support.apple.com/en-us/HT201222. \n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\nbWic5nC6dxWqD4OXjyfjmpkvrq5B2lg87WesDkqMh9oJ9uWBTh8=\n=Aea8\n-----END PGP SIGNATURE-----\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-32891"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-020308"
},
{
"db": "VULHUB",
"id": "VHN-424980"
},
{
"db": "VULMON",
"id": "CVE-2022-32891"
},
{
"db": "PACKETSTORM",
"id": "168362"
},
{
"db": "PACKETSTORM",
"id": "172625"
},
{
"db": "PACKETSTORM",
"id": "169602"
},
{
"db": "PACKETSTORM",
"id": "169589"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-32891",
"trust": 3.8
},
{
"db": "PACKETSTORM",
"id": "168362",
"trust": 0.8
},
{
"db": "PACKETSTORM",
"id": "169602",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2022-020308",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2022.5462",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2022.5473",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202209-785",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "169589",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-424980",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2022-32891",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "172625",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-424980"
},
{
"db": "VULMON",
"id": "CVE-2022-32891"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-020308"
},
{
"db": "PACKETSTORM",
"id": "168362"
},
{
"db": "PACKETSTORM",
"id": "172625"
},
{
"db": "PACKETSTORM",
"id": "169602"
},
{
"db": "PACKETSTORM",
"id": "169589"
},
{
"db": "CNNVD",
"id": "CNNVD-202209-785"
},
{
"db": "NVD",
"id": "CVE-2022-32891"
}
]
},
"id": "VAR-202209-0771",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-424980"
}
],
"trust": 0.01
},
"last_update_date": "2024-08-14T12:56:04.400000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "HT213486 Apple\u00a0 Security update",
"trust": 0.8,
"url": "https://support.apple.com/en-us/HT213442"
},
{
"title": "Apple macOS Safari Security vulnerabilities",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=209108"
},
{
"title": "Red Hat: ",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2022-32891"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-32891"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-020308"
},
{
"db": "CNNVD",
"id": "CNNVD-202209-785"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-1021",
"trust": 1.0
},
{
"problemtype": "Improper restrictions on rendered user interface layers or frames (CWE-1021) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-020308"
},
{
"db": "NVD",
"id": "CVE-2022-32891"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://security.gentoo.org/glsa/202305-32"
},
{
"trust": 2.3,
"url": "https://support.apple.com/en-us/ht213442"
},
{
"trust": 1.7,
"url": "https://support.apple.com/en-us/ht213446"
},
{
"trust": 1.7,
"url": "https://support.apple.com/en-us/ht213486"
},
{
"trust": 1.7,
"url": "https://support.apple.com/en-us/ht213487"
},
{
"trust": 1.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32891"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-32891/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.5462"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.5473"
},
{
"trust": 0.6,
"url": "https://vigilance.fr/vulnerability/webkitgtk-wpe-webkit-three-vulnerabilities-39368"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/168362/apple-security-advisory-2022-09-12-5.html"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/169602/apple-security-advisory-2022-10-27-14.html"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32886"
},
{
"trust": 0.3,
"url": "https://www.apple.com/support/security/pgp/"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32912"
},
{
"trust": 0.3,
"url": "https://support.apple.com/en-us/ht201222."
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32868"
},
{
"trust": 0.2,
"url": "https://support.apple.com/ht213442."
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32888"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-32891"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-46698"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-25358"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-23529"
},
{
"trust": 0.1,
"url": "https://webkitgtk.org/security/wsa-2022-0010.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-42867"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-42852"
},
{
"trust": 0.1,
"url": "https://webkitgtk.org/security/wsa-2023-0001.html"
},
{
"trust": 0.1,
"url": "https://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-46692"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-42799"
},
{
"trust": 0.1,
"url": "https://webkitgtk.org/security/wsa-2023-0002.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-23517"
},
{
"trust": 0.1,
"url": "https://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "https://webkitgtk.org/security/wsa-2022-0009.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-42824"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-46691"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-42826"
},
{
"trust": 0.1,
"url": "https://webkitgtk.org/security/wsa-2023-0003.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-23518"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32885"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-25363"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-27932"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-42823"
},
{
"trust": 0.1,
"url": "https://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-46700"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-27954"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-46699"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-25361"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32923"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-25360"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-42863"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-42856"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-25362"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-28205"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32892"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32866"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32907"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-36690"
},
{
"trust": 0.1,
"url": "https://support.apple.com/ht213487."
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32864"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-1622"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32879"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32903"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32908"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32911"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32881"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-424980"
},
{
"db": "VULMON",
"id": "CVE-2022-32891"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-020308"
},
{
"db": "PACKETSTORM",
"id": "168362"
},
{
"db": "PACKETSTORM",
"id": "172625"
},
{
"db": "PACKETSTORM",
"id": "169602"
},
{
"db": "PACKETSTORM",
"id": "169589"
},
{
"db": "CNNVD",
"id": "CNNVD-202209-785"
},
{
"db": "NVD",
"id": "CVE-2022-32891"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-424980"
},
{
"db": "VULMON",
"id": "CVE-2022-32891"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-020308"
},
{
"db": "PACKETSTORM",
"id": "168362"
},
{
"db": "PACKETSTORM",
"id": "172625"
},
{
"db": "PACKETSTORM",
"id": "169602"
},
{
"db": "PACKETSTORM",
"id": "169589"
},
{
"db": "CNNVD",
"id": "CNNVD-202209-785"
},
{
"db": "NVD",
"id": "CVE-2022-32891"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-02-27T00:00:00",
"db": "VULHUB",
"id": "VHN-424980"
},
{
"date": "2023-11-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-020308"
},
{
"date": "2022-09-13T15:45:03",
"db": "PACKETSTORM",
"id": "168362"
},
{
"date": "2023-05-30T16:32:33",
"db": "PACKETSTORM",
"id": "172625"
},
{
"date": "2022-10-31T15:01:45",
"db": "PACKETSTORM",
"id": "169602"
},
{
"date": "2022-10-31T14:51:24",
"db": "PACKETSTORM",
"id": "169589"
},
{
"date": "2022-09-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202209-785"
},
{
"date": "2023-02-27T20:15:12.063000",
"db": "NVD",
"id": "CVE-2022-32891"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-03-08T00:00:00",
"db": "VULHUB",
"id": "VHN-424980"
},
{
"date": "2023-11-01T07:07:00",
"db": "JVNDB",
"id": "JVNDB-2022-020308"
},
{
"date": "2023-05-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202209-785"
},
{
"date": "2023-05-30T06:15:20.753000",
"db": "NVD",
"id": "CVE-2022-32891"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202209-785"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Vulnerability related to improper restriction of rendered user interface layers or frames in multiple Apple products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-020308"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202209-785"
}
],
"trust": 0.6
}
}
ghsa-3r34-xx92-673h
Vulnerability from github
The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing.
{
"affected": [],
"aliases": [
"CVE-2022-32891"
],
"database_specific": {
"cwe_ids": [
"CWE-1021"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-02-27T20:15:00Z",
"severity": "MODERATE"
},
"details": "The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing.",
"id": "GHSA-3r34-xx92-673h",
"modified": "2023-03-08T15:30:24Z",
"published": "2023-02-27T21:30:23Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202305-32"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213442"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213446"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213486"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213487"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
rhsa-2025:10364
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK+ is port of the WebKit portable web rendering engine to the GTK+ platform. These packages provide WebKitGTK+ for GTK+ 3.\n\nSecurity Fix(es):\n\n* webkitgtk: Command injection in web inspector (CVE-2020-9862)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9893)\n\n* webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution (CVE-2020-9894)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9895)\n\n* webkitgtk: Access issue in content security policy (CVE-2020-9915)\n\n* webkitgtk: A logic issue may lead to cross site scripting (CVE-2020-9925)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9802)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9803)\n\n* webkitgtk: Logic issue may lead to cross site scripting (CVE-2020-9805)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9806)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9807)\n\n* webkitgtk: Input validation issue may lead to cross site scripting (CVE-2020-9843)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9850)\n\n* webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl (CVE-2020-13753)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)\n\n* webkitgtk: input validation issue may lead to a cross site scripting (CVE-2020-9952)\n\n* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)\n\n* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)\n\n* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)\n\n* webkitgtk: use after free issue may lead to arbitrary code execution (CVE-2020-9947)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)\n\n* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)\n\n* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-1817)\n\n* webkitgtk: Memory initialization issue possibly leading to memory disclosure (CVE-2021-1820)\n\n* webkitgtk: Input validation issue leading to cross site scripting attack (CVE-2021-1825)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-1826)\n\n* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)\n\n* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30661)\n\n* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30666)\n\n* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)\n\n* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)\n\n* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)\n\n* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30761)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30762)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)\n\n* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)\n\n* webkitgtk: limited sandbox escape via VFS syscalls (CVE-2021-42762)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)\n\n* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)\n\n* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)\n\n* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)\n\n* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)\n\n* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)\n\n* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)\n\n* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)\n\n* chromium-browser: Inappropriate implementation in Navigation (CVE-2022-0108)\n\n* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)\n\n* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)\n\n* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)\n\n* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)\n\n* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)\n\n* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)\n\n* webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer (CVE-2022-30294)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted (CVE-2022-22677)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)\n\n* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)\n\n* webkitgtk: out-of-bounds read was addressed with improved bounds checking (CVE-2022-32912)\n\n* webkitgtk: UI spoofing while Visiting a website that frames malicious content (CVE-2022-32891)\n\n* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)\n\n* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)\n\n* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)\n\n* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)\n\n* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)\n\n* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)\n\n* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)\n\n* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)\n\n* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)\n\n* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)\n\n* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)\n\n* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)\n\n* webkitgtk: improper bounds checking leading to arbitrary code execution (CVE-2022-48503)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)\n\n* webkitgtk: arbitrary code execution (CVE-2023-37450)\n\n* webkitgtk: arbitrary code execution (CVE-2023-32393)\n\n* webkitgtk: disclose sensitive information (CVE-2023-38133)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-38592)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38594)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38595)\n\n* webkitgtk: track sensitive user information (CVE-2023-38599)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38600)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38611)\n\n* webkitgtk: bypass Same Origin Policy (CVE-2023-38572)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38597)\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: Same Origin Policy bypass via crafted web content (CVE-2023-27932)\n\n* webkitgtk: Website may be able to track sensitive user information (CVE-2023-27954)\n\n* webkitgtk: use after free vulnerability (CVE-2023-28198)\n\n* webkitgtk: content security policy blacklist failure (CVE-2023-32370)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32792)\n\n* webkitgtk: malicious content may lead to UI spoofing (CVE-2022-32816)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)\n\n* webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-35074)\n\n* webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code (CVE-2023-40451)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-41074)\n\n* webkitgtk: Out-of-bounds read leads to sensitive data leak (CVE-2023-42916)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-23213)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42833)\n\n* webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)\n\n* webkit: processing malicious web content may lead to denial-of-service (CVE-2024-23252)\n\n* webkit: malicious website may exfiltrate audio data cross-origin (CVE-2024-23254)\n\n* webkit: processing malicious web content prevents Content Security Policy from being enforced (CVE-2024-23263)\n\n* webkit: maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23280)\n\n* webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced (CVE-2024-23284)\n\n* webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)\n\n* webkitgtk: A website may able to track visited websites in private browsing (CVE-2022-32933)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2022-46705)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46725)\n\n* webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)\n\n* webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* webkit: visiting a malicious website may lead to address bar spoofing (CVE-2023-42843)\n\n* webkit: heap use-after-free may lead to arbitrary code execution (CVE-2023-42950)\n\n* webkit: processing malicious web content may lead to a denial of service (CVE-2023-42956)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkit: pointer authentication bypass (CVE-2024-27834)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)\n\n* webkitgtk: data isolation bypass vulnerability (CVE-2024-44309)\n\n* webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-44308)\n\n* WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54479)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54502)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54505)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54508)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)\n\n* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)\n\n* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54658)\n\n* webkitgtk: out-of-bounds write vulnerability (CVE-2025-24201)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)\n\n* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)\n\n* webkitgtk: A type confusion issue could lead to memory corruption (CVE-2025-24213)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24264)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42875)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42970)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-24223)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31204)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31206)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-31215)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10364",
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "external",
"summary": "1986886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1879532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532"
},
{
"category": "external",
"summary": "1879535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535"
},
{
"category": "external",
"summary": "1879536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536"
},
{
"category": "external",
"summary": "1879538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538"
},
{
"category": "external",
"summary": "1879540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540"
},
{
"category": "external",
"summary": "1879541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541"
},
{
"category": "external",
"summary": "1879545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545"
},
{
"category": "external",
"summary": "1879557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557"
},
{
"category": "external",
"summary": "1879559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559"
},
{
"category": "external",
"summary": "1879563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563"
},
{
"category": "external",
"summary": "1879564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564"
},
{
"category": "external",
"summary": "1879566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566"
},
{
"category": "external",
"summary": "1879568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568"
},
{
"category": "external",
"summary": "1879570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570"
},
{
"category": "external",
"summary": "1901212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212"
},
{
"category": "external",
"summary": "1901214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214"
},
{
"category": "external",
"summary": "1901216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216"
},
{
"category": "external",
"summary": "1901219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219"
},
{
"category": "external",
"summary": "1901221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221"
},
{
"category": "external",
"summary": "1903568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568"
},
{
"category": "external",
"summary": "1928886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886"
},
{
"category": "external",
"summary": "1944323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323"
},
{
"category": "external",
"summary": "1944329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329"
},
{
"category": "external",
"summary": "1944331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331"
},
{
"category": "external",
"summary": "1944333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333"
},
{
"category": "external",
"summary": "1944337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337"
},
{
"category": "external",
"summary": "1944340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340"
},
{
"category": "external",
"summary": "1944343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343"
},
{
"category": "external",
"summary": "1944350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350"
},
{
"category": "external",
"summary": "1944859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859"
},
{
"category": "external",
"summary": "1944862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862"
},
{
"category": "external",
"summary": "1944867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867"
},
{
"category": "external",
"summary": "1980441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441"
},
{
"category": "external",
"summary": "1986852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852"
},
{
"category": "external",
"summary": "1986856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856"
},
{
"category": "external",
"summary": "1986858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858"
},
{
"category": "external",
"summary": "1986860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860"
},
{
"category": "external",
"summary": "1986863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863"
},
{
"category": "external",
"summary": "1986866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866"
},
{
"category": "external",
"summary": "1986870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870"
},
{
"category": "external",
"summary": "1986872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872"
},
{
"category": "external",
"summary": "1986874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874"
},
{
"category": "external",
"summary": "1986877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877"
},
{
"category": "external",
"summary": "1986879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879"
},
{
"category": "external",
"summary": "1986881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881"
},
{
"category": "external",
"summary": "1986888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888"
},
{
"category": "external",
"summary": "1986890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890"
},
{
"category": "external",
"summary": "1986892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892"
},
{
"category": "external",
"summary": "1986894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894"
},
{
"category": "external",
"summary": "1986898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898"
},
{
"category": "external",
"summary": "1986900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900"
},
{
"category": "external",
"summary": "1986902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902"
},
{
"category": "external",
"summary": "1986906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906"
},
{
"category": "external",
"summary": "2016673",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673"
},
{
"category": "external",
"summary": "2017898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898"
},
{
"category": "external",
"summary": "2017901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901"
},
{
"category": "external",
"summary": "2017904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904"
},
{
"category": "external",
"summary": "2018573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573"
},
{
"category": "external",
"summary": "2034347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347"
},
{
"category": "external",
"summary": "2034368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368"
},
{
"category": "external",
"summary": "2034373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373"
},
{
"category": "external",
"summary": "2034376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376"
},
{
"category": "external",
"summary": "2034378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378"
},
{
"category": "external",
"summary": "2034381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381"
},
{
"category": "external",
"summary": "2034383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383"
},
{
"category": "external",
"summary": "2034386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386"
},
{
"category": "external",
"summary": "2034389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389"
},
{
"category": "external",
"summary": "2037469",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469"
},
{
"category": "external",
"summary": "2038907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907"
},
{
"category": "external",
"summary": "2040327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327"
},
{
"category": "external",
"summary": "2040329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329"
},
{
"category": "external",
"summary": "2040331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331"
},
{
"category": "external",
"summary": "2044521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521"
},
{
"category": "external",
"summary": "2044528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528"
},
{
"category": "external",
"summary": "2044534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534"
},
{
"category": "external",
"summary": "2044538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538"
},
{
"category": "external",
"summary": "2044542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542"
},
{
"category": "external",
"summary": "2044551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551"
},
{
"category": "external",
"summary": "2044553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553"
},
{
"category": "external",
"summary": "2045291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291"
},
{
"category": "external",
"summary": "2053179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179"
},
{
"category": "external",
"summary": "2053181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181"
},
{
"category": "external",
"summary": "2053185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185"
},
{
"category": "external",
"summary": "2056474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474"
},
{
"category": "external",
"summary": "2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "2073903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903"
},
{
"category": "external",
"summary": "2082544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544"
},
{
"category": "external",
"summary": "2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "2104788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788"
},
{
"category": "external",
"summary": "2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "external",
"summary": "2121645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645"
},
{
"category": "external",
"summary": "2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "2128645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645"
},
{
"category": "external",
"summary": "2128647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647"
},
{
"category": "external",
"summary": "2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "2153683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683"
},
{
"category": "external",
"summary": "2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "2169934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934"
},
{
"category": "external",
"summary": "2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "2185724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724"
},
{
"category": "external",
"summary": "2209208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208"
},
{
"category": "external",
"summary": "2209214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214"
},
{
"category": "external",
"summary": "2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "2218626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626"
},
{
"category": "external",
"summary": "2218640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640"
},
{
"category": "external",
"summary": "2223000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000"
},
{
"category": "external",
"summary": "2224608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608"
},
{
"category": "external",
"summary": "2231015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015"
},
{
"category": "external",
"summary": "2231017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017"
},
{
"category": "external",
"summary": "2231018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018"
},
{
"category": "external",
"summary": "2231019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019"
},
{
"category": "external",
"summary": "2231020",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020"
},
{
"category": "external",
"summary": "2231021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021"
},
{
"category": "external",
"summary": "2231022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022"
},
{
"category": "external",
"summary": "2231028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028"
},
{
"category": "external",
"summary": "2231043",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043"
},
{
"category": "external",
"summary": "2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "2236843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843"
},
{
"category": "external",
"summary": "2236844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844"
},
{
"category": "external",
"summary": "2238943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943"
},
{
"category": "external",
"summary": "2238944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944"
},
{
"category": "external",
"summary": "2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "2238973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973"
},
{
"category": "external",
"summary": "2238975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975"
},
{
"category": "external",
"summary": "2240522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522"
},
{
"category": "external",
"summary": "2241400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400"
},
{
"category": "external",
"summary": "2241403",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403"
},
{
"category": "external",
"summary": "2241409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409"
},
{
"category": "external",
"summary": "2241412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412"
},
{
"category": "external",
"summary": "2253054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054"
},
{
"category": "external",
"summary": "2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "2254326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326"
},
{
"category": "external",
"summary": "2254327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327"
},
{
"category": "external",
"summary": "2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "2270141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141"
},
{
"category": "external",
"summary": "2270143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143"
},
{
"category": "external",
"summary": "2270146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146"
},
{
"category": "external",
"summary": "2270151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151"
},
{
"category": "external",
"summary": "2270288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288"
},
{
"category": "external",
"summary": "2270289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289"
},
{
"category": "external",
"summary": "2270290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290"
},
{
"category": "external",
"summary": "2270291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291"
},
{
"category": "external",
"summary": "2270292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292"
},
{
"category": "external",
"summary": "2271437",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437"
},
{
"category": "external",
"summary": "2271441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441"
},
{
"category": "external",
"summary": "2271444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444"
},
{
"category": "external",
"summary": "2271446",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446"
},
{
"category": "external",
"summary": "2271449",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449"
},
{
"category": "external",
"summary": "2271453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453"
},
{
"category": "external",
"summary": "2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "2271717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717"
},
{
"category": "external",
"summary": "2271718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718"
},
{
"category": "external",
"summary": "2271719",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719"
},
{
"category": "external",
"summary": "2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "2282412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412"
},
{
"category": "external",
"summary": "2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "2312724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724"
},
{
"category": "external",
"summary": "2314696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696"
},
{
"category": "external",
"summary": "2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "2314702",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702"
},
{
"category": "external",
"summary": "2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "2314706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706"
},
{
"category": "external",
"summary": "2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "2323289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289"
},
{
"category": "external",
"summary": "2327927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927"
},
{
"category": "external",
"summary": "2327931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931"
},
{
"category": "external",
"summary": "2333841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841"
},
{
"category": "external",
"summary": "2333843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843"
},
{
"category": "external",
"summary": "2333844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844"
},
{
"category": "external",
"summary": "2333845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845"
},
{
"category": "external",
"summary": "2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "2344619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619"
},
{
"category": "external",
"summary": "2344621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621"
},
{
"category": "external",
"summary": "2344622",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622"
},
{
"category": "external",
"summary": "2344623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623"
},
{
"category": "external",
"summary": "2344624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624"
},
{
"category": "external",
"summary": "2344946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946"
},
{
"category": "external",
"summary": "2351802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802"
},
{
"category": "external",
"summary": "2353871",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871"
},
{
"category": "external",
"summary": "2353872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872"
},
{
"category": "external",
"summary": "2357909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909"
},
{
"category": "external",
"summary": "2357910",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910"
},
{
"category": "external",
"summary": "2357911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911"
},
{
"category": "external",
"summary": "2357913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913"
},
{
"category": "external",
"summary": "2357917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917"
},
{
"category": "external",
"summary": "2357918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918"
},
{
"category": "external",
"summary": "2357919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919"
},
{
"category": "external",
"summary": "2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "2366499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499"
},
{
"category": "external",
"summary": "2366500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500"
},
{
"category": "external",
"summary": "2366501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501"
},
{
"category": "external",
"summary": "2366502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502"
},
{
"category": "external",
"summary": "2366503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503"
},
{
"category": "external",
"summary": "1986883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883"
},
{
"category": "external",
"summary": "2366504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10364.json"
}
],
"title": "Red Hat Security Advisory: webkitgtk4 security update",
"tracking": {
"current_release_date": "2025-10-22T16:19:26+00:00",
"generator": {
"date": "2025-10-22T16:19:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:10364",
"initial_release_date": "2025-07-07T02:28:52+00:00",
"revision_history": [
{
"date": "2025-07-07T02:28:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-07T02:28:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-22T16:19:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkitgtk4-0:2.48.3-2.el7_9.src",
"product": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.src",
"product_id": "webkitgtk4-0:2.48.3-2.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"product": {
"name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"product_id": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-doc@2.48.3-2.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch"
},
"product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch"
},
"product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-1745",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270151"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the SVG implementation within WebKitGTK. This flaw allows remote attackers to exploit the removal of an SVGFontFaceElement object, which occurs through specific vectors that trigger the deletion of the object during rendering.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-1745"
},
{
"category": "external",
"summary": "RHBZ#2270151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-1745",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1745"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
}
],
"release_date": "2024-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents"
},
{
"cve": "CVE-2020-9802",
"cwe": {
"id": "CWE-841",
"name": "Improper Enforcement of Behavioral Workflow"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879545"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9802"
},
{
"category": "external",
"summary": "RHBZ#1879545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9803",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879557"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing maliciously crafted web content leading to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9803"
},
{
"category": "external",
"summary": "RHBZ#1879557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9805",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879559"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue may lead to cross site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9805"
},
{
"category": "external",
"summary": "RHBZ#1879559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue may lead to cross site scripting"
},
{
"cve": "CVE-2020-9806",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879563"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkit gtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing of maliciously crafted web content that could lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9806"
},
{
"category": "external",
"summary": "RHBZ#1879563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9807",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879564"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9807"
},
{
"category": "external",
"summary": "RHBZ#1879564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9807",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9843",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879566"
}
],
"notes": [
{
"category": "description",
"text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Input validation issue may lead to cross site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9843"
},
{
"category": "external",
"summary": "RHBZ#1879566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9843"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Input validation issue may lead to cross site scripting"
},
{
"cve": "CVE-2020-9850",
"cwe": {
"id": "CWE-841",
"name": "Improper Enforcement of Behavioral Workflow"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879568"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows a remote attacker to cause arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t shipped any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9850"
},
{
"category": "external",
"summary": "RHBZ#1879568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9850",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9850"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9862",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879532"
}
],
"notes": [
{
"category": "description",
"text": "A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Command injection in web inspector",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9862"
},
{
"category": "external",
"summary": "RHBZ#1879532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9862",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9862"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Command injection in web inspector"
},
{
"cve": "CVE-2020-9893",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879535"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9893"
},
{
"category": "external",
"summary": "RHBZ#1879535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9893"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution"
},
{
"cve": "CVE-2020-9894",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879536"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9894"
},
{
"category": "external",
"summary": "RHBZ#1879536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9894",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9894"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution"
},
{
"cve": "CVE-2020-9895",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk in versions prior to 2.28.4 and in WPE WebKit in versions prior to 2.28.4. A use-after-free issue was found allowing a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9895"
},
{
"category": "external",
"summary": "RHBZ#1879538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9895"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution"
},
{
"cve": "CVE-2020-9915",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879540"
}
],
"notes": [
{
"category": "description",
"text": "An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Access issue in content security policy",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9915"
},
{
"category": "external",
"summary": "RHBZ#1879540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9915",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9915"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Access issue in content security policy"
},
{
"cve": "CVE-2020-9925",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879541"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A logic issue may lead to cross site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9925"
},
{
"category": "external",
"summary": "RHBZ#1879541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9925"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A logic issue may lead to cross site scripting"
},
{
"cve": "CVE-2020-9947",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944331"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use after free issue may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9947"
},
{
"category": "external",
"summary": "RHBZ#1944331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9947"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use after free issue may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9948",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901214"
}
],
"notes": [
{
"category": "description",
"text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9948"
},
{
"category": "external",
"summary": "RHBZ#1901214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: type confusion may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9951",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901216"
}
],
"notes": [
{
"category": "description",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9951"
},
{
"category": "external",
"summary": "RHBZ#1901216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9952",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901219"
}
],
"notes": [
{
"category": "description",
"text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: input validation issue may lead to a cross site scripting",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "webkit2gtk3 as shipped with Red Hat Enterprise Linux 8 is not affected by this flaw, as the version shipped is newer than the affected version range.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9952"
},
{
"category": "external",
"summary": "RHBZ#1901219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9952",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9952"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: input validation issue may lead to a cross site scripting"
},
{
"cve": "CVE-2020-9983",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901221"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds write may lead to code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9983"
},
{
"category": "external",
"summary": "RHBZ#1901221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: out-of-bounds write may lead to code execution"
},
{
"cve": "CVE-2020-13543",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903568"
}
],
"notes": [
{
"category": "description",
"text": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13543"
},
{
"category": "external",
"summary": "RHBZ#1903568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0009.html",
"url": "https://webkitgtk.org/security/WSA-2020-0009.html"
}
],
"release_date": "2020-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-13558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-02-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1928886"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in the AudioSourceProviderGStreamer class of WebKitGTK and WPE WebKit in versions prior to 2.30.5. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13558"
},
{
"category": "external",
"summary": "RHBZ#1928886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0001.html",
"url": "https://webkitgtk.org/security/WSA-2021-0001.html"
}
],
"release_date": "2021-02-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution"
},
{
"cve": "CVE-2020-13584",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901212"
}
],
"notes": [
{
"category": "description",
"text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13584"
},
{
"category": "external",
"summary": "RHBZ#1901212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-13753",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879570"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. The bubblewrap sandbox failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal\u2019s input buffer, similar to CVE-2017-5226. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13753"
},
{
"category": "external",
"summary": "RHBZ#1879570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13753",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl"
},
{
"cve": "CVE-2020-27918",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944323"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27918"
},
{
"category": "external",
"summary": "RHBZ#1944323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27918"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2020-29623",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944329"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A user may be unable to fully delete the browsing history under some circumstances. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: User may be unable to fully delete browsing history",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29623"
},
{
"category": "external",
"summary": "RHBZ#1944329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29623",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29623"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: User may be unable to fully delete browsing history"
},
{
"cve": "CVE-2021-1765",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944333"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: IFrame sandboxing policy violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1765"
},
{
"category": "external",
"summary": "RHBZ#1944333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1765"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: IFrame sandboxing policy violation"
},
{
"cve": "CVE-2021-1788",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944859"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1788"
},
{
"category": "external",
"summary": "RHBZ#1944859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0003.html",
"url": "https://webkitgtk.org/security/WSA-2021-0003.html"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1789",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944337"
}
],
"notes": [
{
"category": "description",
"text": "A type confusion vulnerability was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1789"
},
{
"category": "external",
"summary": "RHBZ#1944337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1799",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944340"
}
],
"notes": [
{
"category": "description",
"text": "A port redirection issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A malicious website may be able to access restricted ports on arbitrary servers. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1799"
},
{
"category": "external",
"summary": "RHBZ#1944340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1799",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1799"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection"
},
{
"cve": "CVE-2021-1801",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944343"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: IFrame sandboxing policy violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1801"
},
{
"category": "external",
"summary": "RHBZ#1944343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1801",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: IFrame sandboxing policy violation"
},
{
"cve": "CVE-2021-1817",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986852"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1817"
},
{
"category": "external",
"summary": "RHBZ#1986852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1820",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986856"
}
],
"notes": [
{
"category": "description",
"text": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory initialization issue possibly leading to memory disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1820"
},
{
"category": "external",
"summary": "RHBZ#1986856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory initialization issue possibly leading to memory disclosure"
},
{
"cve": "CVE-2021-1825",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986858"
}
],
"notes": [
{
"category": "description",
"text": "An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Input validation issue leading to cross site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1825"
},
{
"category": "external",
"summary": "RHBZ#1986858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Input validation issue leading to cross site scripting attack"
},
{
"cve": "CVE-2021-1826",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986860"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to universal cross site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1826"
},
{
"category": "external",
"summary": "RHBZ#1986860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to universal cross site scripting attack"
},
{
"cve": "CVE-2021-1844",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944862"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1844"
},
{
"category": "external",
"summary": "RHBZ#1944862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1844",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1844"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0003.html",
"url": "https://webkitgtk.org/security/WSA-2021-0003.html"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1870",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944350"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1870"
},
{
"category": "external",
"summary": "RHBZ#1944350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1870",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1870"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1871",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944867"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1871"
},
{
"category": "external",
"summary": "RHBZ#1944867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1871",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0003.html",
"url": "https://webkitgtk.org/security/WSA-2021-0003.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-21775",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986863"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21775"
},
{
"category": "external",
"summary": "RHBZ#1986863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21775"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution"
},
{
"cve": "CVE-2021-21779",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986866"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability exists in the way Webkit\u2019s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21779"
},
{
"category": "external",
"summary": "RHBZ#1986866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution"
},
{
"cve": "CVE-2021-21806",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980441"
}
],
"notes": [
{
"category": "description",
"text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21806"
},
{
"category": "external",
"summary": "RHBZ#1980441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806"
},
{
"category": "external",
"summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214"
}
],
"release_date": "2021-07-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30661",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986870"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30661"
},
{
"category": "external",
"summary": "RHBZ#1986870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30663",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by an integer overflow in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Integer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30663"
},
{
"category": "external",
"summary": "RHBZ#1986872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30663",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30663"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Integer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30665",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986874"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a memory corruption issue in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30665"
},
{
"category": "external",
"summary": "RHBZ#1986874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30665",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30665"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30666",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986877"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package are vulnerable to a buffer overflow caused by improper bounds checking by the WebKit component. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30666"
},
{
"category": "external",
"summary": "RHBZ#1986877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30666",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30682",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986879"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to leak of sensitive user information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30682"
},
{
"category": "external",
"summary": "RHBZ#1986879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30682"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to leak of sensitive user information"
},
{
"cve": "CVE-2021-30689",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986881"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to universal cross site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30689"
},
{
"category": "external",
"summary": "RHBZ#1986881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30689"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to universal cross site scripting attack"
},
{
"cve": "CVE-2021-30720",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986883"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30720"
},
{
"category": "external",
"summary": "RHBZ#1986883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers"
},
{
"cve": "CVE-2021-30734",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986886"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruptions leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30734"
},
{
"category": "external",
"summary": "RHBZ#1986886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30734",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruptions leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30744",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986888"
}
],
"notes": [
{
"category": "description",
"text": "Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30744"
},
{
"category": "external",
"summary": "RHBZ#1986888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack"
},
{
"cve": "CVE-2021-30749",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986890"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruptions leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30749"
},
{
"category": "external",
"summary": "RHBZ#1986890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30749"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruptions leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30758",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986892"
}
],
"notes": [
{
"category": "description",
"text": "A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Type confusion leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30758"
},
{
"category": "external",
"summary": "RHBZ#1986892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30758",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30758"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Type confusion leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30761",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986894"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by memory corruption in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30761"
},
{
"category": "external",
"summary": "RHBZ#1986894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30761"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30762",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986898"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker can execute arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30762"
},
{
"category": "external",
"summary": "RHBZ#1986898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30762",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30762"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30795",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986900"
}
],
"notes": [
{
"category": "description",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30795"
},
{
"category": "external",
"summary": "RHBZ#1986900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30795",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30797",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986902"
}
],
"notes": [
{
"category": "description",
"text": "This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Insufficient checks leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30797"
},
{
"category": "external",
"summary": "RHBZ#1986902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30797",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30797"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Insufficient checks leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30799",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986906"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruptions leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30799"
},
{
"category": "external",
"summary": "RHBZ#1986906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30799",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30799"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruptions leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30809",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034347"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30809"
},
{
"category": "external",
"summary": "RHBZ#2034347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30818",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034368"
}
],
"notes": [
{
"category": "description",
"text": "A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30818"
},
{
"category": "external",
"summary": "RHBZ#2034368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30823",
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034373"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to HSTS bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30823"
},
{
"category": "external",
"summary": "RHBZ#2034373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30823",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to HSTS bypass"
},
{
"cve": "CVE-2021-30836",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034376"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Out-of-bounds read leading to memory disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30836"
},
{
"category": "external",
"summary": "RHBZ#2034376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30836"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: Out-of-bounds read leading to memory disclosure"
},
{
"cve": "CVE-2021-30846",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017898"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30846"
},
{
"category": "external",
"summary": "RHBZ#2017898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30846",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30846"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30848",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017901"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30848"
},
{
"category": "external",
"summary": "RHBZ#2017901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30848"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30849",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017904"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30849"
},
{
"category": "external",
"summary": "RHBZ#2017904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30849",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30849"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30851",
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018573"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30851"
},
{
"category": "external",
"summary": "RHBZ#2018573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30851",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30884",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034378"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user\u0027s browsing history.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: CSS compositing issue leading to revealing of the browsing history",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30884"
},
{
"category": "external",
"summary": "RHBZ#2034378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30884",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: CSS compositing issue leading to revealing of the browsing history"
},
{
"cve": "CVE-2021-30887",
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034381"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to Content Security Policy bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30887"
},
{
"category": "external",
"summary": "RHBZ#2034381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30887",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30887"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to Content Security Policy bypass"
},
{
"cve": "CVE-2021-30888",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034383"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Information leak via Content Security Policy reports",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30888"
},
{
"category": "external",
"summary": "RHBZ#2034383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30888",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Information leak via Content Security Policy reports"
},
{
"cve": "CVE-2021-30889",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034386"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30889"
},
{
"category": "external",
"summary": "RHBZ#2034386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30889",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30889"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30890",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034389"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to universal cross-site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30890"
},
{
"category": "external",
"summary": "RHBZ#2034389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to universal cross-site scripting"
},
{
"cve": "CVE-2021-30897",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2038907"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cross-origin data exfiltration via resource timing API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30897"
},
{
"category": "external",
"summary": "RHBZ#2038907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30897"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cross-origin data exfiltration via resource timing API"
},
{
"cve": "CVE-2021-30934",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044521"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30934"
},
{
"category": "external",
"summary": "RHBZ#2044521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30936",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044528"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30936"
},
{
"category": "external",
"summary": "RHBZ#2044528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30936"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30951",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044534"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30951"
},
{
"category": "external",
"summary": "RHBZ#2044534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30951",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30951"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30952",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30952"
},
{
"category": "external",
"summary": "RHBZ#2044538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30952"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30953",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044542"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30953"
},
{
"category": "external",
"summary": "RHBZ#2044542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30953"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30954",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044551"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30954"
},
{
"category": "external",
"summary": "RHBZ#2044551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30954",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30984",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044553"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30984"
},
{
"category": "external",
"summary": "RHBZ#2044553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-42762",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016673"
}
],
"notes": [
{
"category": "description",
"text": "BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: limited sandbox escape via VFS syscalls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-42762"
},
{
"category": "external",
"summary": "RHBZ#2016673",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-42762",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42762"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762"
}
],
"release_date": "2021-10-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: limited sandbox escape via VFS syscalls"
},
{
"cve": "CVE-2021-45481",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040327"
}
],
"notes": [
{
"category": "description",
"text": "A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45481"
},
{
"category": "external",
"summary": "RHBZ#2040327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create"
},
{
"cve": "CVE-2021-45482",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040329"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45482"
},
{
"category": "external",
"summary": "RHBZ#2040329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45482",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild"
},
{
"cve": "CVE-2021-45483",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040331"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in WebCore::Frame::page",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45483"
},
{
"category": "external",
"summary": "RHBZ#2040331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45483"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in WebCore::Frame::page"
},
{
"cve": "CVE-2022-0108",
"discovery_date": "2022-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2037469"
}
],
"notes": [
{
"category": "description",
"text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Inappropriate implementation in Navigation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0108"
},
{
"category": "external",
"summary": "RHBZ#2037469",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108"
}
],
"release_date": "2022-01-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "chromium-browser: Inappropriate implementation in Navigation"
},
{
"cve": "CVE-2022-22589",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053179"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22589"
},
{
"category": "external",
"summary": "RHBZ#2053179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22589"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript"
},
{
"cve": "CVE-2022-22590",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053181"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22590"
},
{
"category": "external",
"summary": "RHBZ#2053181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-22592",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053185"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22592"
},
{
"category": "external",
"summary": "RHBZ#2053185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22592"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced"
},
{
"cve": "CVE-2022-22594",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2045291"
}
],
"notes": [
{
"category": "description",
"text": "A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22594"
},
{
"category": "external",
"summary": "RHBZ#2045291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2022-22620",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056474"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22620"
},
{
"category": "external",
"summary": "RHBZ#2056474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22620"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0003.html",
"url": "https://webkitgtk.org/security/WSA-2022-0003.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-02-11T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free"
},
{
"cve": "CVE-2022-22624",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073893"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22624"
},
{
"category": "external",
"summary": "RHBZ#2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22624"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22628",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073896"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22628"
},
{
"category": "external",
"summary": "RHBZ#2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22628"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22629",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073899"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22629"
},
{
"category": "external",
"summary": "RHBZ#2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22629"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22637",
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073903"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: logic issue was addressed with improved state management",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22637"
},
{
"category": "external",
"summary": "RHBZ#2073903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22637"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: logic issue was addressed with improved state management"
},
{
"cve": "CVE-2022-22662",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104787"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22662"
},
{
"category": "external",
"summary": "RHBZ#2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure"
},
{
"cve": "CVE-2022-22677",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104788"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs due to a logic issue in video self-preview feature in a webRTC call, which can be interrupted if the user answers a phone call or the audio capture is interrupted. This flaw allows a remote attacker to perform a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability does not affect RHEL because WebRTC code is not included in any WebKitGTK releases thus far.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22677"
},
{
"category": "external",
"summary": "RHBZ#2104788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted"
},
{
"cve": "CVE-2022-26700",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092732"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26700"
},
{
"category": "external",
"summary": "RHBZ#2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26709",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092733"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26709"
},
{
"category": "external",
"summary": "RHBZ#2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26710",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104789"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26710"
},
{
"category": "external",
"summary": "RHBZ#2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26716",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092734"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26716"
},
{
"category": "external",
"summary": "RHBZ#2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26717",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092735"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26717"
},
{
"category": "external",
"summary": "RHBZ#2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26719",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092736"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26719"
},
{
"category": "external",
"summary": "RHBZ#2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-30293",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2082548"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30293"
},
{
"category": "external",
"summary": "RHBZ#2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution"
},
{
"cve": "CVE-2022-30294",
"discovery_date": "2022-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2082544"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] In WebKitGTK through 2.36.0 (and WPE WebKit), there is a use-after-free in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was found to be a duplicate of CVE-2022-30293. Please see https://access.redhat.com/security/cve/CVE-2022-30293 for information about affected products and security errata.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30294"
},
{
"category": "external",
"summary": "RHBZ#2082544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30294"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"title": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer"
},
{
"cve": "CVE-2022-32792",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238973"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32792"
},
{
"category": "external",
"summary": "RHBZ#2238973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32792"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-32816",
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238975"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: malicious content may lead to UI spoofing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32816"
},
{
"category": "external",
"summary": "RHBZ#2238975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: malicious content may lead to UI spoofing"
},
{
"cve": "CVE-2022-32885",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236842"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue when processing web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32885"
},
{
"category": "external",
"summary": "RHBZ#2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue when processing web content"
},
{
"cve": "CVE-2022-32886",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128643"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtkm, where a buffer overflow issue was addressed with improved memory handling. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: buffer overflow issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32886"
},
{
"category": "external",
"summary": "RHBZ#2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: buffer overflow issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-32888",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140501"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32888"
},
{
"category": "external",
"summary": "RHBZ#2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking"
},
{
"cve": "CVE-2022-32891",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128647"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32891"
},
{
"category": "external",
"summary": "RHBZ#2128647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content"
},
{
"cve": "CVE-2022-32893",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2121645"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to an out-of-bounds write. This flaw allows an attacker with network access to pass specially crafted web content files, causing arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32893"
},
{
"category": "external",
"summary": "RHBZ#2121645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32893"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0008.html",
"url": "https://webkitgtk.org/security/WSA-2022-0008.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-08-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-08-18T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-32912",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128645"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32912"
},
{
"category": "external",
"summary": "RHBZ#2128645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32912"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2022-32919",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271437"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK and WPE WebKit that allows a remote attacker to conduct spoofing attacks by exploiting improper UI handling. This flaw enables attackers to create specially crafted websites that can display misleading information to users. By exploiting this vulnerability, an attacker can trick users into believing they are interacting with a legitimate website, potentially leading to a UI spoofing attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32919"
},
{
"category": "external",
"summary": "RHBZ#2271437",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32919"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing."
},
{
"cve": "CVE-2022-32923",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. Processing maliciously crafted web content may disclose the internal states of the app.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: correctness issue in the JIT was addressed with improved checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32923"
},
{
"category": "external",
"summary": "RHBZ#2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: correctness issue in the JIT was addressed with improved checks"
},
{
"cve": "CVE-2022-32933",
"cwe": {
"id": "CWE-841",
"name": "Improper Enforcement of Behavioral Workflow"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271441"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk where a website may be able to track the websites a user visited in private browsing mode.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A website may able to track visited websites in private browsing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32933"
},
{
"category": "external",
"summary": "RHBZ#2271441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32933",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32933"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A website may able to track visited websites in private browsing"
},
{
"cve": "CVE-2022-42799",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140503"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: issue was addressed with improved UI handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42799"
},
{
"category": "external",
"summary": "RHBZ#2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42799"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: issue was addressed with improved UI handling"
},
{
"cve": "CVE-2022-42823",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a logic issue was addressed with improved state management. Processing maliciously crafted web content may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42823"
},
{
"category": "external",
"summary": "RHBZ#2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42824",
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140504"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: sensitive information disclosure issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42824"
},
{
"category": "external",
"summary": "RHBZ#2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: sensitive information disclosure issue"
},
{
"cve": "CVE-2022-42826",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167716"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue exists due to a use-after-free error when processing maliciously crafted web content in WebKit. This may allow an attacker to trick the victim to visit a specially crafted website, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42826"
},
{
"category": "external",
"summary": "RHBZ#2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42826"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42852",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156986"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory disclosure issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42852"
},
{
"category": "external",
"summary": "RHBZ#2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory disclosure issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-42856",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-12-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153683"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42856"
},
{
"category": "external",
"summary": "RHBZ#2153683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Setting the environment variable JSC_useFTLJIT=0 will disable the vulnerable code. (This will also somewhat slow down JavaScript execution.)",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-12-14T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution"
},
{
"cve": "CVE-2022-42863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156987"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42863"
},
{
"category": "external",
"summary": "RHBZ#2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42863"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42867",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156989"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42867"
},
{
"category": "external",
"summary": "RHBZ#2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46691",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156990"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46691"
},
{
"category": "external",
"summary": "RHBZ#2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46691"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46692",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156991"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Same Origin Policy bypass issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46692"
},
{
"category": "external",
"summary": "RHBZ#2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46692"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Same Origin Policy bypass issue"
},
{
"cve": "CVE-2022-46698",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156992"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows an attacker to process maliciously crafted web content that may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: logic issue leading to user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46698"
},
{
"category": "external",
"summary": "RHBZ#2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: logic issue leading to user information disclosure"
},
{
"cve": "CVE-2022-46699",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156993"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46699"
},
{
"category": "external",
"summary": "RHBZ#2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46700",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156994"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46700"
},
{
"category": "external",
"summary": "RHBZ#2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46705",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271444"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to bypass security restrictions and spoof the user\u0027s address bar. This issue occurs when a victim is persuaded to access a specially crafted website due to improper handling of URLs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46705"
},
{
"category": "external",
"summary": "RHBZ#2271444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46705"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing"
},
{
"cve": "CVE-2022-46725",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271446"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This flaw occurs due to an issue in the component URL Handler, which allows a remote attacker to manipulate an unknown input that can lead to clickjacking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46725"
},
{
"category": "external",
"summary": "RHBZ#2271446",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46725"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing."
},
{
"cve": "CVE-2022-48503",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218623"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: improper bounds checking leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48503"
},
{
"category": "external",
"summary": "RHBZ#2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-20T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: improper bounds checking leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23517",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167717"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23517"
},
{
"category": "external",
"summary": "RHBZ#2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23517",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23518",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167715"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23518"
},
{
"category": "external",
"summary": "RHBZ#2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23518",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23529",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2169934"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may, in theory, allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger type confusion, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23529"
},
{
"category": "external",
"summary": "RHBZ#2169934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23529"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0002.html",
"url": "https://webkitgtk.org/security/WSA-2023-0002.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Setting the environment variable JSC_useDFGJIT=0 will mitigate this issue.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-02-14T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution"
},
{
"cve": "CVE-2023-25358",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175099"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25358"
},
{
"category": "external",
"summary": "RHBZ#2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25358",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242683",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242683"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()"
},
{
"cve": "CVE-2023-27932",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Security Policy with Untrusted Domains"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236843"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may bypass the same-origin Policy.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Same Origin Policy bypass via crafted web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-27932"
},
{
"category": "external",
"summary": "RHBZ#2236843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-27932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27932"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Same Origin Policy bypass via crafted web content"
},
{
"cve": "CVE-2023-27954",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236844"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue leads to tracking sensitive user information via a website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Website may be able to track sensitive user information",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-27954"
},
{
"category": "external",
"summary": "RHBZ#2236844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-27954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Website may be able to track sensitive user information"
},
{
"cve": "CVE-2023-28198",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238943"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. When processing web content, it may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use after free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28198"
},
{
"category": "external",
"summary": "RHBZ#2238943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28198"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0008.html",
"url": "https://webkitgtk.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use after free vulnerability"
},
{
"cve": "CVE-2023-28204",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2209208"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: an out-of-bounds read when processing malicious content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28204"
},
{
"category": "external",
"summary": "RHBZ#2209208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-05-22T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: an out-of-bounds read when processing malicious content"
},
{
"cve": "CVE-2023-28205",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2185724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. An improper input validation issue may lead to a use-after-free vulnerability. This vulnerability allows attackers with network access to pass specially crafted web content files, causing Denial of Service or Arbitrary Code Execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "WebKitGTK: use-after-free leads to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28205"
},
{
"category": "external",
"summary": "RHBZ#2185724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28205"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-6qjh-p74q-89mv",
"url": "https://github.com/advisories/GHSA-6qjh-p74q-89mv"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-04-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "WebKitGTK: use-after-free leads to arbitrary code execution"
},
{
"cve": "CVE-2023-32359",
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271449"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk where a user\u2019s password may be read aloud by a text-to-speech accessibility feature.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32359"
},
{
"category": "external",
"summary": "RHBZ#2271449",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32359"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature"
},
{
"cve": "CVE-2023-32370",
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238944"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. A logic issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: content security policy blacklist failure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32370"
},
{
"category": "external",
"summary": "RHBZ#2238944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0008.html",
"url": "https://webkitgtk.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: content security policy blacklist failure"
},
{
"cve": "CVE-2023-32373",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2209214"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in the webkitgtk package. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: a use-after-free when processing maliciously crafted web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32373"
},
{
"category": "external",
"summary": "RHBZ#2209214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-05-22T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: a use-after-free when processing maliciously crafted web content"
},
{
"cve": "CVE-2023-32393",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2224608"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32393"
},
{
"category": "external",
"summary": "RHBZ#2224608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32393"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0006.html",
"url": "https://webkitgtk.org/security/WSA-2023-0006.html"
}
],
"release_date": "2023-07-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-32435",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218626"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32435"
},
{
"category": "external",
"summary": "RHBZ#2218626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0005.html",
"url": "https://webkitgtk.org/security/WSA-2023-0005.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-06-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-32439",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218640"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing maliciously crafted web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32439"
},
{
"category": "external",
"summary": "RHBZ#2218640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32439"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0005.html",
"url": "https://webkitgtk.org/security/WSA-2023-0005.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by setting the environment variable JSC_useDFGJIT=0, which will disable the data flow graph JIT tier. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-06-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-35074",
"discovery_date": "2023-09-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241403"
}
],
"notes": [
{
"category": "description",
"text": "The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-35074"
},
{
"category": "external",
"summary": "RHBZ#2241403",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-35074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35074"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-37450",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2223000"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-37450"
},
{
"category": "external",
"summary": "RHBZ#2223000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-37450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-07-13T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38133",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231015"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK, which exists due to excessive data output in WebKit Process Model. This issue occurs when processing malicious web content, which may lead to sensitive information disclosure to unauthorized attackers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: disclose sensitive information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38133"
},
{
"category": "external",
"summary": "RHBZ#2231015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: disclose sensitive information"
},
{
"cve": "CVE-2023-38572",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Security Policy with Untrusted Domains"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231028"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This flaw exists due to an error when handling the Same Origin Policy. A remote attacker can bypass Same Origin Policy restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: bypass Same Origin Policy",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38572"
},
{
"category": "external",
"summary": "RHBZ#2231028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38572"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: bypass Same Origin Policy"
},
{
"cve": "CVE-2023-38592",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231017"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38592"
},
{
"category": "external",
"summary": "RHBZ#2231017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38592"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-38594",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231018"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38594"
},
{
"category": "external",
"summary": "RHBZ#2231018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38595",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231019"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38595"
},
{
"category": "external",
"summary": "RHBZ#2231019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38595"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38597",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231043"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38597"
},
{
"category": "external",
"summary": "RHBZ#2231043",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38597"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38599",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231020"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK, which exists due to a logic issue in WebKit related to a user\u0027s privacy. A remote attacker may be able to track sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: track sensitive user information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38599"
},
{
"category": "external",
"summary": "RHBZ#2231020",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38599"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: track sensitive user information"
},
{
"cve": "CVE-2023-38600",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231021"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38600"
},
{
"category": "external",
"summary": "RHBZ#2231021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38611",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231022"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38611"
},
{
"category": "external",
"summary": "RHBZ#2231022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38611"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-39928",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-09-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241400"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the WebKitGTK\u0027s MediaRecorder API that may lead to memory corruption and Remote Code Execution. The victim needs to access a malicious web page to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39928"
},
{
"category": "external",
"summary": "RHBZ#2241400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39928"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0009.html",
"url": "https://webkitgtk.org/security/WSA-2023-0009.html"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports"
},
{
"cve": "CVE-2023-40397",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238945"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary javascript code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40397"
},
{
"category": "external",
"summary": "RHBZ#2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2023-0008.html",
"url": "https://wpewebkit.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: arbitrary javascript code execution"
},
{
"cve": "CVE-2023-40414",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270143"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in WebKitGTK and WPE WebKit could allow an attacker to execute arbitrary code on a target system. The issue arises from a use-after-free flaw in memory management when processing web content. This flaw can potentially give attackers the ability to take control of affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40414"
},
{
"category": "external",
"summary": "RHBZ#2270143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40414"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
}
],
"release_date": "2024-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-40451",
"discovery_date": "2023-09-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241409"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. An attacker may be able to execute JavaScript code to trigger Remote Code Execution, resulting in a high impact on data confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40451"
},
{
"category": "external",
"summary": "RHBZ#2241409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40451"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0009.html",
"url": "https://webkitgtk.org/security/WSA-2023-0009.html"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code"
},
{
"cve": "CVE-2023-41074",
"discovery_date": "2023-09-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241412"
}
],
"notes": [
{
"category": "description",
"text": "The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41074"
},
{
"category": "external",
"summary": "RHBZ#2241412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41074"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-41983",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271453"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in WebKitGTK and WPE WebKit may result in a denial-of-service when processing web content. This issue arises from improper memory handling, which could be exploited by attackers to crash the affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41983"
},
{
"category": "external",
"summary": "RHBZ#2271453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing web content may lead to a denial of service"
},
{
"cve": "CVE-2023-41993",
"discovery_date": "2023-09-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2240522"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing malicious web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue doesn\u0027t affect the versions of webkitgtk as shipped with Red Hat Enterprise Linux 8 and 9 as the flaw relies on JIT engine. JIT was disabled in the past when the fixes for CVE-2023-32435 and CVE-2023-32439 were released.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41993"
},
{
"category": "external",
"summary": "RHBZ#2240522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41993"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-09-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-09-25T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing malicious web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42833",
"discovery_date": "2024-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270146"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42833"
},
{
"category": "external",
"summary": "RHBZ#2270146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
}
],
"release_date": "2024-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42843",
"discovery_date": "2024-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271717"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit that may allow a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. By tricking a victim into visiting a specially crafted website, the attacker could perform address bar spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: visiting a malicious website may lead to address bar spoofing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42843"
},
{
"category": "external",
"summary": "RHBZ#2271717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42843"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0002.html",
"url": "https://webkitgtk.org/security/WSA-2024-0002.html"
}
],
"release_date": "2024-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: visiting a malicious website may lead to address bar spoofing"
},
{
"cve": "CVE-2023-42852",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271456"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42852"
},
{
"category": "external",
"summary": "RHBZ#2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42875",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T12:59:19.828000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366497"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42875"
},
{
"category": "external",
"summary": "RHBZ#2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42883",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2254326"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing a malicious image, which could result in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing a malicious image may lead to a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42883"
},
{
"category": "external",
"summary": "RHBZ#2254326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883"
}
],
"release_date": "2023-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing a malicious image may lead to a denial of service"
},
{
"cve": "CVE-2023-42890",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2254327"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing malicious HTML content in WebKit, which could result in memory corruption and arbitrary code execution on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing malicious web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While the discovered flaw in WebKitGTK does indeed present a concerning potential for arbitrary code execution due to memory corruption, its severity is assessed as moderate rather than critical for several reasons. Firstly, successful exploitation of the vulnerability requires the user to interact with malicious HTML content, typically through visiting a compromised website. This dependency on user interaction reduces the likelihood of widespread exploitation compared to vulnerabilities that can be remotely exploited without user interaction. Additionally, the impact of the flaw may be mitigated by various security measures such as sandboxing or Content Security Policy (CSP) enforcement, which can limit the execution environment for potentially malicious code.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42890"
},
{
"category": "external",
"summary": "RHBZ#2254327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42890",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890"
}
],
"release_date": "2023-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing malicious web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42916",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253054"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may cause an out-of-bounds read due to an improper input validation, resulting in sensitive content leaking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Out-of-bounds read leads to sensitive data leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The WebKitGTK package versions, as shipped with Red Hat Enterprise 8 and 9, are not affected by this vulnerability. This flaw is related to the JIT code, which is currently disabled by default on both Red Hat Enterprise Linux versions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42916"
},
{
"category": "external",
"summary": "RHBZ#2253054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Out-of-bounds read leads to sensitive data leak"
},
{
"cve": "CVE-2023-42917",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253058"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Arbitrary Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42917"
},
{
"category": "external",
"summary": "RHBZ#2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42917"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0011.html",
"url": "https://webkitgtk.org/security/WSA-2023-0011.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Arbitrary Remote Code Execution"
},
{
"cve": "CVE-2023-42950",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271718"
}
],
"notes": [
{
"category": "description",
"text": "A heap use-after-free vulnerability was found in WebKit. Exploiting this flaw involves processing maliciously crafted web content, which may result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: heap use-after-free may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42950"
},
{
"category": "external",
"summary": "RHBZ#2271718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42950",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0002.html",
"url": "https://webkitgtk.org/security/WSA-2024-0002.html"
}
],
"release_date": "2024-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: heap use-after-free may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42956",
"discovery_date": "2024-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271719"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This issue may allow an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing malicious web content may lead to a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42956"
},
{
"category": "external",
"summary": "RHBZ#2271719",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42956",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42956"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0002.html",
"url": "https://webkitgtk.org/security/WSA-2024-0002.html"
}
],
"release_date": "2024-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: processing malicious web content may lead to a denial of service"
},
{
"cve": "CVE-2023-42970",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:01:32.590000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42970"
},
{
"category": "external",
"summary": "RHBZ#2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-4558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279689"
}
],
"notes": [
{
"category": "description",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Use after free in ANGLE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "RHBZ#2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: Use after free in ANGLE"
},
{
"cve": "CVE-2024-23213",
"discovery_date": "2024-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270141"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK\u00a0. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23213"
},
{
"category": "external",
"summary": "RHBZ#2270141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
}
],
"release_date": "2024-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-23222",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2259893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23222"
},
{
"category": "external",
"summary": "RHBZ#2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2024-01-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2024-01-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: type confusion may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-23252",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270288"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing malicious web content may lead to denial-of-service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23252"
},
{
"category": "external",
"summary": "RHBZ#2270288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: processing malicious web content may lead to denial-of-service"
},
{
"cve": "CVE-2024-23254",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270289"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit, where a remote attacker is able to exfiltrate audio data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: malicious website may exfiltrate audio data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23254"
},
{
"category": "external",
"summary": "RHBZ#2270289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: malicious website may exfiltrate audio data cross-origin"
},
{
"cve": "CVE-2024-23263",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270290"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic issue by convincing a victim to visit a specially crafted website. This results in the attacker evading the Content Security Policy enforcement.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing malicious web content prevents Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23263"
},
{
"category": "external",
"summary": "RHBZ#2270290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23263",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23263"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: processing malicious web content prevents Content Security Policy from being enforced"
},
{
"cve": "CVE-2024-23271",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Security Policy with Untrusted Domains"
},
"discovery_date": "2024-09-25T15:33:21.499000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314696"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows a remote attacker to trigger unexpected cross-origin behavior via a malicious website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may cause unexpected cross-origin behavior",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23271"
},
{
"category": "external",
"summary": "RHBZ#2314696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may cause unexpected cross-origin behavior"
},
{
"cve": "CVE-2024-23280",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions through an injection issue by persuading a victim to access a specially crafted website, enabling the attackers to fingerprint the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: maliciously crafted webpage may be able to fingerprint the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23280"
},
{
"category": "external",
"summary": "RHBZ#2270291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: maliciously crafted webpage may be able to fingerprint the user"
},
{
"cve": "CVE-2024-23284",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270292"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic flaw by persuading a victim to access a specially crafted website, enabling attackers to circumvent the Content Security Policy enforcement.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23284"
},
{
"category": "external",
"summary": "RHBZ#2270292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced"
},
{
"cve": "CVE-2024-27808",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:36:18.356000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314697"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27808"
},
{
"category": "external",
"summary": "RHBZ#2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27820",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:37:48.081000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314698"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27820"
},
{
"category": "external",
"summary": "RHBZ#2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27833",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:40:34.042000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314700"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27833"
},
{
"category": "external",
"summary": "RHBZ#2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27834",
"cwe": {
"id": "CWE-288",
"name": "Authentication Bypass Using an Alternate Path or Channel"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282412"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Webkit. This flaw allows an attacker with arbitrary read and write capability to bypass pointer authentication.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: pointer authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27834"
},
{
"category": "external",
"summary": "RHBZ#2282412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27834"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0003.html",
"url": "https://webkitgtk.org/security/WSA-2024-0003.html"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: pointer authentication bypass"
},
{
"cve": "CVE-2024-27838",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-09-25T15:42:35.706000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314702"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This vulnerability allows a maliciously crafted webpage to fingerprint the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27838"
},
{
"category": "external",
"summary": "RHBZ#2314702",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27838"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user"
},
{
"cve": "CVE-2024-27851",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:44:41.235000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314704"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27851"
},
{
"category": "external",
"summary": "RHBZ#2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40776",
"discovery_date": "2024-07-30T20:48:03+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301841"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40776"
},
{
"category": "external",
"summary": "RHBZ#2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution"
},
{
"cve": "CVE-2024-40779",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:05:50+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40779"
},
{
"category": "external",
"summary": "RHBZ#2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40780",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:07:22+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302069"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40780"
},
{
"category": "external",
"summary": "RHBZ#2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-31T14:57:24+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302071"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40782"
},
{
"category": "external",
"summary": "RHBZ#2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management"
},
{
"cve": "CVE-2024-40789",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:39:05+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302067"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40789"
},
{
"category": "external",
"summary": "RHBZ#2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-40866",
"discovery_date": "2024-09-17T00:31:06.549134+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2312724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. The attacker could perform address bar spoofing by tricking a victim into visiting a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40866"
},
{
"category": "external",
"summary": "RHBZ#2312724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121238",
"url": "https://support.apple.com/en-us/121238"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121241",
"url": "https://support.apple.com/en-us/121241"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-17T00:15:49.840000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing"
},
{
"cve": "CVE-2024-44185",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T20:05:39.339000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323263"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44185"
},
{
"category": "external",
"summary": "RHBZ#2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0006.html",
"url": "https://webkitgtk.org/security/WSA-2024-0006.html"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44187",
"discovery_date": "2024-09-25T15:50:57.927000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314706"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to exfiltrate data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44187"
},
{
"category": "external",
"summary": "RHBZ#2314706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2024-44192",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-03-20T12:50:04.459000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353871"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44192"
},
{
"category": "external",
"summary": "RHBZ#2353871",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44192",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0002.html",
"url": "https://webkitgtk.org/security/WSA-2025-0002.html"
}
],
"release_date": "2025-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44244",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T21:06:58.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323278"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44244"
},
{
"category": "external",
"summary": "RHBZ#2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44244"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244"
}
],
"release_date": "2024-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44296",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2024-11-01T21:16:26.289000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323289"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing maliciously crafted web content may prevent the Content Security Policy from being enforced. This issue leads to items that were banned from running to be executed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44296"
},
{
"category": "external",
"summary": "RHBZ#2323289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44296"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced"
},
{
"cve": "CVE-2024-44308",
"discovery_date": "2024-11-21T23:02:37.337000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2327931"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in WebKitGTK\u0027s JIT compiler. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In order to exploit this vulnerability, the WebKitGTK JIT engine must be enabled and an attacker needs to trick a user into processing or loading malicious web content. This feature is disabled in Red Hat Enterprise Linux versions 8 and 9, meaning these releases are not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44308"
},
{
"category": "external",
"summary": "RHBZ#2327931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44308"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2024-11-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nAffected installations of Red Hat Enterprise Linux 7 can disable the JIT engine by setting the JavaScriptCoreUseJIT environment variable to 0.\n\nAdditionally, in Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2024-11-21T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-44309",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2024-11-21T22:51:08.987000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2327927"
}
],
"notes": [
{
"category": "description",
"text": "A data isolation bypass vulnerability was discovered in WebKitGTK. Processing maliciously crafted web content could enable a cross-site scripting (XSS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: data isolation bypass vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as IMPORTANT severity due to a cookie management issue that allows an attacker to inject maliciously crafted web content, potentially leading to a cross-site scripting (XSS) attack, this flaw occurs because of improper state management during cookie handling, which could allow unauthorized script execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44309"
},
{
"category": "external",
"summary": "RHBZ#2327927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44309",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44309"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2024-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2024-11-21T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: data isolation bypass vulnerability"
},
{
"cve": "CVE-2024-54467",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-03-20T12:50:18.647000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to a cookie management issue related to improper state management.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54467"
},
{
"category": "external",
"summary": "RHBZ#2353872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0002.html",
"url": "https://webkitgtk.org/security/WSA-2025-0002.html"
}
],
"release_date": "2025-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2024-54479",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2024-12-23T13:16:54.800976+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333841"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. In affected versions of this package, processing maliciously crafted web content may lead to an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as an Important severity because an attacker can process maliciously crafted web content, potentially leading to an unexpected process crash. This issue can disrupt the system stability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54479"
},
{
"category": "external",
"summary": "RHBZ#2333841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121838",
"url": "https://support.apple.com/en-us/121838"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:57:33.957000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54502",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-12-23T13:18:24.328627+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333843"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Webkit. Processing maliciously crafted web content may lead to an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54502"
},
{
"category": "external",
"summary": "RHBZ#2333843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:51.903000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54505",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-12-23T13:18:27.108126+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a type confusion issue due to improper memory handling, causing memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54505"
},
{
"category": "external",
"summary": "RHBZ#2333844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54505"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121838",
"url": "https://support.apple.com/en-us/121838"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:31.052000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-54508",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-12-23T13:18:30.107103+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333845"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54508"
},
{
"category": "external",
"summary": "RHBZ#2333845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54508"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:14.487000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-12-23T13:18:32.596325+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54534"
},
{
"category": "external",
"summary": "RHBZ#2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:39.974000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-54543",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-02-10T09:37:24.253576+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344619"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54543"
},
{
"category": "external",
"summary": "RHBZ#2344619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2025-01-27T21:46:30.578000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-54551",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-04-07T14:23:49.963000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357909"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to a denial-of-service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54551"
},
{
"category": "external",
"summary": "RHBZ#2357909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54551",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing web content may lead to a denial-of-service"
},
{
"cve": "CVE-2024-54658",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-02-11T16:12:08.426000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to a denial-of-service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54658"
},
{
"category": "external",
"summary": "RHBZ#2344946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54658"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing web content may lead to a denial-of-service"
},
{
"cve": "CVE-2025-24143",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2025-02-10T09:40:08.138428+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344621"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A maliciously crafted web page may be able to fingerprint the user due to improper access restrictions to the file system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into visiting a maliciously crafted web page.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24143"
},
{
"category": "external",
"summary": "RHBZ#2344621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122066",
"url": "https://support.apple.com/en-us/122066"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122068",
"url": "https://support.apple.com/en-us/122068"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122073",
"url": "https://support.apple.com/en-us/122073"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122074",
"url": "https://support.apple.com/en-us/122074"
}
],
"release_date": "2025-01-27T21:46:05.639000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not visit untrusted web pages or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user"
},
{
"cve": "CVE-2025-24150",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2025-02-10T09:41:46.644580+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344622"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Copying a URL from Web Inspector may lead to command injection due to improper file handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Copying a URL from Web Inspector may lead to command injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into performing unlikely actions, such as enabling and opening the web inspector in an application and loading malicious web content into it. For this reason, this flaw has been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24150"
},
{
"category": "external",
"summary": "RHBZ#2344622",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24150"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122066",
"url": "https://support.apple.com/en-us/122066"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122068",
"url": "https://support.apple.com/en-us/122068"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122074",
"url": "https://support.apple.com/en-us/122074"
}
],
"release_date": "2025-01-27T21:46:32.259000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Copying a URL from Web Inspector may lead to command injection"
},
{
"cve": "CVE-2025-24158",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-02-10T09:43:02.859455+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344623"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to a denial-of-service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24158"
},
{
"category": "external",
"summary": "RHBZ#2344623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122066",
"url": "https://support.apple.com/en-us/122066"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122068",
"url": "https://support.apple.com/en-us/122068"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122071",
"url": "https://support.apple.com/en-us/122071"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122072",
"url": "https://support.apple.com/en-us/122072"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122073",
"url": "https://support.apple.com/en-us/122073"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122074",
"url": "https://support.apple.com/en-us/122074"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-27T21:45:49.015000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing web content may lead to a denial-of-service"
},
{
"cve": "CVE-2025-24162",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-02-10T09:44:11.167306+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24162"
},
{
"category": "external",
"summary": "RHBZ#2344624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24162"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122066",
"url": "https://support.apple.com/en-us/122066"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122068",
"url": "https://support.apple.com/en-us/122068"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122071",
"url": "https://support.apple.com/en-us/122071"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122072",
"url": "https://support.apple.com/en-us/122072"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122073",
"url": "https://support.apple.com/en-us/122073"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122074",
"url": "https://support.apple.com/en-us/122074"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-27T21:45:54.015000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-24201",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-03-12T22:35:00.430000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2351802"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds write due to improper checks to prevent unauthorized actions, causing a break out of Web Content sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds write vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is only a risk for servers which utilize a GUI for system administration. This vulnerability can only be exploited when specific packages are used with a graphical interface to process untrusted web content, via GNOME for example.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24201"
},
{
"category": "external",
"summary": "RHBZ#2351802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122281",
"url": "https://support.apple.com/en-us/122281"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122284",
"url": "https://support.apple.com/en-us/122284"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122285",
"url": "https://support.apple.com/en-us/122285"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0002.html",
"url": "https://webkitgtk.org/security/WSA-2025-0002.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2025-03-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Systems which do not rely on a GUI for system administration (commonly referred to as \"headless\") should confirm that GNOME shell and WebKitGTK are not present on the system.\n\nWebKitGTK3 is no longer used and can therefore be uninstalled without consequence.\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nTo mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-03-13T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: out-of-bounds write vulnerability"
},
{
"cve": "CVE-2025-24208",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2025-04-07T14:26:09.363000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357910"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Loading a malicious iframe can cause a cross-site scripting attack due to permissions issues.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24208"
},
{
"category": "external",
"summary": "RHBZ#2357910",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24208"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack"
},
{
"cve": "CVE-2025-24209",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2025-04-07T14:27:43.092000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357911"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a buffer overflow due to improper memory handling and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24209"
},
{
"category": "external",
"summary": "RHBZ#2357911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24209"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-24213",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2025-04-07T14:28:47.281000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357913"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper handling of floats and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A type confusion issue could lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThe x86_64 architecture is not vulnerable to this issue, the x86 architecture is not vulnerable when the SSE2 instruction set is enabled, all other architectures are vulnerable to this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24213"
},
{
"category": "external",
"summary": "RHBZ#2357913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: A type confusion issue could lead to memory corruption"
},
{
"cve": "CVE-2025-24216",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-04-07T14:29:49.645000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357917"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24216"
},
{
"category": "external",
"summary": "RHBZ#2357917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24216"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-24223",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:03:40.562000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366499"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24223"
},
{
"category": "external",
"summary": "RHBZ#2366499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24223"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24264",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-04-07T14:31:23.097000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357918"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24264"
},
{
"category": "external",
"summary": "RHBZ#2357918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24264"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-30427",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-04-07T14:32:29.265000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357919"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-30427"
},
{
"category": "external",
"summary": "RHBZ#2357919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-30427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31204",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-05-15T13:04:43.281000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31204"
},
{
"category": "external",
"summary": "RHBZ#2366500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-31205",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-05-15T13:05:47.441000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366501"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may steal data cross-origin due to improper security checks within the web browser or rendering engine, leading to unauthorized disclosure of information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31205"
},
{
"category": "external",
"summary": "RHBZ#2366501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31205"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2025-31206",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2025-05-15T13:06:54.355000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366502"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31206"
},
{
"category": "external",
"summary": "RHBZ#2366502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31215",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-05-15T13:07:56.027000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366503"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31215"
},
{
"category": "external",
"summary": "RHBZ#2366503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31215"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-31257",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:08:57.791000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in an unexpected crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31257"
},
{
"category": "external",
"summary": "RHBZ#2366504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31257"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
}
]
}
rhsa-2022:7704
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 and webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nGLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:7704",
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index"
},
{
"category": "external",
"summary": "2061994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061994"
},
{
"category": "external",
"summary": "2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "2099334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099334"
},
{
"category": "external",
"summary": "2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7704.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:25:07+00:00",
"generator": {
"date": "2025-10-09T22:25:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:7704",
"initial_release_date": "2022-11-08T09:56:52+00:00",
"revision_history": [
{
"date": "2022-11-08T09:56:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-08T09:56:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:25:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.src",
"product": {
"name": "glib2-0:2.56.4-159.el8.src",
"product_id": "glib2-0:2.56.4-159.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.src",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.src",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-devel-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-fam-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-fam-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-tests-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-tests-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-static-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-static-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-0:2.56.4-159.el8.i686",
"product_id": "glib2-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.i686",
"product_id": "glib2-devel-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.i686",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.i686",
"product_id": "glib2-static-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-devel-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-fam-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-fam-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-tests-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-tests-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-static-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-0:2.56.4-159.el8.s390x",
"product_id": "glib2-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.s390x",
"product_id": "glib2-devel-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-fam-0:2.56.4-159.el8.s390x",
"product_id": "glib2-fam-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-tests-0:2.56.4-159.el8.s390x",
"product_id": "glib2-tests-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.s390x",
"product_id": "glib2-static-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-doc-0:2.56.4-159.el8.noarch",
"product": {
"name": "glib2-doc-0:2.56.4-159.el8.noarch",
"product_id": "glib2-doc-0:2.56.4-159.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.56.4-159.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.src",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src"
},
"product_reference": "glib2-0:2.56.4-159.el8.src",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.56.4-159.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch"
},
"product_reference": "glib2-doc-0:2.56.4-159.el8.noarch",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src"
},
"product_reference": "glib2-0:2.56.4-159.el8.src",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.56.4-159.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch"
},
"product_reference": "glib2-doc-0:2.56.4-159.el8.noarch",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-22624",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073893"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22624"
},
{
"category": "external",
"summary": "RHBZ#2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22624"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22628",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073896"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22628"
},
{
"category": "external",
"summary": "RHBZ#2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22628"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22629",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073899"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22629"
},
{
"category": "external",
"summary": "RHBZ#2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22629"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22662",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104787"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22662"
},
{
"category": "external",
"summary": "RHBZ#2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure"
},
{
"cve": "CVE-2022-26700",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092732"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26700"
},
{
"category": "external",
"summary": "RHBZ#2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26709",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092733"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26709"
},
{
"category": "external",
"summary": "RHBZ#2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26710",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104789"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26710"
},
{
"category": "external",
"summary": "RHBZ#2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26716",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092734"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26716"
},
{
"category": "external",
"summary": "RHBZ#2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26717",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092735"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26717"
},
{
"category": "external",
"summary": "RHBZ#2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26719",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092736"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26719"
},
{
"category": "external",
"summary": "RHBZ#2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-30293",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2082548"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30293"
},
{
"category": "external",
"summary": "RHBZ#2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution"
},
{
"cve": "CVE-2022-32792",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238973"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32792"
},
{
"category": "external",
"summary": "RHBZ#2238973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32792"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-32816",
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238975"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: malicious content may lead to UI spoofing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32816"
},
{
"category": "external",
"summary": "RHBZ#2238975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: malicious content may lead to UI spoofing"
},
{
"cve": "CVE-2022-32891",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128647"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32891"
},
{
"category": "external",
"summary": "RHBZ#2128647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content"
}
]
}
rhsa-2022_7704
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 and webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nGLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:7704",
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index"
},
{
"category": "external",
"summary": "2061994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061994"
},
{
"category": "external",
"summary": "2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "2099334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099334"
},
{
"category": "external",
"summary": "2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7704.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T19:06:55+00:00",
"generator": {
"date": "2024-11-22T19:06:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:7704",
"initial_release_date": "2022-11-08T09:56:52+00:00",
"revision_history": [
{
"date": "2022-11-08T09:56:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-08T09:56:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T19:06:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.src",
"product": {
"name": "glib2-0:2.56.4-159.el8.src",
"product_id": "glib2-0:2.56.4-159.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.src",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.src",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-devel-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-fam-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-fam-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-tests-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-tests-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-static-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-static-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-0:2.56.4-159.el8.i686",
"product_id": "glib2-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.i686",
"product_id": "glib2-devel-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.i686",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.i686",
"product_id": "glib2-static-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-devel-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-fam-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-fam-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-tests-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-tests-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-static-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-0:2.56.4-159.el8.s390x",
"product_id": "glib2-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.s390x",
"product_id": "glib2-devel-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-fam-0:2.56.4-159.el8.s390x",
"product_id": "glib2-fam-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-tests-0:2.56.4-159.el8.s390x",
"product_id": "glib2-tests-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.s390x",
"product_id": "glib2-static-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-doc-0:2.56.4-159.el8.noarch",
"product": {
"name": "glib2-doc-0:2.56.4-159.el8.noarch",
"product_id": "glib2-doc-0:2.56.4-159.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.56.4-159.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.src",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src"
},
"product_reference": "glib2-0:2.56.4-159.el8.src",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.56.4-159.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch"
},
"product_reference": "glib2-doc-0:2.56.4-159.el8.noarch",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src"
},
"product_reference": "glib2-0:2.56.4-159.el8.src",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.56.4-159.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch"
},
"product_reference": "glib2-doc-0:2.56.4-159.el8.noarch",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-22624",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073893"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22624"
},
{
"category": "external",
"summary": "RHBZ#2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22624"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22628",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073896"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22628"
},
{
"category": "external",
"summary": "RHBZ#2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22628"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22629",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073899"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22629"
},
{
"category": "external",
"summary": "RHBZ#2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22629"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22662",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104787"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22662"
},
{
"category": "external",
"summary": "RHBZ#2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure"
},
{
"cve": "CVE-2022-26700",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092732"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26700"
},
{
"category": "external",
"summary": "RHBZ#2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26709",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092733"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26709"
},
{
"category": "external",
"summary": "RHBZ#2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26710",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104789"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26710"
},
{
"category": "external",
"summary": "RHBZ#2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26716",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092734"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26716"
},
{
"category": "external",
"summary": "RHBZ#2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26717",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092735"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26717"
},
{
"category": "external",
"summary": "RHBZ#2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26719",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092736"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26719"
},
{
"category": "external",
"summary": "RHBZ#2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-30293",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2082548"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30293"
},
{
"category": "external",
"summary": "RHBZ#2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution"
},
{
"cve": "CVE-2022-32792",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238973"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32792"
},
{
"category": "external",
"summary": "RHBZ#2238973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32792"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-32816",
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238975"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: malicious content may lead to UI spoofing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32816"
},
{
"category": "external",
"summary": "RHBZ#2238975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: malicious content may lead to UI spoofing"
},
{
"cve": "CVE-2022-32891",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128647"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32891"
},
{
"category": "external",
"summary": "RHBZ#2128647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content"
}
]
}
rhsa-2022_8054
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:8054",
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"
},
{
"category": "external",
"summary": "2061996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061996"
},
{
"category": "external",
"summary": "2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8054.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T19:07:05+00:00",
"generator": {
"date": "2024-11-22T19:07:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:8054",
"initial_release_date": "2022-11-15T13:26:22+00:00",
"revision_history": [
{
"date": "2022-11-15T13:26:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-15T13:26:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T19:07:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.src",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.src",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.src",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-22624",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073893"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22624"
},
{
"category": "external",
"summary": "RHBZ#2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22624"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22628",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073896"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22628"
},
{
"category": "external",
"summary": "RHBZ#2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22628"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22629",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073899"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22629"
},
{
"category": "external",
"summary": "RHBZ#2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22629"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22662",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104787"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22662"
},
{
"category": "external",
"summary": "RHBZ#2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure"
},
{
"cve": "CVE-2022-26700",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092732"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26700"
},
{
"category": "external",
"summary": "RHBZ#2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26709",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092733"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26709"
},
{
"category": "external",
"summary": "RHBZ#2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26710",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104789"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26710"
},
{
"category": "external",
"summary": "RHBZ#2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26716",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092734"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26716"
},
{
"category": "external",
"summary": "RHBZ#2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26717",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092735"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26717"
},
{
"category": "external",
"summary": "RHBZ#2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26719",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092736"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26719"
},
{
"category": "external",
"summary": "RHBZ#2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-30293",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2082548"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30293"
},
{
"category": "external",
"summary": "RHBZ#2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution"
},
{
"cve": "CVE-2022-32792",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238973"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32792"
},
{
"category": "external",
"summary": "RHBZ#2238973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32792"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-32816",
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238975"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: malicious content may lead to UI spoofing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32816"
},
{
"category": "external",
"summary": "RHBZ#2238975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: malicious content may lead to UI spoofing"
},
{
"cve": "CVE-2022-32891",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128647"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32891"
},
{
"category": "external",
"summary": "RHBZ#2128647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content"
}
]
}
RHSA-2022:7704
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glib2 and webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nGLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:7704",
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index"
},
{
"category": "external",
"summary": "2061994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061994"
},
{
"category": "external",
"summary": "2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "2099334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099334"
},
{
"category": "external",
"summary": "2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7704.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:25:07+00:00",
"generator": {
"date": "2025-10-09T22:25:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:7704",
"initial_release_date": "2022-11-08T09:56:52+00:00",
"revision_history": [
{
"date": "2022-11-08T09:56:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-08T09:56:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:25:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.src",
"product": {
"name": "glib2-0:2.56.4-159.el8.src",
"product_id": "glib2-0:2.56.4-159.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.src",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.src",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-devel-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-fam-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-fam-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-tests-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-tests-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.aarch64",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.aarch64",
"product_id": "glib2-static-0:2.56.4-159.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.ppc64le",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.ppc64le",
"product_id": "glib2-static-0:2.56.4-159.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-0:2.56.4-159.el8.i686",
"product_id": "glib2-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.i686",
"product_id": "glib2-devel-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.i686",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.i686",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.i686",
"product_id": "glib2-static-0:2.56.4-159.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-devel-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-fam-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-fam-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-tests-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-tests-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.x86_64",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.x86_64",
"product_id": "glib2-static-0:2.56.4-159.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-0:2.56.4-159.el8.s390x",
"product_id": "glib2-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-devel-0:2.56.4-159.el8.s390x",
"product_id": "glib2-devel-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-fam-0:2.56.4-159.el8.s390x",
"product_id": "glib2-fam-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-tests-0:2.56.4-159.el8.s390x",
"product_id": "glib2-tests-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"product_id": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"product_id": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glib2-static-0:2.56.4-159.el8.s390x",
"product": {
"name": "glib2-static-0:2.56.4-159.el8.s390x",
"product_id": "glib2-static-0:2.56.4-159.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-doc-0:2.56.4-159.el8.noarch",
"product": {
"name": "glib2-doc-0:2.56.4-159.el8.noarch",
"product_id": "glib2-doc-0:2.56.4-159.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glib2-doc@2.56.4-159.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.src",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src"
},
"product_reference": "glib2-0:2.56.4-159.el8.src",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.56.4-159.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch"
},
"product_reference": "glib2-doc-0:2.56.4-159.el8.noarch",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src"
},
"product_reference": "glib2-0:2.56.4-159.el8.src",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-debugsource-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-debugsource-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-devel-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-0:2.56.4-159.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch"
},
"product_reference": "glib2-doc-0:2.56.4-159.el8.noarch",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-fam-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-static-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-static-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-tests-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"relates_to_product_reference": "CRB-8.7.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
},
"product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"relates_to_product_reference": "CRB-8.7.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-22624",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073893"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22624"
},
{
"category": "external",
"summary": "RHBZ#2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22624"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22628",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073896"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22628"
},
{
"category": "external",
"summary": "RHBZ#2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22628"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22629",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073899"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22629"
},
{
"category": "external",
"summary": "RHBZ#2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22629"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22662",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104787"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22662"
},
{
"category": "external",
"summary": "RHBZ#2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure"
},
{
"cve": "CVE-2022-26700",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092732"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26700"
},
{
"category": "external",
"summary": "RHBZ#2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26709",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092733"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26709"
},
{
"category": "external",
"summary": "RHBZ#2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26710",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104789"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26710"
},
{
"category": "external",
"summary": "RHBZ#2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26716",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092734"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26716"
},
{
"category": "external",
"summary": "RHBZ#2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26717",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092735"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26717"
},
{
"category": "external",
"summary": "RHBZ#2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26719",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092736"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26719"
},
{
"category": "external",
"summary": "RHBZ#2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-30293",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2082548"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30293"
},
{
"category": "external",
"summary": "RHBZ#2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution"
},
{
"cve": "CVE-2022-32792",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238973"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32792"
},
{
"category": "external",
"summary": "RHBZ#2238973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32792"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-32816",
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238975"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: malicious content may lead to UI spoofing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32816"
},
{
"category": "external",
"summary": "RHBZ#2238975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: malicious content may lead to UI spoofing"
},
{
"cve": "CVE-2022-32891",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128647"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32891"
},
{
"category": "external",
"summary": "RHBZ#2128647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-08T09:56:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:7704"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src",
"AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x",
"AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src",
"CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x",
"CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content"
}
]
}
RHSA-2022:8054
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:8054",
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"
},
{
"category": "external",
"summary": "2061996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061996"
},
{
"category": "external",
"summary": "2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8054.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:25:08+00:00",
"generator": {
"date": "2025-10-09T22:25:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:8054",
"initial_release_date": "2022-11-15T13:26:22+00:00",
"revision_history": [
{
"date": "2022-11-15T13:26:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-15T13:26:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:25:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.src",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.src",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.src",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-22624",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073893"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22624"
},
{
"category": "external",
"summary": "RHBZ#2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22624"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22628",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073896"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22628"
},
{
"category": "external",
"summary": "RHBZ#2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22628"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22629",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073899"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22629"
},
{
"category": "external",
"summary": "RHBZ#2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22629"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22662",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104787"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22662"
},
{
"category": "external",
"summary": "RHBZ#2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure"
},
{
"cve": "CVE-2022-26700",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092732"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26700"
},
{
"category": "external",
"summary": "RHBZ#2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26709",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092733"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26709"
},
{
"category": "external",
"summary": "RHBZ#2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26710",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104789"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26710"
},
{
"category": "external",
"summary": "RHBZ#2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26716",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092734"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26716"
},
{
"category": "external",
"summary": "RHBZ#2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26717",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092735"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26717"
},
{
"category": "external",
"summary": "RHBZ#2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26719",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092736"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26719"
},
{
"category": "external",
"summary": "RHBZ#2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-30293",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2082548"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30293"
},
{
"category": "external",
"summary": "RHBZ#2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution"
},
{
"cve": "CVE-2022-32792",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238973"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32792"
},
{
"category": "external",
"summary": "RHBZ#2238973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32792"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-32816",
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238975"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: malicious content may lead to UI spoofing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32816"
},
{
"category": "external",
"summary": "RHBZ#2238975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: malicious content may lead to UI spoofing"
},
{
"cve": "CVE-2022-32891",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128647"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32891"
},
{
"category": "external",
"summary": "RHBZ#2128647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content"
}
]
}
rhsa-2022:8054
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:8054",
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"
},
{
"category": "external",
"summary": "2061996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061996"
},
{
"category": "external",
"summary": "2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8054.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:25:08+00:00",
"generator": {
"date": "2025-10-09T22:25:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:8054",
"initial_release_date": "2022-11-15T13:26:22+00:00",
"revision_history": [
{
"date": "2022-11-15T13:26:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-11-15T13:26:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:25:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.src",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.src",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.src",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.1.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-22624",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073893"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22624"
},
{
"category": "external",
"summary": "RHBZ#2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22624"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22628",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073896"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22628"
},
{
"category": "external",
"summary": "RHBZ#2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22628"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22629",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073899"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22629"
},
{
"category": "external",
"summary": "RHBZ#2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22629"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22662",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104787"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22662"
},
{
"category": "external",
"summary": "RHBZ#2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure"
},
{
"cve": "CVE-2022-26700",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092732"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26700"
},
{
"category": "external",
"summary": "RHBZ#2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26709",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092733"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26709"
},
{
"category": "external",
"summary": "RHBZ#2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26710",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104789"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26710"
},
{
"category": "external",
"summary": "RHBZ#2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26716",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092734"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26716"
},
{
"category": "external",
"summary": "RHBZ#2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26717",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092735"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26717"
},
{
"category": "external",
"summary": "RHBZ#2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26719",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092736"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26719"
},
{
"category": "external",
"summary": "RHBZ#2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-30293",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2082548"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30293"
},
{
"category": "external",
"summary": "RHBZ#2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution"
},
{
"cve": "CVE-2022-32792",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238973"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32792"
},
{
"category": "external",
"summary": "RHBZ#2238973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32792"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-32816",
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238975"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: malicious content may lead to UI spoofing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32816"
},
{
"category": "external",
"summary": "RHBZ#2238975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: malicious content may lead to UI spoofing"
},
{
"cve": "CVE-2022-32891",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128647"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32891"
},
{
"category": "external",
"summary": "RHBZ#2128647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-11-15T13:26:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:8054"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src",
"AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x",
"AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content"
}
]
}
gsd-2022-32891
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2022-32891",
"description": "The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing.",
"id": "GSD-2022-32891",
"references": [
"https://advisories.mageia.org/CVE-2022-32891.html",
"https://www.suse.com/security/cve/CVE-2022-32891.html",
"https://security.archlinux.org/CVE-2022-32891"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-32891"
],
"details": "The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing.",
"id": "GSD-2022-32891",
"modified": "2023-12-13T01:19:12.118300Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2022-32891",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "iOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "16"
}
]
}
},
{
"product_name": "Safari",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "16"
}
]
}
},
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "9"
}
]
}
},
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "16"
}
]
}
}
]
},
"vendor_name": "Apple"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Visiting a website that frames malicious content may lead to UI spoofing"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/en-us/HT213446",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213446"
},
{
"name": "https://support.apple.com/en-us/HT213442",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213442"
},
{
"name": "https://support.apple.com/en-us/HT213486",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213486"
},
{
"name": "https://support.apple.com/en-us/HT213487",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213487"
},
{
"name": "GLSA-202305-32",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202305-32"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "16.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "16.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "16.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2022-32891"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-1021"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/en-us/HT213487",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213487"
},
{
"name": "https://support.apple.com/en-us/HT213442",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213442"
},
{
"name": "https://support.apple.com/en-us/HT213486",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213486"
},
{
"name": "https://support.apple.com/en-us/HT213446",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213446"
},
{
"name": "GLSA-202305-32",
"refsource": "GENTOO",
"tags": [],
"url": "https://security.gentoo.org/glsa/202305-32"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
},
"lastModifiedDate": "2023-05-30T06:15Z",
"publishedDate": "2023-02-27T20:15Z"
}
}
}
fkie_cve-2022-32891
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | https://security.gentoo.org/glsa/202305-32 | ||
| product-security@apple.com | https://support.apple.com/en-us/HT213442 | Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213446 | Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213486 | Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213487 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202305-32 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213442 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213446 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213486 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213487 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F783A1-114C-4DFC-9F2E-0D43D62CBC69",
"versionEndExcluding": "16.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D9387F-63B6-41B3-8BDC-A6102EE5F1E2",
"versionEndExcluding": "16.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "534DED19-82FC-4E39-BFD3-F2FE5C71A66B",
"versionEndExcluding": "16.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "712A2CD4-6807-496A-8467-BFB138371E51",
"versionEndExcluding": "9.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 mejorando el manejo de la interfaz de usuario. Este problema se solucion\u00f3 en Safari 16, tvOS 16, watchOS 9, iOS 16. Visitar un sitio web que enmarque contenido malicioso puede provocar una suplantaci\u00f3n de la interfaz de usuario."
}
],
"id": "CVE-2022-32891",
"lastModified": "2024-11-21T07:07:10.457",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-02-27T20:15:12.063",
"references": [
{
"source": "product-security@apple.com",
"url": "https://security.gentoo.org/glsa/202305-32"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213442"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213446"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213486"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213487"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/202305-32"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213442"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213446"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213486"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213487"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1021"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2022-AVI-812
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iOS 15.7 et iPadOS versions ant\u00e9rieures \u00e0 15.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 16",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 16",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Monterey versions ant\u00e9rieures \u00e0 12.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Big Sur versions ant\u00e9rieures \u00e0 11.7",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32891"
},
{
"name": "CVE-2022-32795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32795"
},
{
"name": "CVE-2022-32917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32917"
},
{
"name": "CVE-2022-32900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32900"
},
{
"name": "CVE-2022-32854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32854"
},
{
"name": "CVE-2022-32886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32886"
},
{
"name": "CVE-2022-32896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32896"
},
{
"name": "CVE-2022-32894",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32894"
},
{
"name": "CVE-2022-32883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32883"
},
{
"name": "CVE-2022-32912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32912"
},
{
"name": "CVE-2022-32908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32908"
},
{
"name": "CVE-2022-32911",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32911"
},
{
"name": "CVE-2022-32864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32864"
},
{
"name": "CVE-2022-32868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32868"
},
{
"name": "CVE-2022-32902",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32902"
},
{
"name": "CVE-2022-32872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32872"
}
],
"initial_release_date": "2022-09-13T00:00:00",
"last_revision_date": "2022-09-13T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-812",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-09-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213443 du 12 septembre 2022",
"url": "https://support.apple.com/en-us/HT213443"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213445 du 12 septembre 2022",
"url": "https://support.apple.com/en-us/HT213445"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213442 du 12 septembre 2022",
"url": "https://support.apple.com/en-us/HT213442"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213444 du 12 septembre 2022",
"url": "https://support.apple.com/en-us/HT213444"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213446 du 12 septembre 2022",
"url": "https://support.apple.com/en-us/HT213446"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.