Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-22620 (GCVE-0-2022-22620)
Vulnerability from cvelistv5 – Published: 2022-03-18 17:59 – Updated: 2025-10-21 23:15- Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
| URL | Tags |
|---|---|
| https://support.apple.com/en-us/HT213091 | x_refsource_MISC |
| https://support.apple.com/en-us/HT213092 | x_refsource_MISC |
| https://support.apple.com/en-us/HT213093 | x_refsource_MISC |
| https://security.gentoo.org/glsa/202208-39 | vendor-advisoryx_refsource_GENTOO |
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-416 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | iOS, iPadOS, and macOS |
| Due Date | 2022-02-25 |
| Date Added | 2022-02-11 |
| Vendorproject | Apple |
| Vulnerabilityname | Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:21:48.906Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213091"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213092"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213093"
},
{
"name": "GLSA-202208-39",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202208-39"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-22620",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-29T16:36:15.439176Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2022-02-11",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22620"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:15:43.749Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22620"
}
],
"timeline": [
{
"lang": "en",
"time": "2022-02-11T00:00:00.000Z",
"value": "CVE-2022-22620 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Safari (v and )",
"vendor": "Apple",
"versions": [
{
"lessThan": "15.3",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "12.2",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "15.3",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-01T02:06:59.000Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.apple.com/en-us/HT213091"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.apple.com/en-us/HT213092"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.apple.com/en-us/HT213093"
},
{
"name": "GLSA-202208-39",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202208-39"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2022-22620",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Safari (v and )",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "15.3"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "12.2"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "15.3"
}
]
}
}
]
},
"vendor_name": "Apple"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/en-us/HT213091",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213091"
},
{
"name": "https://support.apple.com/en-us/HT213092",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213092"
},
{
"name": "https://support.apple.com/en-us/HT213093",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213093"
},
{
"name": "GLSA-202208-39",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202208-39"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2022-22620",
"datePublished": "2022-03-18T17:59:40.000Z",
"dateReserved": "2022-01-05T00:00:00.000Z",
"dateUpdated": "2025-10-21T23:15:43.749Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2022-22620",
"cwes": "[\"CWE-416\"]",
"dateAdded": "2022-02-11",
"dueDate": "2022-02-25",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620",
"product": "iOS, iPadOS, and macOS",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "Apple iOS, iPadOS, and macOS WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.",
"vendorProject": "Apple",
"vulnerabilityName": "Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability"
},
"epss": {
"cve": "CVE-2022-22620",
"date": "2026-05-19",
"epss": "0.04022",
"percentile": "0.88592"
},
"fkie_nvd": {
"cisaActionDue": "2022-02-25",
"cisaExploitAdd": "2022-02-11",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability",
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.3\", \"matchCriteriaId\": \"556E3C87-7083-4145-8D61-C8F9A1EBC440\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.3.1\", \"matchCriteriaId\": \"5AE3A1E9-76FE-4553-85E6-7D056E845DF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.3.1\", \"matchCriteriaId\": \"C8DF56F3-5E35-4B00-81AB-5C48610880D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.0.0\", \"versionEndExcluding\": \"12.2.1\", \"matchCriteriaId\": \"6C17D191-FD14-4B2A-879B-7F9543E0F9B3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..\"}, {\"lang\": \"es\", \"value\": \"Se abord\\u00f3 un problema de uso de memoria previamente liberada con una administraci\\u00f3n de memoria mejorada. Este problema es corregido en macOS Monterey versi\\u00f3n 12.2.1, iOS versi\\u00f3n 15.3.1 y iPadOS versi\\u00f3n 15.3.1, Safari versi\\u00f3n 15.3 (v. 16612.4.9.1.8 y 15612.4.9.1.8). El procesamiento de contenido web dise\\u00f1ado de forma maliciosa puede conllevar a una ejecuci\\u00f3n de c\\u00f3digo arbitrario. Apple presenta conocimiento de un informe que indica que este problema puede haber sido explotado activamente..\"}]",
"id": "CVE-2022-22620",
"lastModified": "2024-11-21T06:47:08.117",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2022-03-18T18:15:13.787",
"references": "[{\"url\": \"https://security.gentoo.org/glsa/202208-39\", \"source\": \"product-security@apple.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213091\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213092\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213093\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202208-39\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213091\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213092\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213093\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-22620\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2022-03-18T18:15:13.787\",\"lastModified\":\"2025-10-23T14:54:17.960\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..\"},{\"lang\":\"es\",\"value\":\"Se abord\u00f3 un problema de uso de memoria previamente liberada con una administraci\u00f3n de memoria mejorada. Este problema es corregido en macOS Monterey versi\u00f3n 12.2.1, iOS versi\u00f3n 15.3.1 y iPadOS versi\u00f3n 15.3.1, Safari versi\u00f3n 15.3 (v. 16612.4.9.1.8 y 15612.4.9.1.8). El procesamiento de contenido web dise\u00f1ado de forma maliciosa puede conllevar a una ejecuci\u00f3n de c\u00f3digo arbitrario. Apple presenta conocimiento de un informe que indica que este problema puede haber sido explotado activamente..\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"cisaExploitAdd\":\"2022-02-11\",\"cisaActionDue\":\"2022-02-25\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.3\",\"matchCriteriaId\":\"556E3C87-7083-4145-8D61-C8F9A1EBC440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.3.1\",\"matchCriteriaId\":\"5AE3A1E9-76FE-4553-85E6-7D056E845DF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.3.1\",\"matchCriteriaId\":\"C8DF56F3-5E35-4B00-81AB-5C48610880D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.2.1\",\"matchCriteriaId\":\"6C17D191-FD14-4B2A-879B-7F9543E0F9B3\"}]}]}],\"references\":[{\"url\":\"https://security.gentoo.org/glsa/202208-39\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213091\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213092\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213093\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202208-39\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213091\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213092\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213093\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22620\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.apple.com/en-us/HT213091\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213092\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213093\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202208-39\", \"name\": \"GLSA-202208-39\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T03:21:48.906Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-22620\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-29T16:36:15.439176Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-02-11\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22620\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2022-02-11T00:00:00.000Z\", \"value\": \"CVE-2022-22620 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22620\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-29T16:34:02.876Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"Safari (v and )\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"15.3\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"12.2\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"15.3\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/HT213091\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://support.apple.com/en-us/HT213092\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://support.apple.com/en-us/HT213093\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://security.gentoo.org/glsa/202208-39\", \"name\": \"GLSA-202208-39\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2022-09-01T02:06:59.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"15.3\", \"version_affected\": \"\u003c\"}]}, \"product_name\": \"Safari (v and )\"}, {\"version\": {\"version_data\": [{\"version_value\": \"12.2\", \"version_affected\": \"\u003c\"}]}, \"product_name\": \"macOS\"}, {\"version\": {\"version_data\": [{\"version_value\": \"15.3\", \"version_affected\": \"\u003c\"}]}, \"product_name\": \"macOS\"}]}, \"vendor_name\": \"Apple\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://support.apple.com/en-us/HT213091\", \"name\": \"https://support.apple.com/en-us/HT213091\", \"refsource\": \"MISC\"}, {\"url\": \"https://support.apple.com/en-us/HT213092\", \"name\": \"https://support.apple.com/en-us/HT213092\", \"refsource\": \"MISC\"}, {\"url\": \"https://support.apple.com/en-us/HT213093\", \"name\": \"https://support.apple.com/en-us/HT213093\", \"refsource\": \"MISC\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-39\", \"name\": \"GLSA-202208-39\", \"refsource\": \"GENTOO\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2022-22620\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"product-security@apple.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-22620\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T23:15:43.749Z\", \"dateReserved\": \"2022-01-05T00:00:00.000Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2022-03-18T17:59:40.000Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2022-AVI-137
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits Apple. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
L'éditeur indique que cette vulnérabilité serait activement exploitée.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | iPadOS versions antérieures à 15.3.1 | ||
| Apple | N/A | iOS versions antérieures à 15.3.1 | ||
| Apple | Safari | Safari versions antérieures à 15.3 (build number 16612.4.9.1.8 sur macOS Big Sur, 15612.4.9.1.8 sur macOS Catalina) | ||
| Apple | macOS | macOS Monterey versions antérieures à 12.2.1 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 15.3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 15.3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 15.3 (build number 16612.4.9.1.8 sur macOS Big Sur, 15612.4.9.1.8 sur macOS Catalina)",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Monterey versions ant\u00e9rieures \u00e0 12.2.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-22620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22620"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-137",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Apple. Elle permet\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n\n\u003cstrong\u003eL\u0027\u00e9diteur indique que cette vuln\u00e9rabilit\u00e9 serait activement\nexploit\u00e9e.\u003c/strong\u003e\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213092 du 10 f\u00e9vrier 2022",
"url": "https://support.apple.com/fr-fr/HT213092"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213091 du 10 f\u00e9vrier 2022",
"url": "https://support.apple.com/fr-fr/HT213091"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213093 du 10 f\u00e9vrier 2022",
"url": "https://support.apple.com/fr-fr/HT213093"
}
]
}
CERTFR-2022-AVI-137
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits Apple. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
L'éditeur indique que cette vulnérabilité serait activement exploitée.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | iPadOS versions antérieures à 15.3.1 | ||
| Apple | N/A | iOS versions antérieures à 15.3.1 | ||
| Apple | Safari | Safari versions antérieures à 15.3 (build number 16612.4.9.1.8 sur macOS Big Sur, 15612.4.9.1.8 sur macOS Catalina) | ||
| Apple | macOS | macOS Monterey versions antérieures à 12.2.1 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 15.3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 15.3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 15.3 (build number 16612.4.9.1.8 sur macOS Big Sur, 15612.4.9.1.8 sur macOS Catalina)",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Monterey versions ant\u00e9rieures \u00e0 12.2.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-22620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22620"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-137",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Apple. Elle permet\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n\n\u003cstrong\u003eL\u0027\u00e9diteur indique que cette vuln\u00e9rabilit\u00e9 serait activement\nexploit\u00e9e.\u003c/strong\u003e\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213092 du 10 f\u00e9vrier 2022",
"url": "https://support.apple.com/fr-fr/HT213092"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213091 du 10 f\u00e9vrier 2022",
"url": "https://support.apple.com/fr-fr/HT213091"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213093 du 10 f\u00e9vrier 2022",
"url": "https://support.apple.com/fr-fr/HT213093"
}
]
}
alsa-2022:1777
Vulnerability from osv_almalinux
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.34.6). (BZ#1985042)
Security Fix(es):
-
webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)
-
webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)
-
webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)
-
webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)
-
webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)
-
webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)
-
webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)
-
webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)
-
webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)
-
webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)
-
webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)
-
webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)
-
webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)
-
webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)
-
webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)
-
webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)
-
webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)
-
webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)
-
webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)
-
webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)
-
webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)
-
webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "webkit2gtk3"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.34.6-1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "webkit2gtk3-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.34.6-1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "webkit2gtk3-jsc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.34.6-1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "webkit2gtk3-jsc-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.34.6-1.el8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nThe following packages have been upgraded to a later upstream version: webkit2gtk3 (2.34.6). (BZ#1985042)\n\nSecurity Fix(es):\n\n* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)\n\n* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)\n\n* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)\n\n* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)\n\n* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)\n\n* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)\n\n* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)\n\n* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)\n\n* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)\n\n* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)\n\n* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)\n\n* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)\n\n* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)\n\n* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2022:1777",
"modified": "2022-05-10T08:00:31Z",
"published": "2022-05-10T06:24:27Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2022-1777.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30809"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30818"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30823"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30836"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30846"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30848"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30849"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30851"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30884"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30887"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30888"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30889"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30890"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30897"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30934"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30936"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30951"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30952"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30953"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30954"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30984"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-45481"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-45482"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-45483"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-22589"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-22590"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-22592"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-22594"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-22620"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-22637"
}
],
"related": [
"CVE-2022-22620",
"CVE-2021-30809",
"CVE-2021-30818",
"CVE-2021-30823",
"CVE-2021-30846",
"CVE-2021-30848",
"CVE-2021-30849",
"CVE-2021-30851",
"CVE-2021-30887",
"CVE-2021-30888",
"CVE-2021-30889",
"CVE-2021-30890",
"CVE-2021-30897",
"CVE-2021-30934",
"CVE-2021-30936",
"CVE-2021-30951",
"CVE-2021-30952",
"CVE-2021-30953",
"CVE-2021-30954",
"CVE-2021-30984",
"CVE-2021-45481",
"CVE-2021-45482",
"CVE-2021-45483",
"CVE-2022-22589",
"CVE-2022-22590",
"CVE-2022-22592",
"CVE-2022-22594",
"CVE-2022-22637",
"CVE-2021-30836",
"CVE-2021-30884"
],
"summary": "Moderate: webkit2gtk3 security, bug fix, and enhancement update"
}
BDU:2022-00738
Vulnerability from fstec - Published: 10.02.2022{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Apple Inc., \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "10 (Debian GNU/Linux), 11 (Debian GNU/Linux), 1.7 (Astra Linux Special Edition), \u0434\u043e 15.3 (Safari), \u0434\u043e 15.3.1 (iOS), \u0434\u043e 15.3.1 (iPadOS), \u0434\u043e 2.34.6-1 (WebKitGTK), \u0434\u043e 2.34.6-1 (WPE WebKit), 4.7 (Astra Linux Special Edition), \u0434\u043e 2.4.3 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Apple Inc.:\nhttps://support.apple.com/en-us/HT213091\nhttps://support.apple.com/en-us/HT213093\n\n\u0414\u043b\u044f WebKitGTK:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://webkitgtk.org/security/WSA-2022-0003.html\n\n\u0414\u043b\u044f WPE WebKit:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://webkitgtk.org/security/WSA-2022-0003.html\n\n\u0414\u043b\u044f Debian:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://security-tracker.debian.org/tracker/CVE-2022-22620\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0441\u043d\u043e\u0432\u0430:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f webkit2gtk \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.34.6-1~deb10u1\n\n",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "10.02.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "24.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "15.02.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-00738",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-22620",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Safari, iOS, iPadOS, WebKitGTK, WPE WebKit, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Apple Inc. iOS \u0434\u043e 15.3.1 , Apple Inc. iPadOS \u0434\u043e 15.3.1 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446 WebKit \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Safari, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446 WebKit \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Safari \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.cybersecurity-help.cz/vdb/SB2022021014\nhttps://support.apple.com/en-us/HT213091\nhttps://support.apple.com/en-us/HT213093\nhttps://www.kaspersky.ru/blog/webkit-vulnerability-cve-2022-22620/32366/\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.4.3/\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.5/\nhttps://www.cisa.gov/sites/default/files/csv/known_exploited_vulnerabilities.csv",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
FKIE_CVE-2022-22620
Vulnerability from fkie_nvd - Published: 2022-03-18 18:15 - Updated: 2025-10-23 14:548.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | https://security.gentoo.org/glsa/202208-39 | Third Party Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213091 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213092 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213093 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202208-39 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213091 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213092 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213093 | Release Notes, Vendor Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22620 | Third Party Advisory, US Government Resource |
{
"cisaActionDue": "2022-02-25",
"cisaExploitAdd": "2022-02-11",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"matchCriteriaId": "556E3C87-7083-4145-8D61-C8F9A1EBC440",
"versionEndExcluding": "15.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5AE3A1E9-76FE-4553-85E6-7D056E845DF8",
"versionEndExcluding": "15.3.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8DF56F3-5E35-4B00-81AB-5C48610880D8",
"versionEndExcluding": "15.3.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C17D191-FD14-4B2A-879B-7F9543E0F9B3",
"versionEndExcluding": "12.2.1",
"versionStartIncluding": "12.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
},
{
"lang": "es",
"value": "Se abord\u00f3 un problema de uso de memoria previamente liberada con una administraci\u00f3n de memoria mejorada. Este problema es corregido en macOS Monterey versi\u00f3n 12.2.1, iOS versi\u00f3n 15.3.1 y iPadOS versi\u00f3n 15.3.1, Safari versi\u00f3n 15.3 (v. 16612.4.9.1.8 y 15612.4.9.1.8). El procesamiento de contenido web dise\u00f1ado de forma maliciosa puede conllevar a una ejecuci\u00f3n de c\u00f3digo arbitrario. Apple presenta conocimiento de un informe que indica que este problema puede haber sido explotado activamente.."
}
],
"id": "CVE-2022-22620",
"lastModified": "2025-10-23T14:54:17.960",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-03-18T18:15:13.787",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-39"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213091"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213092"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213093"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-39"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213091"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213092"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213093"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22620"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-2886-X646-53FJ
Vulnerability from github – Published: 2022-03-19 00:00 – Updated: 2025-10-22 00:32A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
{
"affected": [],
"aliases": [
"CVE-2022-22620"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-03-18T18:15:00Z",
"severity": "HIGH"
},
"details": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..",
"id": "GHSA-2886-x646-53fj",
"modified": "2025-10-22T00:32:30Z",
"published": "2022-03-19T00:00:54Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202208-39"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213091"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213092"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213093"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22620"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2022-22620
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-22620",
"description": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..",
"id": "GSD-2022-22620",
"references": [
"https://www.suse.com/security/cve/CVE-2022-22620.html",
"https://www.debian.org/security/2022/dsa-5084",
"https://www.debian.org/security/2022/dsa-5083",
"https://advisories.mageia.org/CVE-2022-22620.html",
"https://security.archlinux.org/CVE-2022-22620",
"https://linux.oracle.com/cve/CVE-2022-22620.html",
"https://access.redhat.com/errata/RHSA-2022:1777"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-22620"
],
"details": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..",
"id": "GSD-2022-22620",
"modified": "2023-12-13T01:19:29.185812Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cisa.gov": {
"cveID": "CVE-2022-22620",
"dateAdded": "2022-02-11",
"dueDate": "2022-02-25",
"product": "Webkit",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "Apple Webkit, which impacts iOS, iPadOS, and macOS, contains a vulnerability which allows for remote code execution.",
"vendorProject": "Apple",
"vulnerabilityName": "Apple Webkit Remote Code Execution Vulnerability"
},
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2022-22620",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Safari (v and )",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "15.3"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "12.2"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "15.3"
}
]
}
}
]
},
"vendor_name": "Apple"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/en-us/HT213091",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213091"
},
{
"name": "https://support.apple.com/en-us/HT213092",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213092"
},
{
"name": "https://support.apple.com/en-us/HT213093",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213093"
},
{
"name": "GLSA-202208-39",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202208-39"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "12.2.1",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.3.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.3",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.3.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2022-22620"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/en-us/HT213092",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213092"
},
{
"name": "https://support.apple.com/en-us/HT213093",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213093"
},
{
"name": "https://support.apple.com/en-us/HT213091",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213091"
},
{
"name": "GLSA-202208-39",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-39"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-09-09T20:41Z",
"publishedDate": "2022-03-18T18:15Z"
}
}
}
OPENSUSE-SU-2022:0705-1
Vulnerability from csaf_opensuse - Published: 2022-03-04 06:45 - Updated: 2022-03-04 06:45| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://bugzilla.suse.com/1195064 | self |
| https://bugzilla.suse.com/1195735 | self |
| https://bugzilla.suse.com/1196133 | self |
| https://www.suse.com/security/cve/CVE-2021-30934/ | self |
| https://www.suse.com/security/cve/CVE-2021-30936/ | self |
| https://www.suse.com/security/cve/CVE-2021-30951/ | self |
| https://www.suse.com/security/cve/CVE-2021-30952/ | self |
| https://www.suse.com/security/cve/CVE-2021-30953/ | self |
| https://www.suse.com/security/cve/CVE-2021-30954/ | self |
| https://www.suse.com/security/cve/CVE-2021-30984/ | self |
| https://www.suse.com/security/cve/CVE-2021-45481/ | self |
| https://www.suse.com/security/cve/CVE-2021-45482/ | self |
| https://www.suse.com/security/cve/CVE-2021-45483/ | self |
| https://www.suse.com/security/cve/CVE-2022-22589/ | self |
| https://www.suse.com/security/cve/CVE-2022-22590/ | self |
| https://www.suse.com/security/cve/CVE-2022-22592/ | self |
| https://www.suse.com/security/cve/CVE-2022-22620/ | self |
| https://www.suse.com/security/cve/CVE-2021-30934 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://bugzilla.suse.com/1196393 | external |
| https://www.suse.com/security/cve/CVE-2021-30936 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-30951 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-30952 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-30953 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-30954 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-30984 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-45481 | external |
| https://bugzilla.suse.com/1194138 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-45482 | external |
| https://bugzilla.suse.com/1194136 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-45483 | external |
| https://bugzilla.suse.com/1194135 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2022-22589 | external |
| https://bugzilla.suse.com/1195735 | external |
| https://www.suse.com/security/cve/CVE-2022-22590 | external |
| https://bugzilla.suse.com/1195735 | external |
| https://www.suse.com/security/cve/CVE-2022-22592 | external |
| https://bugzilla.suse.com/1195735 | external |
| https://www.suse.com/security/cve/CVE-2022-22620 | external |
| https://bugzilla.suse.com/1196133 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for webkit2gtk3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for webkit2gtk3 fixes the following issues:\n\nUpdate to version 2.34.6 (bsc#1196133):\n\n- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.\n\nUpdate to version 2.34.5 (bsc#1195735):\n\n- CVE-2022-22589: A validation issue was addressed with improved input sanitization.\n- CVE-2022-22590: A use after free issue was addressed with improved memory management.\n- CVE-2022-22592: A logic issue was addressed with improved state management.\n\nUpdate to version 2.34.4 (bsc#1195064):\n\n- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.\n- CVE-2021-30936: A use after free issue was addressed with improved memory management.\n- CVE-2021-30951: A use after free issue was addressed with improved memory management.\n- CVE-2021-30952: An integer overflow was addressed with improved input validation.\n- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.\n- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.\n- CVE-2021-30984: A race condition was addressed with improved state handling.\n- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.\n\nThe following CVEs were addressed in a previous update:\n\n- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.\n- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.\n- CVE-2021-45483: A use-after-free in WebCore::Frame::page.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2022-705,openSUSE-SLE-15.4-2022-705",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0705-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:0705-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:0705-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/"
},
{
"category": "self",
"summary": "SUSE Bug 1195064",
"url": "https://bugzilla.suse.com/1195064"
},
{
"category": "self",
"summary": "SUSE Bug 1195735",
"url": "https://bugzilla.suse.com/1195735"
},
{
"category": "self",
"summary": "SUSE Bug 1196133",
"url": "https://bugzilla.suse.com/1196133"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30934 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30936 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30936/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30951 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30951/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30952 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30953 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30953/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30954 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30954/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30984 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45481 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45481/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45482 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45482/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22589 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22590 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22590/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22592 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22620 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22620/"
}
],
"title": "Security update for webkit2gtk3",
"tracking": {
"current_release_date": "2022-03-04T06:45:18Z",
"generator": {
"date": "2022-03-04T06:45:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:0705-1",
"initial_release_date": "2022-03-04T06:45:18Z",
"revision_history": [
{
"date": "2022-03-04T06:45:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"product_id": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"product": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"product_id": "libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"product_id": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"product": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "webkit-jsc-4-2.34.6-29.1.aarch64",
"product": {
"name": "webkit-jsc-4-2.34.6-29.1.aarch64",
"product_id": "webkit-jsc-4-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"product_id": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.34.6-29.1.aarch64",
"product": {
"name": "webkit2gtk3-devel-2.34.6-29.1.aarch64",
"product_id": "webkit2gtk3-devel-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"product": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"product_id": "webkit2gtk3-minibrowser-2.34.6-29.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"product": {
"name": "libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"product_id": "libwebkit2gtk3-lang-2.34.6-29.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"product_id": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"product": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"product_id": "libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"product_id": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"product": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "webkit-jsc-4-2.34.6-29.1.ppc64le",
"product": {
"name": "webkit-jsc-4-2.34.6-29.1.ppc64le",
"product_id": "webkit-jsc-4-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"product_id": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"product": {
"name": "webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"product_id": "webkit2gtk3-devel-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"product": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"product_id": "webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"product_id": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"product": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"product_id": "libwebkit2gtk-4_0-37-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"product_id": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"product": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "webkit-jsc-4-2.34.6-29.1.s390x",
"product": {
"name": "webkit-jsc-4-2.34.6-29.1.s390x",
"product_id": "webkit-jsc-4-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"product_id": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.34.6-29.1.s390x",
"product": {
"name": "webkit2gtk3-devel-2.34.6-29.1.s390x",
"product_id": "webkit2gtk3-devel-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"product": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"product_id": "webkit2gtk3-minibrowser-2.34.6-29.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"product_id": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"product": {
"name": "libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"product_id": "libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"product": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"product_id": "libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"product": {
"name": "libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"product_id": "libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"product_id": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"product": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "webkit-jsc-4-2.34.6-29.1.x86_64",
"product": {
"name": "webkit-jsc-4-2.34.6-29.1.x86_64",
"product_id": "webkit-jsc-4-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"product_id": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.34.6-29.1.x86_64",
"product": {
"name": "webkit2gtk3-devel-2.34.6-29.1.x86_64",
"product_id": "webkit2gtk3-devel-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.x86_64",
"product": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.x86_64",
"product_id": "webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le"
},
"product_reference": "libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x"
},
"product_reference": "libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk3-lang-2.34.6-29.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch"
},
"product_reference": "libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64"
},
"product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le"
},
"product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x"
},
"product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64"
},
"product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit-jsc-4-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64"
},
"product_reference": "webkit-jsc-4-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit-jsc-4-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le"
},
"product_reference": "webkit-jsc-4-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit-jsc-4-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x"
},
"product_reference": "webkit-jsc-4-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit-jsc-4-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64"
},
"product_reference": "webkit-jsc-4-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64"
},
"product_reference": "webkit2gtk3-devel-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le"
},
"product_reference": "webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x"
},
"product_reference": "webkit2gtk3-devel-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64"
},
"product_reference": "webkit2gtk3-devel-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64"
},
"product_reference": "webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le"
},
"product_reference": "webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x"
},
"product_reference": "webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
},
"product_reference": "webkit2gtk3-minibrowser-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-30934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30934"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30934",
"url": "https://www.suse.com/security/cve/CVE-2021-30934"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30934",
"url": "https://bugzilla.suse.com/1195064"
},
{
"category": "external",
"summary": "SUSE Bug 1196393 for CVE-2021-30934",
"url": "https://bugzilla.suse.com/1196393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30934"
},
{
"cve": "CVE-2021-30936",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30936"
}
],
"notes": [
{
"category": "general",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30936",
"url": "https://www.suse.com/security/cve/CVE-2021-30936"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30936",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30936"
},
{
"cve": "CVE-2021-30951",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30951"
}
],
"notes": [
{
"category": "general",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30951",
"url": "https://www.suse.com/security/cve/CVE-2021-30951"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30951",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30951"
},
{
"cve": "CVE-2021-30952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30952"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30952",
"url": "https://www.suse.com/security/cve/CVE-2021-30952"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30952",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30952"
},
{
"cve": "CVE-2021-30953",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30953"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30953",
"url": "https://www.suse.com/security/cve/CVE-2021-30953"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30953",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30953"
},
{
"cve": "CVE-2021-30954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30954"
}
],
"notes": [
{
"category": "general",
"text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30954",
"url": "https://www.suse.com/security/cve/CVE-2021-30954"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30954",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30954"
},
{
"cve": "CVE-2021-30984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30984"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30984",
"url": "https://www.suse.com/security/cve/CVE-2021-30984"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30984",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30984"
},
{
"cve": "CVE-2021-45481",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45481"
}
],
"notes": [
{
"category": "general",
"text": "In WebKitGTK before 2.32.4, there is incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create, leading to a segmentation violation and application crash, a different vulnerability than CVE-2021-30889.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45481",
"url": "https://www.suse.com/security/cve/CVE-2021-45481"
},
{
"category": "external",
"summary": "SUSE Bug 1194138 for CVE-2021-45481",
"url": "https://bugzilla.suse.com/1194138"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-45481",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "moderate"
}
],
"title": "CVE-2021-45481"
},
{
"cve": "CVE-2021-45482",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45482"
}
],
"notes": [
{
"category": "general",
"text": "In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::ContainerNode::firstChild, a different vulnerability than CVE-2021-30889.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45482",
"url": "https://www.suse.com/security/cve/CVE-2021-45482"
},
{
"category": "external",
"summary": "SUSE Bug 1194136 for CVE-2021-45482",
"url": "https://bugzilla.suse.com/1194136"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-45482",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "moderate"
}
],
"title": "CVE-2021-45482"
},
{
"cve": "CVE-2021-45483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45483"
}
],
"notes": [
{
"category": "general",
"text": "In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::Frame::page, a different vulnerability than CVE-2021-30889.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45483",
"url": "https://www.suse.com/security/cve/CVE-2021-45483"
},
{
"category": "external",
"summary": "SUSE Bug 1194135 for CVE-2021-45483",
"url": "https://bugzilla.suse.com/1194135"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-45483",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "moderate"
}
],
"title": "CVE-2021-45483"
},
{
"cve": "CVE-2022-22589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22589"
}
],
"notes": [
{
"category": "general",
"text": "A validation issue was addressed with improved input sanitization. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing a maliciously crafted mail message may lead to running arbitrary javascript.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22589",
"url": "https://www.suse.com/security/cve/CVE-2022-22589"
},
{
"category": "external",
"summary": "SUSE Bug 1195735 for CVE-2022-22589",
"url": "https://bugzilla.suse.com/1195735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2022-22589"
},
{
"cve": "CVE-2022-22590",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22590"
}
],
"notes": [
{
"category": "general",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22590",
"url": "https://www.suse.com/security/cve/CVE-2022-22590"
},
{
"category": "external",
"summary": "SUSE Bug 1195735 for CVE-2022-22590",
"url": "https://bugzilla.suse.com/1195735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2022-22590"
},
{
"cve": "CVE-2022-22592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22592"
}
],
"notes": [
{
"category": "general",
"text": "A logic issue was addressed with improved state management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22592",
"url": "https://www.suse.com/security/cve/CVE-2022-22592"
},
{
"category": "external",
"summary": "SUSE Bug 1195735 for CVE-2022-22592",
"url": "https://bugzilla.suse.com/1195735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2022-22592"
},
{
"cve": "CVE-2022-22620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22620"
}
],
"notes": [
{
"category": "general",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22620",
"url": "https://www.suse.com/security/cve/CVE-2022-22620"
},
{
"category": "external",
"summary": "SUSE Bug 1196133 for CVE-2022-22620",
"url": "https://bugzilla.suse.com/1196133"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2022-22620"
}
]
}
RHSA-2022:1777
Vulnerability from csaf_redhat - Published: 2022-05-10 13:27 - Updated: 2026-03-06 03:17A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user's browsing history.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2022:1777 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://access.redhat.com/documentation/en-us/red… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1985042 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017898 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017901 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017904 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2018573 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034347 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034368 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034373 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034376 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034378 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034381 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034383 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034386 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034389 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2038907 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040327 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040329 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040331 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2041559 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044521 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044528 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044534 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044538 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044542 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044551 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044553 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2045291 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053179 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053181 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053185 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2056474 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2073903 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2021-30809 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034347 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30809 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30809 | external |
| https://access.redhat.com/security/cve/CVE-2021-30818 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034368 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30818 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30818 | external |
| https://access.redhat.com/security/cve/CVE-2021-30823 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034373 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30823 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30823 | external |
| https://access.redhat.com/security/cve/CVE-2021-30836 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034376 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30836 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30836 | external |
| https://access.redhat.com/security/cve/CVE-2021-30846 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017898 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30846 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30846 | external |
| https://webkitgtk.org/security/WSA-2021-0006.html | external |
| https://access.redhat.com/security/cve/CVE-2021-30848 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017901 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30848 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30848 | external |
| https://access.redhat.com/security/cve/CVE-2021-30849 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017904 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30849 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30849 | external |
| https://access.redhat.com/security/cve/CVE-2021-30851 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2018573 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30851 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30851 | external |
| https://access.redhat.com/security/cve/CVE-2021-30884 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034378 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30884 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30884 | external |
| https://access.redhat.com/security/cve/CVE-2021-30887 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034381 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30887 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30887 | external |
| https://access.redhat.com/security/cve/CVE-2021-30888 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034383 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30888 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30888 | external |
| https://access.redhat.com/security/cve/CVE-2021-30889 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034386 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30889 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30889 | external |
| https://access.redhat.com/security/cve/CVE-2021-30890 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034389 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30890 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30890 | external |
| https://access.redhat.com/security/cve/CVE-2021-30897 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2038907 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30897 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30897 | external |
| https://access.redhat.com/security/cve/CVE-2021-30934 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044521 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30934 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30934 | external |
| https://access.redhat.com/security/cve/CVE-2021-30936 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044528 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30936 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30936 | external |
| https://webkitgtk.org/security/WSA-2022-0001.html | external |
| https://access.redhat.com/security/cve/CVE-2021-30951 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044534 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30951 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30951 | external |
| https://access.redhat.com/security/cve/CVE-2021-30952 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044538 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30952 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30952 | external |
| https://www.cisa.gov/known-exploited-vulnerabilit… | external |
| https://access.redhat.com/security/cve/CVE-2021-30953 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044542 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30953 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30953 | external |
| https://access.redhat.com/security/cve/CVE-2021-30954 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044551 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30954 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30954 | external |
| https://access.redhat.com/security/cve/CVE-2021-30984 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044553 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30984 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30984 | external |
| https://access.redhat.com/security/cve/CVE-2021-45481 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040327 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-45481 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-45481 | external |
| https://access.redhat.com/security/cve/CVE-2021-45482 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040329 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-45482 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-45482 | external |
| https://access.redhat.com/security/cve/CVE-2021-45483 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040331 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-45483 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-45483 | external |
| https://access.redhat.com/security/cve/CVE-2022-22589 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053179 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22589 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22589 | external |
| https://webkitgtk.org/security/WSA-2022-0002.html | external |
| https://access.redhat.com/security/cve/CVE-2022-22590 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053181 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22590 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22590 | external |
| https://access.redhat.com/security/cve/CVE-2022-22592 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053185 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22592 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22592 | external |
| https://access.redhat.com/security/cve/CVE-2022-22594 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2045291 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22594 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22594 | external |
| https://access.redhat.com/security/cve/CVE-2022-22620 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2056474 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22620 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22620 | external |
| https://webkitgtk.org/security/WSA-2022-0003.html | external |
| https://access.redhat.com/security/cve/CVE-2022-22637 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2073903 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22637 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22637 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nThe following packages have been upgraded to a later upstream version: webkit2gtk3 (2.34.6). (BZ#1985042)\n\nSecurity Fix(es):\n\n* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)\n\n* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)\n\n* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)\n\n* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)\n\n* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)\n\n* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)\n\n* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)\n\n* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)\n\n* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)\n\n* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)\n\n* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)\n\n* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)\n\n* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)\n\n* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1777",
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1985042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985042"
},
{
"category": "external",
"summary": "2017898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898"
},
{
"category": "external",
"summary": "2017901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901"
},
{
"category": "external",
"summary": "2017904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904"
},
{
"category": "external",
"summary": "2018573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573"
},
{
"category": "external",
"summary": "2034347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347"
},
{
"category": "external",
"summary": "2034368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368"
},
{
"category": "external",
"summary": "2034373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373"
},
{
"category": "external",
"summary": "2034376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376"
},
{
"category": "external",
"summary": "2034378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378"
},
{
"category": "external",
"summary": "2034381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381"
},
{
"category": "external",
"summary": "2034383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383"
},
{
"category": "external",
"summary": "2034386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386"
},
{
"category": "external",
"summary": "2034389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389"
},
{
"category": "external",
"summary": "2038907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907"
},
{
"category": "external",
"summary": "2040327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327"
},
{
"category": "external",
"summary": "2040329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329"
},
{
"category": "external",
"summary": "2040331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331"
},
{
"category": "external",
"summary": "2041559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041559"
},
{
"category": "external",
"summary": "2044521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521"
},
{
"category": "external",
"summary": "2044528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528"
},
{
"category": "external",
"summary": "2044534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534"
},
{
"category": "external",
"summary": "2044538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538"
},
{
"category": "external",
"summary": "2044542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542"
},
{
"category": "external",
"summary": "2044551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551"
},
{
"category": "external",
"summary": "2044553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553"
},
{
"category": "external",
"summary": "2045291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291"
},
{
"category": "external",
"summary": "2053179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179"
},
{
"category": "external",
"summary": "2053181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181"
},
{
"category": "external",
"summary": "2053185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185"
},
{
"category": "external",
"summary": "2056474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474"
},
{
"category": "external",
"summary": "2073903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1777.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2026-03-06T03:17:14+00:00",
"generator": {
"date": "2026-03-06T03:17:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2022:1777",
"initial_release_date": "2022-05-10T13:27:07+00:00",
"revision_history": [
{
"date": "2022-05-10T13:27:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:27:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-06T03:17:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.src",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.src",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.src",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-30809",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034347"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30809"
},
{
"category": "external",
"summary": "RHBZ#2034347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30818",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034368"
}
],
"notes": [
{
"category": "description",
"text": "A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30818"
},
{
"category": "external",
"summary": "RHBZ#2034368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30823",
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034373"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to HSTS bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30823"
},
{
"category": "external",
"summary": "RHBZ#2034373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30823",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to HSTS bypass"
},
{
"cve": "CVE-2021-30836",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034376"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Out-of-bounds read leading to memory disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30836"
},
{
"category": "external",
"summary": "RHBZ#2034376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30836"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: Out-of-bounds read leading to memory disclosure"
},
{
"cve": "CVE-2021-30846",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017898"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30846"
},
{
"category": "external",
"summary": "RHBZ#2017898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30846",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30846"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30848",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017901"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30848"
},
{
"category": "external",
"summary": "RHBZ#2017901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30848"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30849",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017904"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30849"
},
{
"category": "external",
"summary": "RHBZ#2017904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30849",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30849"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30851",
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018573"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30851"
},
{
"category": "external",
"summary": "RHBZ#2018573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30851",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30884",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034378"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user\u0027s browsing history.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: CSS compositing issue leading to revealing of the browsing history",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30884"
},
{
"category": "external",
"summary": "RHBZ#2034378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30884",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: CSS compositing issue leading to revealing of the browsing history"
},
{
"cve": "CVE-2021-30887",
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034381"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to Content Security Policy bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30887"
},
{
"category": "external",
"summary": "RHBZ#2034381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30887",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30887"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to Content Security Policy bypass"
},
{
"cve": "CVE-2021-30888",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034383"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Information leak via Content Security Policy reports",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30888"
},
{
"category": "external",
"summary": "RHBZ#2034383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30888",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Information leak via Content Security Policy reports"
},
{
"cve": "CVE-2021-30889",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034386"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30889"
},
{
"category": "external",
"summary": "RHBZ#2034386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30889",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30889"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30890",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034389"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to universal cross-site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30890"
},
{
"category": "external",
"summary": "RHBZ#2034389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to universal cross-site scripting"
},
{
"cve": "CVE-2021-30897",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2038907"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cross-origin data exfiltration via resource timing API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30897"
},
{
"category": "external",
"summary": "RHBZ#2038907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30897"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cross-origin data exfiltration via resource timing API"
},
{
"cve": "CVE-2021-30934",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044521"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30934"
},
{
"category": "external",
"summary": "RHBZ#2044521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30936",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044528"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30936"
},
{
"category": "external",
"summary": "RHBZ#2044528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30936"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30951",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044534"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30951"
},
{
"category": "external",
"summary": "RHBZ#2044534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30951",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30951"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30952",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30952"
},
{
"category": "external",
"summary": "RHBZ#2044538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30952"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2026-03-05T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30953",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044542"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30953"
},
{
"category": "external",
"summary": "RHBZ#2044542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30953"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30954",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044551"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30954"
},
{
"category": "external",
"summary": "RHBZ#2044551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30954",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30984",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044553"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30984"
},
{
"category": "external",
"summary": "RHBZ#2044553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-45481",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040327"
}
],
"notes": [
{
"category": "description",
"text": "A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45481"
},
{
"category": "external",
"summary": "RHBZ#2040327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create"
},
{
"cve": "CVE-2021-45482",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040329"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45482"
},
{
"category": "external",
"summary": "RHBZ#2040329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45482",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild"
},
{
"cve": "CVE-2021-45483",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040331"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in WebCore::Frame::page",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45483"
},
{
"category": "external",
"summary": "RHBZ#2040331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45483"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in WebCore::Frame::page"
},
{
"cve": "CVE-2022-22589",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053179"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22589"
},
{
"category": "external",
"summary": "RHBZ#2053179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22589"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript"
},
{
"cve": "CVE-2022-22590",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053181"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22590"
},
{
"category": "external",
"summary": "RHBZ#2053181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-22592",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053185"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22592"
},
{
"category": "external",
"summary": "RHBZ#2053185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22592"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced"
},
{
"cve": "CVE-2022-22594",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2045291"
}
],
"notes": [
{
"category": "description",
"text": "A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22594"
},
{
"category": "external",
"summary": "RHBZ#2045291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2022-22620",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056474"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22620"
},
{
"category": "external",
"summary": "RHBZ#2056474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22620"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0003.html",
"url": "https://webkitgtk.org/security/WSA-2022-0003.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-02-11T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free"
},
{
"cve": "CVE-2022-22637",
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073903"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: logic issue was addressed with improved state management",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22637"
},
{
"category": "external",
"summary": "RHBZ#2073903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22637"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: logic issue was addressed with improved state management"
}
]
}
RHSA-2022_1777
Vulnerability from csaf_redhat - Published: 2022-05-10 13:27 - Updated: 2024-11-22 17:37A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user's browsing history.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2022:1777 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://access.redhat.com/documentation/en-us/red… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1985042 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017898 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017901 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017904 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2018573 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034347 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034368 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034373 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034376 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034378 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034381 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034383 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034386 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034389 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2038907 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040327 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040329 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040331 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2041559 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044521 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044528 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044534 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044538 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044542 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044551 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044553 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2045291 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053179 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053181 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053185 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2056474 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2073903 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2021-30809 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034347 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30809 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30809 | external |
| https://access.redhat.com/security/cve/CVE-2021-30818 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034368 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30818 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30818 | external |
| https://access.redhat.com/security/cve/CVE-2021-30823 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034373 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30823 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30823 | external |
| https://access.redhat.com/security/cve/CVE-2021-30836 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034376 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30836 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30836 | external |
| https://access.redhat.com/security/cve/CVE-2021-30846 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017898 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30846 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30846 | external |
| https://webkitgtk.org/security/WSA-2021-0006.html | external |
| https://access.redhat.com/security/cve/CVE-2021-30848 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017901 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30848 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30848 | external |
| https://access.redhat.com/security/cve/CVE-2021-30849 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017904 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30849 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30849 | external |
| https://access.redhat.com/security/cve/CVE-2021-30851 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2018573 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30851 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30851 | external |
| https://access.redhat.com/security/cve/CVE-2021-30884 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034378 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30884 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30884 | external |
| https://access.redhat.com/security/cve/CVE-2021-30887 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034381 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30887 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30887 | external |
| https://access.redhat.com/security/cve/CVE-2021-30888 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034383 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30888 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30888 | external |
| https://access.redhat.com/security/cve/CVE-2021-30889 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034386 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30889 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30889 | external |
| https://access.redhat.com/security/cve/CVE-2021-30890 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034389 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30890 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30890 | external |
| https://access.redhat.com/security/cve/CVE-2021-30897 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2038907 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30897 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30897 | external |
| https://access.redhat.com/security/cve/CVE-2021-30934 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044521 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30934 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30934 | external |
| https://access.redhat.com/security/cve/CVE-2021-30936 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044528 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30936 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30936 | external |
| https://webkitgtk.org/security/WSA-2022-0001.html | external |
| https://access.redhat.com/security/cve/CVE-2021-30951 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044534 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30951 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30951 | external |
| https://access.redhat.com/security/cve/CVE-2021-30952 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044538 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30952 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30952 | external |
| https://access.redhat.com/security/cve/CVE-2021-30953 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044542 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30953 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30953 | external |
| https://access.redhat.com/security/cve/CVE-2021-30954 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044551 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30954 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30954 | external |
| https://access.redhat.com/security/cve/CVE-2021-30984 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044553 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30984 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30984 | external |
| https://access.redhat.com/security/cve/CVE-2021-45481 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040327 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-45481 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-45481 | external |
| https://access.redhat.com/security/cve/CVE-2021-45482 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040329 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-45482 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-45482 | external |
| https://access.redhat.com/security/cve/CVE-2021-45483 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040331 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-45483 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-45483 | external |
| https://access.redhat.com/security/cve/CVE-2022-22589 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053179 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22589 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22589 | external |
| https://webkitgtk.org/security/WSA-2022-0002.html | external |
| https://access.redhat.com/security/cve/CVE-2022-22590 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053181 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22590 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22590 | external |
| https://access.redhat.com/security/cve/CVE-2022-22592 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053185 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22592 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22592 | external |
| https://access.redhat.com/security/cve/CVE-2022-22594 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2045291 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22594 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22594 | external |
| https://access.redhat.com/security/cve/CVE-2022-22620 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2056474 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22620 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22620 | external |
| https://webkitgtk.org/security/WSA-2022-0003.html | external |
| https://www.cisa.gov/known-exploited-vulnerabilit… | external |
| https://access.redhat.com/security/cve/CVE-2022-22637 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2073903 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22637 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22637 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nThe following packages have been upgraded to a later upstream version: webkit2gtk3 (2.34.6). (BZ#1985042)\n\nSecurity Fix(es):\n\n* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)\n\n* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)\n\n* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)\n\n* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)\n\n* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)\n\n* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)\n\n* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)\n\n* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)\n\n* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)\n\n* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)\n\n* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)\n\n* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)\n\n* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)\n\n* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1777",
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1985042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985042"
},
{
"category": "external",
"summary": "2017898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898"
},
{
"category": "external",
"summary": "2017901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901"
},
{
"category": "external",
"summary": "2017904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904"
},
{
"category": "external",
"summary": "2018573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573"
},
{
"category": "external",
"summary": "2034347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347"
},
{
"category": "external",
"summary": "2034368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368"
},
{
"category": "external",
"summary": "2034373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373"
},
{
"category": "external",
"summary": "2034376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376"
},
{
"category": "external",
"summary": "2034378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378"
},
{
"category": "external",
"summary": "2034381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381"
},
{
"category": "external",
"summary": "2034383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383"
},
{
"category": "external",
"summary": "2034386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386"
},
{
"category": "external",
"summary": "2034389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389"
},
{
"category": "external",
"summary": "2038907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907"
},
{
"category": "external",
"summary": "2040327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327"
},
{
"category": "external",
"summary": "2040329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329"
},
{
"category": "external",
"summary": "2040331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331"
},
{
"category": "external",
"summary": "2041559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041559"
},
{
"category": "external",
"summary": "2044521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521"
},
{
"category": "external",
"summary": "2044528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528"
},
{
"category": "external",
"summary": "2044534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534"
},
{
"category": "external",
"summary": "2044538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538"
},
{
"category": "external",
"summary": "2044542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542"
},
{
"category": "external",
"summary": "2044551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551"
},
{
"category": "external",
"summary": "2044553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553"
},
{
"category": "external",
"summary": "2045291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291"
},
{
"category": "external",
"summary": "2053179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179"
},
{
"category": "external",
"summary": "2053181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181"
},
{
"category": "external",
"summary": "2053185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185"
},
{
"category": "external",
"summary": "2056474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474"
},
{
"category": "external",
"summary": "2073903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1777.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-11-22T17:37:40+00:00",
"generator": {
"date": "2024-11-22T17:37:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:1777",
"initial_release_date": "2022-05-10T13:27:07+00:00",
"revision_history": [
{
"date": "2022-05-10T13:27:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:27:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T17:37:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.src",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.src",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.src",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-30809",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034347"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30809"
},
{
"category": "external",
"summary": "RHBZ#2034347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30818",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034368"
}
],
"notes": [
{
"category": "description",
"text": "A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30818"
},
{
"category": "external",
"summary": "RHBZ#2034368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30823",
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034373"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to HSTS bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30823"
},
{
"category": "external",
"summary": "RHBZ#2034373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30823",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to HSTS bypass"
},
{
"cve": "CVE-2021-30836",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034376"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Out-of-bounds read leading to memory disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30836"
},
{
"category": "external",
"summary": "RHBZ#2034376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30836"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: Out-of-bounds read leading to memory disclosure"
},
{
"cve": "CVE-2021-30846",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017898"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30846"
},
{
"category": "external",
"summary": "RHBZ#2017898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30846",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30846"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30848",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017901"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30848"
},
{
"category": "external",
"summary": "RHBZ#2017901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30848"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30849",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017904"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30849"
},
{
"category": "external",
"summary": "RHBZ#2017904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30849",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30849"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30851",
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018573"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30851"
},
{
"category": "external",
"summary": "RHBZ#2018573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30851",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30884",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034378"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user\u0027s browsing history.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: CSS compositing issue leading to revealing of the browsing history",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30884"
},
{
"category": "external",
"summary": "RHBZ#2034378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30884",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: CSS compositing issue leading to revealing of the browsing history"
},
{
"cve": "CVE-2021-30887",
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034381"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to Content Security Policy bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30887"
},
{
"category": "external",
"summary": "RHBZ#2034381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30887",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30887"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to Content Security Policy bypass"
},
{
"cve": "CVE-2021-30888",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034383"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Information leak via Content Security Policy reports",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30888"
},
{
"category": "external",
"summary": "RHBZ#2034383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30888",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Information leak via Content Security Policy reports"
},
{
"cve": "CVE-2021-30889",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034386"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30889"
},
{
"category": "external",
"summary": "RHBZ#2034386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30889",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30889"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30890",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034389"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to universal cross-site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30890"
},
{
"category": "external",
"summary": "RHBZ#2034389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to universal cross-site scripting"
},
{
"cve": "CVE-2021-30897",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2038907"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cross-origin data exfiltration via resource timing API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30897"
},
{
"category": "external",
"summary": "RHBZ#2038907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30897"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cross-origin data exfiltration via resource timing API"
},
{
"cve": "CVE-2021-30934",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044521"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30934"
},
{
"category": "external",
"summary": "RHBZ#2044521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30936",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044528"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30936"
},
{
"category": "external",
"summary": "RHBZ#2044528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30936"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30951",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044534"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30951"
},
{
"category": "external",
"summary": "RHBZ#2044534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30951",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30951"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30952",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30952"
},
{
"category": "external",
"summary": "RHBZ#2044538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30952"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30953",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044542"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30953"
},
{
"category": "external",
"summary": "RHBZ#2044542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30953"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30954",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044551"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30954"
},
{
"category": "external",
"summary": "RHBZ#2044551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30954",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30984",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044553"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30984"
},
{
"category": "external",
"summary": "RHBZ#2044553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-45481",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040327"
}
],
"notes": [
{
"category": "description",
"text": "A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45481"
},
{
"category": "external",
"summary": "RHBZ#2040327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create"
},
{
"cve": "CVE-2021-45482",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040329"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45482"
},
{
"category": "external",
"summary": "RHBZ#2040329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45482",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild"
},
{
"cve": "CVE-2021-45483",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040331"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in WebCore::Frame::page",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45483"
},
{
"category": "external",
"summary": "RHBZ#2040331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45483"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in WebCore::Frame::page"
},
{
"cve": "CVE-2022-22589",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053179"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22589"
},
{
"category": "external",
"summary": "RHBZ#2053179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22589"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript"
},
{
"cve": "CVE-2022-22590",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053181"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22590"
},
{
"category": "external",
"summary": "RHBZ#2053181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-22592",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053185"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22592"
},
{
"category": "external",
"summary": "RHBZ#2053185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22592"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced"
},
{
"cve": "CVE-2022-22594",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2045291"
}
],
"notes": [
{
"category": "description",
"text": "A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22594"
},
{
"category": "external",
"summary": "RHBZ#2045291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2022-22620",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056474"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22620"
},
{
"category": "external",
"summary": "RHBZ#2056474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22620"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0003.html",
"url": "https://webkitgtk.org/security/WSA-2022-0003.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-02-11T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free"
},
{
"cve": "CVE-2022-22637",
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073903"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: logic issue was addressed with improved state management",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22637"
},
{
"category": "external",
"summary": "RHBZ#2073903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22637"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: logic issue was addressed with improved state management"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.